Skip to main content

Intel

EXAMINING PE FILES

posted onAugust 16, 2000
by hitbsecnews

WARNING: The author is NOT a proficient coder[heh!], or even a good one. All of the information in this article is NOT guaranteed to be accurate, this article is meant for BEGINNERS, or people looking to learn a bit about the PE file format, simple binary file i/o, etc.

ASSUMED: Knowledge of C, working with MSVC++, Windows API, and how to use a hex editor.

A 101 Bytez team article for Hackinthebox mag

posted onAugust 16, 2000
by hitbsecnews

[editor’s note: I have tried to preserve the original language of his article as much as possible to reflect its “l33t sp34k” roots, but readability and common grammar at times prohibited this effort.]

Written By : OZONE
Title: July Hack
Discussing : | ROBPOLL.cgi | Winamp buffer overflow | Servu 2.5 e buffer overflow | Vision of NET

Commentary on the Political Aspects of the Internet

posted onAugust 16, 2000
by hitbsecnews

by SiLeRePrAeSes

---------------------------------------------------

The 'Net's purpose, the reason it was designed, was for communication. Of ideas, raw data and a channel for human thought. As we place limits on things such as Napster, we begin to destroy what we have created. The 'Net has changed a great many things.

Commentary on Napster and the Digital Age

posted onAugust 16, 2000
by hitbsecnews

by SiLeRePrAeSes

-----------------------------------------

Digital distribution, is it possible? As Napster has shown, yes it is possible. But Napster is more than just a distribution mechanism. It is a collaborative mechanism. It is something that corporations dream about. Having millions of people all working on the same project, producing. This is what the Internet was designed to do. But can this technique of communication be used for something other than breaking copyright laws?

Opening Simple Ports on Win X

posted onAugust 16, 2000
by hitbsecnews

The first point I should make in this article is that its for newbies. By newbies I mean people with relatively little experience with computers and using a windows machine. Why in the hell write an article about using windows? Well, I have to use one at work, no choice, and since I work 11 hours a day that leaves me little time to play on my SUSE box at home. That said...

Getting Under the GUI

posted onAugust 16, 2000
by hitbsecnews

--

LiquidSphear

Most people accustomed to a GUI cannot understand how anybody can use a computer for day-to-day tasks without using point and click. Well, this article
will explain the reasons why a lot of people choose to not use a GUI and how they get around seeing only text.

---
What the hell are they thinking?

X-Mail

posted onAugust 16, 2000
by hitbsecnews

By: JesterS
( Copyright© 2000 JesterS™ Productions)

WOW! I am on the internet, first cops now this! ... I was smoking
a blunt when this bitch pig pulls me over; "son, wacha smoken there?"
he said. "Some kick ass shit" I replied. He slowly pulled out his club,
It was then that I felt a beat down coming on...but that's another story.

Are you a hacker?

posted onAugust 16, 2000
by hitbsecnews

By: JesterS

What is a hacker? [ Hacker is a term used by some to mean "a clever programmer"
and by others, especially journalists or their editors, to mean "someone
who tries to break into computer systems." ] In my opinion a "hacker"
is a person who dedicates his time to learn how computers and the communication
between computers work. WHAT? You know what a hacker is? "Yeah, it's
a person who does l33t things..." Wrong.

Strategies for Tomorrow's War

posted onJuly 15, 2000
by hitbsecnews

I for one believe that in the next war many tactics will involve computers and
network attacks. Currently the United States is the primary target for attacks utilizing this sort of strategy. We are the most dependent on communications,
and we have the highest currency value in the world. Prices for the new weapons
are very cheap and these can be produced with very little overhead. Even a small
army or terrorist group could afford the dozen technicians needed for a
well-coordinated attack. The following article will describe what I believe