69:40

Introduction to Hacking
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: November 3, 2010 Length...
published: 12 Dec 2010
Introduction to Hacking
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: November 3, 2010 Length of Class: 68 Minutes Tracks Hacking Prerequisites None Purpose of Class This class gives an overview of what hacking is and what hackers do. Topics Covered What is Hacking and Who are Hackers Legal Questions for "Ethical Hackers" Planning an Attack Ways to Attack Protecting Yourself from Discovery Class Notes What is Hacking and Who are Hackers Hacking is Non Convenenal Ways of Interacting with Systems Hats -- Black is Bad, White is Good, Grey Depends on Who You Ask "Ethical Hacking" -- is more a marketing term then anything else. Reasons Acquire Data Impersonation Destruction Fun Fog of Law Corporate Privacy Policy Who owns the SYSTEM is not the same as who owns the DATA Beware of HIPPA and other Privacy Laws Ways to Attack Physical Physically Enter a Building for Theft or to Open a Breach Gaining Entry to a Building Posing as Computer Tech/ Security Be a Temp Employee Hack systems internally Leave a Device to Allow Hacking into Network Planning Attacks What do you want? Mass Attack is where you go after as many systems as possible. Semi Targeted attacks mean you go after a group of targets. Such as you attack companies that use a specific program. Targeted attacks mean you single out a single company for attack Protecting Yourself You can be tracked, but it's not usually worth their time Hack from an Internet Connection that is unattached to you. Leave no trace on your system <b>...</b>
published: 12 Dec 2010
20:10

Anonymous - Hackers World [HD]
Some attack governments, large corporations... and steal personal identities. Others use t...
published: 25 Jan 2012
Anonymous - Hackers World [HD]
Some attack governments, large corporations... and steal personal identities. Others use their skills for political activism. They are hackers. And in a rare sit down interview with a member of the infamous collective "Anonymous", 16x9 gets a unique, inside look into a "Hackers World".
published: 25 Jan 2012
author: youcefdar
5:17

How to be a Computer Hacker
This tutorial will instruct you on how to be a computer hacker- both visually, and profess...
published: 02 Aug 2011
How to be a Computer Hacker
This tutorial will instruct you on how to be a computer hacker- both visually, and professionally. It's useful for impressing your friends, family, and many more! Not only does it make you look more intelligent, but trust me, you will have people constantly asking to bro out with you because they know you're such a cool guy. Music Used: "Variation on Egmont" incompetech.com Licensed under Creative Commons CC BY 3.0 creativecommons.org
published: 02 Aug 2011
author: protutorialsYT
23:51

Hacking the Windows Registry
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: January 23, 2012 Length...
published: 23 Jan 2012
Hacking the Windows Registry
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: January 23, 2012 Length of Class: 23 Minutes Tracks Hacking Computer Security /Integrity Computer Repair Prerequisites Basic knowledge of Windows system administration. (You should know how to reinstall Windows in case you kill your computer.) Purpose of Class This class teaches students how to easily modify the registry to enable and disable important Windows tools and change system configurations. Chapters Introduction (00:00) Overview (02:06) Demonstration (09:08) Final Thoughts (21:15) Class Notes Introduction The Registry contains 90% of the configuration information for Windows and installed programs The Registry can be easily changed using the REGEDIT tool For basic tasks you can "paint by numbers". Simply do a Google search for what you are tryng to accomplish, and follow the instructions EXACTLY. Overview Settings in the Registry are called KEYS There are different types of KEYS, but you don't have to worry about it (Paint by Numbers) The Operating System will respond to new keys that you create that may not already be in the Registry. You can export Keys to .REG files. These are Text files that can be opened and edited in Notepad Double Clicking a .REG file will make the Operating System try to Import the Keys into the Registry You can have multiple Keys in one .REG file Final Thoughts... BE CAREFUL / READY TO REINSTALL YOUR OS! It is VERY easy to crash your computer when you are playing with <b>...</b>
published: 23 Jan 2012
author: elithecomputerguy
19:59

Hak5 WiFi Hacking Workshop Part 1.1
This time on the show, part 1 of our WiFi from-the-ground-up series. Darren presents a wir...
published: 19 Jul 2012
Hak5 WiFi Hacking Workshop Part 1.1
This time on the show, part 1 of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco. If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out www.revision3.com Whether you're a beginner or a pro, www.revision3.com is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more. And let's not forget to mention that you can follow us on www.twitter.com and www.facebook.com revision3.com to the show and get all your Hak5 goodies, including the infamous wifi-pineapple over at hakshop.com . If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.
published: 19 Jul 2012
author: Hak5Darren
1:45

Hacking Tip: Trace IP addresses to a location
This video will show you how you can trace IP address or websites to a specific location....
published: 19 Jun 2008
Hacking Tip: Trace IP addresses to a location
This video will show you how you can trace IP address or websites to a specific location.
published: 19 Jun 2008
author: gigafide
10:43

Voting machines hacked; can a paper trail stop election fraud?
It seems that in every presidential election reports surface of election fraud. Many Ameri...
published: 05 Oct 2012
Voting machines hacked; can a paper trail stop election fraud?
It seems that in every presidential election reports surface of election fraud. Many Americans feel that some sort of proof stating who you voted for will help curb rigging an election. According to a study, Diebold voting machines can easily be hacked and could alter the outcome of an election. So what can we do to stop this from happening? Roger Johnston, a member of the vulnerability asset team for Argonne National Lab and Howard University Professor, Wilmer J. Leon, give us there take on the issue. Like us and/or follow us: twitter.com www.facebook.com
published: 05 Oct 2012
author: RTAmerica
11:48

Hacker for hire: America's most wanted hacker speaks out
American companies are taking preemptive measures to counter potential attacks from would-...
published: 20 Jun 2012
Hacker for hire: America's most wanted hacker speaks out
American companies are taking preemptive measures to counter potential attacks from would-be hackers. The Strikeback technology is used to distract or delay hacking attempts that could mean trouble for the company being targeted. The process entails luring cyber criminals into pseudo- systems to catch them. Kevin Mitnick, author of Ghost in the Wires, joins us on why he turned hacker for hire and offers us his insight on cyberterrorism and the Anonymous collective. Like us and/or follow us: twitter.com www.facebook.com
published: 20 Jun 2012
author: RTAmerica
4:51

Hacking Tip: How To Use Proxies
Proxies are great for surfing the web anonymously. This video will show you how to set up ...
published: 20 Jul 2011
Hacking Tip: How To Use Proxies
Proxies are great for surfing the web anonymously. This video will show you how to set up them up and use them. Proxify - proxify.com HideMyAss - http WhatIsMyIPAdress - whatismyipaddress.com Foxy Proxy - https Proxy Switchy - chrome.google.com Tor Project - www.torproject.org IP Hider - http Tutorial on using IP Hider - www.youtube.com
published: 20 Jul 2011
author: gigafide
2:43

The Resident -- Could Republicans hack the Presidential election?
Many Americans anticipate the 2012 Presidential election to be a tight race, but what if t...
published: 20 Oct 2012
The Resident -- Could Republicans hack the Presidential election?
Many Americans anticipate the 2012 Presidential election to be a tight race, but what if the companies behind the voting machines on Election Day have strong political ties with Republicans? Lori Harfenist of The Resident takes to the streets of New York City to ask if Mitt Romney could steal this election? See more at www.theresident.net
published: 20 Oct 2012
author: RTAmerica
50:09

The Secret History Of Hacking
The secret History of Hacking is a public domain documentary about the pioneers of the hac...
published: 21 Dec 2010
The Secret History Of Hacking
The secret History of Hacking is a public domain documentary about the pioneers of the hacking craze. This movie along with many others can be found at sites such as internetarchive.org and publicdomainflicks.com
published: 21 Dec 2010
author: John Mcnabb
2:44

UK blocks 'UFO-hacker' Gary McKinnon US extradition
Home Secretary Theresa May has announced that Gary McKinnon, who was accused of hacking in...
published: 16 Oct 2012
UK blocks 'UFO-hacker' Gary McKinnon US extradition
Home Secretary Theresa May has announced that Gary McKinnon, who was accused of hacking into the Pentagon's computer network, will not be extradited to the US. The move is due to the risk of McKinnon ending his own life - READ MORE on.rt.com RT LIVE rt.com Subscribe to RT! www.youtube.com Like us on Facebook www.facebook.com Follow us on Twitter twitter.com Follow us on Google+ plus.google.com RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 500 million YouTube views benchmark.
published: 16 Oct 2012
author: RussiaToday
66:34

Tribute to UFO Hacker Gary Mckinnon October 16, 2012 Extradition to US Blocked! UfoDisclosure2012
freegary.whynotnews.eu & http - disclosureproject.org ~sub youtube.com & youtube.c...
published: 16 Oct 2012
Tribute to UFO Hacker Gary Mckinnon October 16, 2012 Extradition to US Blocked! UfoDisclosure2012
freegary.whynotnews.eu & http - disclosureproject.org ~sub youtube.com & youtube.com & youtube.com Gary McKinnon extradition to US blocked by Theresa May: goo.gl Gary McKinnon has won his 10-year battle against extradition to the US after Home Secretary Theresa May stepped in to halt proceedings. Self-confessed computer hacker from north London cannot be sent to the US to face trial due to fears for his health, Mrs May told the Commons. She also announced a shake-up for the UK's extradition arrangements, introducing a so-called forum bar which will allow a UK court to decide if a trial should be brought here instead. Mr McKinnon suffers from Asperger's syndrome - a high-functioning form of autism, admits hacking into US military computers but claims he was looking for evidence of UFOs. 46-year-old could have faced up to 60 years in prison in America if convicted. Mrs May has taken the highly unusual step of blocking the application after Home Office medical evidence found he was very likely to attempt suicide if he was extradited. She told MPs: "Mr McKinnon is accused of serious crimes but there is also no doubt that he is seriously ill. He has Asperger's syndrome, and suffers from depressive illness. "The legal question before me is now whether the extent of that illness is sufficient to preclude extradition. "After careful consideration of all of the relevant material, I have concluded that Mr McKinnon's extradition would give rise to such a high risk of him ending his <b>...</b>
published: 16 Oct 2012
author: women4truth
Youtube results:
4:13

How To Hack Wireless
This video shows one method of hacking a wireless WEP connection and gives you some tips o...
published: 28 Jan 2010
How To Hack Wireless
This video shows one method of hacking a wireless WEP connection and gives you some tips on how to better secure your wireless. WEBSITES: www.backtrack-linux.org http TERMINAL COMMANDS: Startx /etc/init.d/networking start airmon-ng airmon-ng stop [wireless card name] airmon-ng start [wireless card name] airmon-ng airodump-ng [wireless card name] ctrl c airodump-ng w wep c [channel number] bssid [Bssid number] [wireless card name] aireplay-ng -1 0 a [bssid] [wireless card name] aireplay-ng -3 b [bssid][wireless card name] ctrl + c dir aircrack-ng [filename]
published: 28 Jan 2010
author: gigafide
81:58

Hacking Democracy - Full Length
Jesus Christ is Lord. Confess and Repent with your mouth and you will be saved. When you c...
published: 13 Oct 2011
Hacking Democracy - Full Length
Jesus Christ is Lord. Confess and Repent with your mouth and you will be saved. When you can't control the Politicians or the voters, then you control the counting! Go back to paper votes and we will have a President that was voted in! PS This movie is called "Hacking Democracy" because voting is a democratic process. They makers are aware that the US was founded as a Constitutional Republic. truthseekertimes.ca
published: 13 Oct 2011
author: TruthSeekerTImes Ca
4:41

LIFE HACKING!
ALTERNATE SCENE & BLOOPERS: bit.ly WATCH THIS EPISODE EN ESPAÑOL: youtu.be OUR ...
published: 20 Jul 2012
LIFE HACKING!
ALTERNATE SCENE & BLOOPERS: bit.ly WATCH THIS EPISODE EN ESPAÑOL: youtu.be OUR NEW CARTOON SERIES: youtube.com Anthony and Ian program buttons to hack real life and do whatever they please. ------------------------------------ Hey it's our very own website: smosh.com Oh and our Facebook page facebook.com Want to know when we're filming and/or pooping? Now you can: twitter.com
published: 20 Jul 2012
author: smosh
26:36

Hackers: Wizards of the Electronic Age
Steve Wozniak, Andy Hertzfeld, Bill Atkinson, Lee Felsenstein, Richard Stallman, Richard G...
published: 03 Mar 2011
Hackers: Wizards of the Electronic Age
Steve Wozniak, Andy Hertzfeld, Bill Atkinson, Lee Felsenstein, Richard Stallman, Richard Greenblatt, Steven Levy and others. Hackers is a classic documentary about the midnight programmers that created the personal computer revolution. Hackers is not about malicious code-crackers. It is about a "hacker ethic" that led to major breakthroughs in technology, and forever changed our world. From the first MIT hackers to popular Silicon Valley inventors, this program covers this fascinating cultural phenomenon through interviews with twelve of its early pioneers. Hackers was produced over a decade before the advent of the Internet. All interviews were shot over a long week-end in 1984, at the first Hackers Conference, hosted by Whole Earth Catalog editors Stewart Brand and Kevin Kelley, in Sausalito, California.
published: 03 Mar 2011
author: Austerlice