December 27th, 2007 11:23 PM
Well, now you know :)
Seriously don't try this at home. Obviously in this video sudo was used because this was a debian...
November 27th, 2007 01:31 AM
1) Delete all files
3) Block device manipulation
6) Decompression bomb
November 27th, 2007 01:21 AM
Thanks guys for the foollowups
November 22nd, 2007 05:21 PM
The following is a list of rules and tips you might find useful in dealing with basic security concerns:
1) Avoid doing your regular jobs when you are logged in as root. This reduces the risk of...
September 26th, 2007 03:04 AM
Vulnerability scanner does automated search for security weaknesses in web applications, computers and theirs services and reports them in details about possible vulnerabilities and probable defense...
September 13th, 2007 03:16 AM
I have compiled a list of five easter eggs that I came accross over time. Ofcourse none of them are original and most of them has been around for as long as you can remember but I though it would be...
August 15th, 2007 01:47 AM
Top 20 Movies about Computer Hacking And Geeks