Is YOUR Network Secure?

Scenario As the Senior Executive of a major business, you know one thing that has to be accomplished now; your company needs to get on the Internet. You do not know why, but …

lkm: Kernel hacking made easy

The following applies to the Linux i86 2.0.x kernel series. It may also be accurate for previous releases, but has not been tested. 2.1.x kernels introduced a bunch of …

Console IOCTLs Under Linux

Console IOCTLs can be very useful and powerful. These are the IOCTls that involve the console. They are the user interface to manipulation of the console. I am going to go …

Which hat are you?

It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …

How can you spot a Hacker?

What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …

ATTRITION: Evolution

Definition Attrition.org is a non-profit hobby site run by a handful of volunteers in their free time. Each staff member at Attrition has a day job that takes a considerable …