How can you spot a Hacker?

What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …

ATTRITION: Evolution

Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …

Privacy, is it real?

In our daily lives a persons privacy is violated countless times. So many in fact, we tend to catch less and less of them as we become more desensitized. In the making of this …

The History Of Hacking

Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …

Social Engineering

The purpose of this text is to introduce or better explain the art of social engineering. This is one of the most difficult things to explain but I found a rather easy method …

Internet privacy: What are the issues?

It’s Saturday morning and you hop on the Net looking for some info on smoking related illnesses ‘cuz your best friend’s been thinking of quitting lately and …

Spam: The problems with junk e-mail

We all get junk mail at home. It’s an accepted fact of life, at least in the U.S. So why is Unsolicited Commercial Email (UCE) – a/k/a “spam” or …

Assessing IIS Configuration Remotely

This document will look at the relatively unsung skill of assessing the in-depth configuration of a Microsoft IIS web server remotely, showing how to “read” server …

Understanding Security

What is security? Process, procedures, and tools that assure data can be stored reliability and retrieved by those authorised users… Download the paper in PPT format here.