Learning to Hack
I already talked with you about online anonymity once, if you didn’t read that you should check that out, but today I’m going to talk about it AGAIN because it’s a very important topic. So anything you do online can be traced back to your IP address, which can then be traced right back to your house and who you are, so if you want a little more privacy on the web you need to mask or change that IP. I already talked about tor so today I’ll talk about proxies. Proxies are servers that you access in between you and your desired web server. This makes your IP address appear to be that server. The easiest way to do this is to go to hidemyass.com and route yourself through their server. They also encrypt the connection for a little extra privacy. There are even better ways to do this but those will wait for another day. If you want to learn more about hacking, internet censorship, and politics then please follow this blog.
Learning how to Hack
Today you are going to learn how to crash a website using a DoS attack. DoS stands for Denial of Service and works by pounding a website’s server with so much data that it crashes. The most famous program for this is called LOIC or Low Orbit Ion Cannon. There are several options in the menu for LOIC that I’ll go over with you. First is threads, that is how many users the program is simulating at once. If you put 1000 into the threads field then the program will simulate 1000 users signing onto the website at once. The other key fields are IP and URL, which is just the target address, and port which should always be set at 80. If you run Mac or Linux then you should try using Java LOIC. Some website servers are to strong to be taken down by a single person. In this situation multiple people can be arranged to attack the same website at once. Working together with enough people at once you can take down any website. To learn more about hacking, internet censorship, and politics, please follow this blog.
Kill your TV
There is a campaign going on right now telling people to lay off on the TV a little bit, the homepage for this campaign says the purpose is to influence people to get up and active. I agree with this campaign but for a different reason. Over %90 of the world media is owned by 6 companies referred to as the big 6. These companies are GE, Walt Disney, News Corp, TimeWarner, Viacom, and CBS. In 2009 these companies combined for an income of over 275.9 BILLION DOLLARS. The largest of these companies, General Electric, had an income of 157 billion dollars. This means that if it were a country it would have a high enough GDP to be in the G-20 summit. We need to kill our TVs world. To learn more about politics, internet censorship, and hacking, please follow this blog.
Operation Black March
Learning to Hack
For the next few days I want to talk about hardware. Today I’ll start with probably the first thing you need to build a computer, a Mother Board (MOBO for short). When buying a MOBO the first of several things you should take into consideration is the number of RAM slot. I would go for at least 4 slots for RAM cards. Next you should consider how many expansion slots there are for things like graphics card. There are several types of expansion slots including PCI, PCI express 1, and PCI express 2. I would have at least one of each of these. Lastly you should already have in mind the CPU you want to use because CPUs use a variety of different sockets in the motherboard so plan ahead. If you want to learn more about hacking, politics, and internet censorship please follow this blog.
Let’s Talk About History
Let’s talk a little but about rough times in American history, then on Monday I’ll connect what I’m saying today to how it connects to us now. First, let’s talk about internment camps. During World War 2 immediately after the Japanese attack on Pearl Harbor all Japanese Americans were told to report to internment camps. These camps were essentially concentration camps without the killing furnaces. The conditions were poor and illness was common. These were destroyed after the war and all the people held within were released. The other thing I wanted to talk about was called REX 84. REX 84 stands for Readiness Exercise of 1984. This was a National Guard drill that simulated an event where similar forms of internment camps would be set up on short notice all across the country to hold US citizens. These may seem like 2 random points but I’ll connect them to what’s going on now on Monday. If you want to learn more about politics, internet censorship, and hacking, please follow this blog.
Partisanship is so Last Year
I’m watching the presidential debates for the republican primary and Gingrich and Romney are tearing each other a new one. It’s ridiculous, they’re in the same party and they’re ripping each other apart. What’s the point of that? That just means even if you do win the primary the nation sees that the GOP is a bunch of idiots arguing with themselves and reelects Obama. It’s not even just partisanship anymore but the parties can’t even work with themselves! This goes for the Democratic party too. The reason most of Obama’s proposed legislations got nowhere was because his own party voted against him! People need to stop voting based on parties and start looking at the issues that matter to them. Finding the candidates that most closely match their views on major issues. America need to take the reigns back and get voting again! If you want to learn more about politics, internet censorship, and hacking, please follow this blog.
Learning to Hack
Today I’m going to go over password cracks because someone recently asked a question about it. There are really two types of password crackers and those are brute force and dictionary. A dictionary cracker uses a huge library of known terms and punches them into the password field to see if any of them work. This normally only takes a few seconds because of how fast computers work but it could take up to a few minutes. The other type, called a brute force cracker uses every possible combination of letters, number, and symbols until it finds the password. This means that depending on the strength of the password it could take anywhere from a few seconds to years for it to find the correct password. This makes this form of cracker virtually useless. The other thing you could do is use a reverse lookup which is something that finds the password based on scrounging through directory files and entering phrases it finds there. If you want to learn more about hacking, politics, and internet censorship please follow this blog.
Learning to Hack
SQL is the final of three languages that I’ll talk about on this blog (the other two would be HTML and java-script). SQL stands for Structured Query Language. It was originally designed in the 70s but is quickly growing into the language of choice for many servers and small websites. This makes it ideal for use on small, independently owned websites that may belong to groups that you’re not a fan of. It is commonly used to organize the directories of an independently owned website, more on that later. To learn more about SQL, HTML, java-script, and internet censorship, please follow this blog.
Can’t Spell Conspiracy without Piracy
These SOPA and PIPA laws have a hidden agenda. The government says that they’re designed to stop piracy, which might be true, but they have another, much more diabolical purpose. These laws are meant to restrict American freedom by policing the internet. Censorship of the internet by the government leads to the people becoming ignorant, which is exactly what they want. They don’t want you to hear radical new ideas, and they don’t want you to think for yourself. Everything they can censor puts them another step closer to that goal. Every censored website, every censored song, every censored book. Don’t let yourself become ignorant. Take back the reigns. Call your local Senators and Representatives. We need to get involved in our government again. Voter participation rates are at an all time low, and that is a very bad thing. For more on internet censorship, and to learn how to combat it, please follow this blog.