As most of you already know, Infinity Exists’ Full Disclosure Ep. 2 Wep Cracking was featured on CBS’s 60 Minutes “High-Tech Heist” for about 10 seconds. Those few seconds on Nation Television gave us about 40,000 hits on YouTube, and about 750 unique hits on InfinityExists.com. Weeks after the 60 minutes episode aired Infinity Exists is still getting an average of 300 unique hits a day. This is pretty good compared to our 200 hit average before.
However, 60 Minutes brought Infinity Exists to the attention of a few unwanted people. For Example:
People that do not understand what it is to be a hacker, just simply think we are criminals. A Hacker truly is a computer enthusiast that enjoys exploring various computer systems in the pursuit to gain more knowledge. A hacker’s goal is never to harm anyone or anything as the media would like you to believe. The goal of Infinity Exists’ video series Full Disclosure is to inform people about specific security flaws. If there was no one to disclose this information to the general public then everyone would still being using insecure technology and would be at the mercy of criminal crackers.
Search Hacking Mode Trick Updates
The 60 Minutes Effect
Subscribe to:
Post Comments (Atom)
Post Friends Link
CATEGORY
- aircrack (1)
- Airdecloak-ng (1)
- AiroWizard (1)
- Airtun-ng (1)
- Application Patching (1)
- Arpwatch (1)
- backtrack (23)
- Backtract DOWNLOAD (2)
- Beer Pong Table (2)
- Bluetooth (2)
- Cain (1)
- cracking (2)
- Download Airowizard Manual (1)
- Dual Boot (1)
- Easside-ng (1)
- Email Spoofing (1)
- Ettercap (1)
- Exploit Hacking (1)
- Fast-Track (1)
- Gateway (1)
- Generator (1)
- hacking (26)
- Hacking Basics (1)
- handphone (8)
- HUAWEI (1)
- Huawei EC506 (1)
- Injection (1)
- Intel Wireless Wi-Fi 5100 Card injection OK (2)
- Introduction (1)
- Local Password Cracking (1)
- Lock Picking (3)
- Lock Picking Basics (1)
- McAfee (1)
- Metasploit Autopwn (1)
- nokia (1)
- Packet Injection wifi Intel 4965 AGN (1)
- Packetforge-ng (1)
- Panen Password (1)
- Password (1)
- phising (1)
- phone hacking (3)
- Phone Phreaking (1)
- Recovering an Acer Computer (1)
- SIUC’s Network (1)
- Sniffing VoIP (1)
- Snipper (2)
- Spoonwep2 (1)
- Sql Injection (3)
- ssldump (1)
- Staying Secure - SSH Tunnel (1)
- t (1)
- TCP / IP (3)
- The 60 Minutes Effect (1)
- Tkiptun-ng (2)
- Tool Spoonwpa Wpa Key (1)
- trik (12)
- Triple Boot (1)
- tutorial (9)
- ubuntu (1)
- usb (2)
- USB Worm (Jamesgo.dll) (1)
- video (10)
- Website Hacking (2)
- Wesside-ng (1)
- Wi-Fi (9)
- windows (5)
- wireless (9)
- Wireless 3945ABG (2)
- WPA (1)
- WPA wireless encryption cracked (1)
- XSS Tunnel (1)
Archive
-
▼
2008
(105)
-
▼
December
(48)
- Wireless Hacking - Cracking WEP
- Wireless Hacking - DeAuth
- Lock Picking - Bump Key
- Phone Phreaking - Beige Box
- Phone Phreaking/Network Hacking - Sniffing VoIP
- Lock Picking - DIY Padlock Shims
- Lock Picking - Mult-Disc Combo Locks
- Local Privilege Escalation Vulnerability in Cisco ...
- Hacking Basics - MD5
- Website Hacking - Sql Injection
- Hacking Basics - Backtrack
- How to use Intel Pro/Wireless 3945ABG in Backtrack 2
- How to use Intel Pro/Wireless 3945ABG in Backtrack 2
- Sql Injection Challenge!
- Sql Injection Challenge How-to
- SIUC’s Network
- Infinity Exists Featured On 60 Minutes
- Website Hacking - XSS
- The 60 Minutes Effect
- Exploit Hacking
- USB Worm (Jamesgo.dll)
- Staying Secure - SSH Tunnel
- Wireless Hacking - Cracking WPA
- Singing Tesla Coil
- McAfee SiteAdvisor
- Tapping a 66 Block Telephone Network Interface
- Triple Boot - Windows, Backtrack, & Ubuntu
- Dual Boot - Windows & Backtrack
- Local Password Cracking
- Introduction
- Lock Picking Basics
- Email Spoofing
- Metasploit Autopwn
- Recovering an Acer Computer
- Application Patching
- Ettercap
- Windows SMB Relay Exploit
- Beer Pong Table
- Beer Pong Table
- XSS Tunnel
- Password Phishing
- Bypass Cisco Clean Access & Cisco NAC Appliance
- Manipulating Windows User Accounts
- Manipulating Windows User Accounts
- Episode 12 - Hacking Basics - Backtrack
- List of compatible adapters BackTrack
- Perintah untuk Hacking Wi Fi (BackTrack)
- Hacking tools: A new version of BackTrack helps et...
-
▼
December
(48)
0 comments:
Post a Comment