Ur wireless 902.11 networks are belong to us
The second issue is that so called reputable companies (such as Network Solutions) are posting your searches for domain names, so that above unscrupulous companies can register them before you can.
No lists of iPhone hacks here – there are plenty of them, there shouldn’t be any trouble at all finding them on internet. However, because the OS restore disks came in 2 flavours, part encrypted, part unencrypted, they’ve managed to hack the standard root password out of it allready:
Alpine
Have fun. I still love my Treo. When is Palm going to give me the stuff I want?!
LOLCODE.
Clean syntax, consistent capitalization and Internet ready. It’s the language for the new web, baby.
HAI CAN HAS STDIO? I HAS A VAR IM IN YR LOOP UP VAR!!1 VISIBLE VAR IZ VAR BIGGER THAN 10? KTHXBYE IM OUTTA YR LOOP KTHXBYE
It’s been known for a while that CRT monitors leak radiation which makes them easily duplicable on an external monitor, leading to insane amounts of shielding.
Now it’s the LCD’s turn.
Markus Kuhn has a few other interesting articles on his own site.
I’ve known that WEP encryption still used to protect a lot of WiFi (wireless connections) was crackable in around 15 minutes, but these papers describe how to do it in under 60 seconds – the fastest attack I’ve found to date!
The Original paper by Tews, Weinmann and Pyshkin (pdf)
The tool (aircrack-ptw) to do it with.
The lesson? Use WPA