Please turn on your JavaScript for this page to function normally.
Powerpuff Girls DVD Struck Down By Funlove

Sophos has learnt that a DVD from Warner Bros featuring new cartoon stars, the Powerpuff Girls, is infected by the FunLove virus. If the disc – called ‘Meet the …

F-Secure warns about Nimda.E network worm

F-Secure Corporation (HEX:FSC) is alerting computer users worldwide about a new version of the infamous Nimda worm. Nimda.E has been modified probably by the original author …

Sophos- Virus Top Ten for October 2001

This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus …

Console IOCTLs Under Linux

Console IOCTLs can be very useful and powerful. These are the IOCTls that involve the console. They are the user interface to manipulation of the console. I am going to go …

Which hat are you?

It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …

How can you spot a Hacker?

What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …

ATTRITION: Evolution

Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …

Your Opinion: “What are the current privacy threats?”

In 2001 we held a survey on HNS regarding the current privacy threats. Many visitors decided to share their opinions with us, thank you. Listed below are some of the most …

Privacy, is it real?

In our daily lives a persons privacy is violated countless times. So many in fact, we tend to catch less and less of them as we become more desensitized. In the making of this …

The History Of Hacking

Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …

Social Engineering

The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …

Legislating the Internet – The nightmare has arrived

THE REGULATION OF INVESTIGATORY POWERS BILL, 2000 “Government is too secretive. Too many decisions are taken behind closed doors without proper consultation with the …

Don't miss

Cybersecurity news