The hacking tag has no wiki summary.
0
votes
2answers
116 views
How the hidden features being find?
Today I read about this news:
http://www.karthikk.net/2013/04/google-glass-has-an-easter-egg-has-pictures-of-the-glass-team/
People found a hidden easter egg in the Google Glass... But how can they ...
0
votes
1answer
914 views
Why are Wordpress sites so easily hacked? [closed]
I have found that hacker can easily hack wordpress site.
I have found this posts related to wordpress site hacking.
1) http://wordpress.org/support/topic/website-hacked-3
2) ...
79
votes
10answers
18k views
Is Ken Thompson's compiler hack still a threat?
Ken Thompson Hack (1984)
Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
13
votes
7answers
802 views
Are all security threats triggered by software bugs?
Most security threats that I've heard of have arisen due to a bug in the software (e.g. all input is not properly sanity checked, stack overflows, etc.). So if we exclude all social hacking, are all ...
3
votes
1answer
132 views
Is this possible to re-duplicate the hardware signal on Linux?
Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
10
votes
5answers
315 views
What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?
At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game ...
0
votes
5answers
1k views
Black Hat Hackers vs Programmers? [closed]
This came up with another question I had here, I have decided on a programming verification system that requires a hardware verification system, a software key, and a name/password system.
Now ...
2
votes
1answer
269 views
Why is iOS “jailbreaking” CPU specific?
Recently, iOS 6 was "jailbroken" but only on the Apple A4 CPU.
Why is the "jailbreaking" process specific to a CPU?
From Wikipedia:
... "iOS jailbreaking is the process of removing the ...
1
vote
1answer
406 views
Belkin device runs Linux, how can I create my own custom firmware for it?
The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?
4
votes
6answers
684 views
Is scanning the ports considered harmful? [closed]
If any application is scanning the ports of other machines, to find out whether any particular service/application is running, will it be considered harmful? Is this treated as hacking?
How else can ...
0
votes
2answers
1k views
What is Perl's relation to hackers? [closed]
I know Perl is a language revered by many hackers (as in hacker vs cracker) and respected by many good programmers for its expressiveness. I also realize it is useful to know and it's very handy at ...
113
votes
27answers
8k views
Is constantly looking for code examples a sign of a bad developer?
I am a CS student with several years of experience in C and C++, and for the last few years I've been constantly working with Java/Objective C doing app development and now I have switched to web ...
5
votes
5answers
347 views
How to shift development culture from tech fetish to focusing on simplicity and getting things done? [closed]
Looking for ways to switch team/individual culture from chasing latest fads, patterns, and all kinds of best practices to focusing on finding quickest and simplest solutions and shipping features.
My ...
13
votes
10answers
2k views
If competition is using 'lingua obscura' for development (why) should I be worried?
I was reading Paul Graham's essay - Beating The Averages (2003) and here's what he had to say:
The more of an IT flavor the job descriptions had, the less dangerous
the company was. The safest ...
2
votes
2answers
425 views
Resources for C/C++ security (whitehat) hacking
I'm currently working as a C++ developer in a software security department, but not as a researcher or whitehat hacker. Security is an interest of mine, mainly in the areas where I can exploit code or ...