March 4th, 2007 SkyHorse
WordPress, the software powering thousands of weblogs on the web, has recently seen it’s download files modified by an unknown “cracker” who changed the code to include code enabling those in the know to gain access to the websites running such software.
Only version 2.1.1 was affected.
WordPress â€º Blog Â» WordPress 2.1.1 dangerous, Upgrade to 2.1.2
October 4th, 2006 SkyHorse
This has to be the most disgusting marketing strategy since the dawn of forehead tattoos:
Dedicated Hosting Companies Â» Blog Archive Â» Hacked by my host! Be Careful!
Who’s watching the watchers?
September 19th, 2006 SkyHorse
Banksy is to Art as Hackers are to I.T.Is Banksy a Hacker? Absolutely.
His own words resume his style:
The time of getting fame for your name on its own is over.
Artwork that is only about wanting to be famous will never make you famous.
Any fame is a by-product of making something that means something.
You don’t go to a restaurant and order a meal because you want to have a shit.
September 3rd, 2006 SkyHorse
I’ve updated the modsec.sh script to include some new rules from gotroot.com.
Check out its new permanent page at http://www.skyhorse.org/web-server-administration/auto-update-modsecurity-rules-modsecsh/
August 14th, 2006 SkyHorse
Not a new concept, but the relationship between traditional mysticism (eastern and western) and computer hacking is more compelling than it may look like at first glance.
Mke Murray’sÂ “Hacking the Mind” talk at HOPE this year just proves my point.
As they put it:
Â The similarities between the methods used to exploit a computer network and the language patterns involved in hypnosis and neuro linguistic programming (NLP) are striking. In this talk, nCircleâ€™s director of vulnerability research Mike Murray (who is also a Master NLP practitioner and certified clinical hypnotherapist) will demonstrate the use of hypnotic language patterns, metaphors, and other patterns of influence, as well as showing how a good hypnotist structures inductions in a similar way to the methods of a skilled computer hacker. Hypnotic analogues to buffer overflows, shellcode, and other types of computer attacks will be demonstrated, leaving the audience with a deeper appreciation for language patterns and their effect on the human mind.
Read more at Eric Nehrlich blog