Zombie farm, another option, do not kill, but bury it!
A rather interesting situation is obtained - there are two Zombie farms on Vkontakte. Different in content, design, voice acting, gameplay, but with exactly the same name. I must say…

Continue reading →

How to remove a banner from the desktop and from the browser
If you are reading this article, then you must have encountered such a problem as an advertising module or an informer on the monitor of your computer. It is sometimes…

Continue reading →

How to choose a laptop 2019 for work, study, home.
Periodically, we all have to choose and buy laptops. They are our work, rest and entertainment. About every 3 years you are faced with a choice - how to choose…

Continue reading →

Fifteen of the most famous hacker attacks.

The advent of personal computers had a huge impact on society in the late 70s – early 80s .; just at this time, computer technology has decreased sufficiently in size to fit comfortably in homes and called “personal computers” or PCs.
With the increase in the number of users of personal computers, a rather mysterious and peculiar group appeared in society: hackers. The term “hackers”, popularized in 1983 by Newsweek magazine, describes users who prefer to penetrate the “inside” of a computer rather than just use it. Such people are distinguished by mischief and an inquiring mind, individuality and quick wit, as well as a passion for computers and networks. But besides, hackers are a nightmare for network administrators, security services, and even the FBI.
Some hackers have left their mark on the history of computers, becoming idols for a whole class of new users. Let’s look into history and look at these “computer gods” who were able to break into any protection and even challenge the powers that be.
Famous hackers
Adrian Lamo, Kevin Mitnick and Kevin Poulsen Kevin Mitnick The most famous and undoubtedly the most gifted hacker in history – Kevin Mitnick – created his name in 1981 at an early age, as a seventeen-year-old teenager. He became famous for hacking telephone networks, redirecting calls of his own volition. In 1983, Mitnik achieved his first great success – he obtained illegal access to the Pentagon’s computer, for which he was first arrested. Repeatedly committed crimes forced the FBI to start a “hunt” for him. In the 90s, Kevin Mitnik was sentenced to five years in prison, and today he is a security specialist and the owner of his own company, Mitnick Security Consulting. Kevin Poulsen Kevin Poulsen is currently the chief editor of a technical journal “Wired News”, but before it was known for completely different activities. In 1983, when he was also only 17 years old, he began hacking into various networks, which led to several “skirmishes” with the US legal system. Poulsen continued to engage in illegal activities until in April 1991 he was arrested by FBI officers. In 1994, Kevin Poulsen was sentenced to four years in prison.
Adrian Lamo Adrian Lamo certainly drove the largest number of network administrators crazy. Major corporations such as Microsoft, the New York Times, AOL, Sun Microsystems, Yahoo !, MacDonald’s and Cingular have been affected by his activities. He is credited with all types of attacks and violations of the protection of corporate security systems. Lamo circumvented defensive systems with discouraging simplicity. So, during the nightly news broadcast of the NBC television company, the journalist invited Adrian to prove his talent right in front of the camera lens, and then the hacker entered the internal network of the television company in less than five minutes. Lamo is currently a security specialist and enjoys complete freedom of movement after being under the supervision of US authorities for many years.
John Draper Better known as Cap’n Crunch, John Draper was one of the first hackers in history. Such a nickname came from a box of oatmeal under the same name, inside which John once discovered a toy whistle, put there as a gift to lure customers. Draper noticed that the whistle emits a sound with a frequency that matches the frequency of the electric signal accessing the long-distance telephone network. So he decided to use the whistle to crack telephone lines to make free calls. John Draper was arrested in 1976 and sentenced to two months in prison.

Phreaking, the first movement, John Draper. The magic whistle …- John Draper began his “hacking” activity in the late 60s, after he discovered a toy whistle in a box of Cap’n Crunch oatmeal. He found out that such whistles are capable of making a sound with a frequency of 2,600 Hz, exactly the same frequency was used in telephone networks and signaled the activity of the line. Draper was one of the first to master this technique, which was quickly dubbed “phreaking” (from the English. “Phreaking”).
Draper’s method was pretty simple. First, he dialed the long-distance number and, while the call was on, using the whistle sent a signal with a frequency of 2 600 Hz. This signal was similar to that used in telephone networks to report the status of the line. By imitating this signal, Draper let the telephone station know that he had hung up and that the line was free, although in reality the telephone station did not receive a signal corresponding to the hung up telephone.

The instigator of the new movement is Draper’s Whistle. Draper’s criminal activity was uncovered when his telephone company suspected something was wrong with his phone bills. As a result of the investigation, the case was opened, and in 1972, John Draper was arrested.

How to take a screenshot? An integrated approach to solving the problem.
Many computer users probably faced the task when it was necessary to take a screenshot (“photos” of the screen). Often, for these purposes, special programs are used that have wide…

...

Internet
Corbina Telecom, the Russian universal telecom operator, has launched the Internet2 project in Moscow, which will result in the union of Corbina Telecom customers - both those already working with…

...

How to make Microsoft Internet explorer the default browser? Detailed instructions.
It happens that when you start some third-party browser, you accidentally clicked on the "Use by default" button and now you want to make your good old Explorer the default…

...

How to create a website?
To create your website, you don’t need to delve into all the intricacies of web programming to learn such things as HTML, XHTML, CSS, PHP, JavaScript, perl and many other…

...