256 Kilobytes

Hacking the Government

Type All Category Hacking the GovernmentContent about hacking the US government, such as how to steal computercoins from the US Mint. Tag All

Profile Photo - Hash Brown

How I used PHP skills and social engineering to get unbanned from a gay club

Articles in Hacking the Government | By Hash Brown

Published | Last Update 📌

Profile Photo - Hash Brown

Not your usual post, but real none the l...

MoreI am a man who likes to pour the fuck up, and when I pour up at a high enough level I do things such as: throw bottles from a 12th floor balcony...
🗨 0
🐏 1
👁 1,607
Profile Photo - Five Dollars

How to hack Cookie Clicker?

Answers in Hacking the Government | By Five Dollars

Published

Profile Photo - Default

Last ReplyOh the great game consist of great players. I think i have been through almost 200 website for searching gta5 cheat codes, and surprisingly i have bee... lita951,

Oh the great game consist...

Fri, 27 Mar 2020 11:26:16 -07008 months ago1
🗨 8
🐏 0
👁 891
Profile Photo - Some Guy

How to hack a DSI?

Answers in Hacking the Government | By Some Guy

Published

Profile Photo - Hash Brown

Last ReplyJohn why don't you stop being gay and actually contribute to the forum? Grow an actual audience around you within a larger community and profit that w... Hash Brown,

John why don't you stop b...

Thu, 14 Nov 2019 15:13:33 -08001 year ago1
🗨 3
🐏 0
👁 556
Profile Photo - Huevos Rancheros

The Insane, Unholy Life of John McAfee – A Biography

Articles in Information Security | By Huevos Rancheros

Published | Last Update

Profile Photo - Huevos Rancheros

Last ReplyAfter our dear Terry A Davis, the CIA is now officially after McAfee. The CIA has attempted to collect us. We are at sea now and will report more s... Huevos Rancheros,

After our dear Terry A Da...

Fri, 19 Jul 2019 13:52:05 -07001 year ago1
🗨 8
🐏 2
👁 8,868
Profile Photo - August R. Garcia

Busting reCaptcha Myths: Reverse Engineering Anti-spam Algorithms and Examining Existing Research in Realistic Contexts

Articles in Hacking the Government | By August R. Garcia

Published | Last Update

Profile Photo - August R. Garcia

Last ReplyThe .tar.gz of sorted reCaptcha photos has been moved to this URL on the 256 Kilobytes server, since the old link expired: https://www.256kiloby... August R. Garcia,

The .tar.gz of sorted reC...

Sat, 08 Jun 2019 01:29:54 -07001 year ago1
🗨 1
🐏 3
👁 2,837
Profile Photo - Some Guy

Why is bank mode not working in Avast Safe Zone?

Answers in Information Security | By Some Guy

Published

Profile Photo - Univa

Last ReplyBank Mode provides a virtual desktop which acts as a safe and clean PC within your real PC. This protects against a potentially hijacked host or netwo... Univa,

Bank Mode provides a virt...

Sun, 26 May 2019 11:22:02 -07001 year ago1
🗨 1
🐏 0
👁 449
Profile Photo - Some Guy

Should I disable Port Scan and DoS Protection?

Answers in Information Security | By Some Guy

Published

Profile Photo - Univa

Last ReplyPort scan is An attack that sends client requests to a range of TCP port addresses on a host, with the goal of finding an active port and exploiting a... Univa,

Port scan is An attack th...

Sun, 26 May 2019 11:16:24 -07001 year ago1
🗨 1
🐏 0
👁 1,311
Profile Photo - Hash Brown

Spoofing Browser URL Previews

Articles in Unintended Behavior and Exploits | By Hash Brown

Published

Profile Photo - Hash Brown

Last Reply> muh right click -> open in new tab / mousewheel click. There's plausibly some workaround for that. IDK LOL Why would you even do that Hash Brown,

> muh right click...

Wed, 22 May 2019 13:41:17 -07001 year ago1
🗨 3
🐏 2
👁 656
Profile Photo - IncstedibleMrE1
Profile Photo - Default

Last Replyeasiest just throw the computer in your trash teh man,

easiest just throw the co...

Thu, 25 Apr 2019 12:34:06 -07001 year ago1
🗨 4
🐏 0
👁 546
Profile Photo - August R. Garcia

3.5 Web Dev Security Considerations You Didn’t Know About

Articles in Hacking the Government | By August R. Garcia

Published | Last Update

Profile Photo - August R. Garcia

Despite the obscene amounts of time that...

MoreDespite the obscene amounts of time that goes into computer security, there are always new computer security vulnerabilities, bugs, and exploits being...
🗨 0
🐏 0
👁 7,217
Profile Photo - Some Guy

Got the error "Ping transmit failed. General failure"?

Answers in Information Security | By Some Guy

Published

Profile Photo - Univa

Last ReplyIf the default gateway entry is missing, the message “General failure” could appear. This happens, when the computer tries to reach a host... Univa,

If the default gateway en...

Tue, 16 Apr 2019 07:32:48 -07001 year ago1
🗨 1
🐏 0
👁 529
Profile Photo - August R. Garcia

Client-Side Input Validation Exploit in KK-Star Ratings Plugin

Articles in Unintended Behavior and Exploits | By August R. Garcia

Published | Last Update

Profile Photo - August R. Garcia

The KK-Star Ratings plugin is one of the...

MoreThe KK-Star Ratings plugin is one of the easiest ways to implement structured data to show star ratings next to posts, which I’ve used on WordPr...
🗨 0
🐏 0
👁 3,333
Profile Photo - Some Guy

How to block websites on router?

Answers in Unintended Behavior and Exploits | By Some Guy

Published

Profile Photo - roxblade

Last ReplyThere is no need for you to spend money on net-monitoring websites to block certain sites. Your router can be used to block unencrypted websites. On t... roxblade,

There is no need for you...

Thu, 04 Apr 2019 07:39:29 -07001 year ago1
🗨 2
🐏 0
👁 401
Profile Photo - Five Dollars
Profile Photo - zeshelton

Last ReplyEssentially it can be enacted in several ways, one way is to have a database, or a huge list, of common passwords, and one by one tell their program t... zeshelton,

Essentially it can be ena...

Sat, 30 Mar 2019 16:09:31 -07001 year ago1
🗨 1
🐏 0
👁 431
Profile Photo - Some Guy

How to tell if you are being ddos'ed?

Answers in Information Security | By Some Guy

Published

Profile Photo - amifriskin

Last ReplyFocus on tracking normal activity so you can recognize if anything is a unusual. Improve you capacity so it is high enough to carry the load for optim... amifriskin,

Focus on tracking normal...

Sat, 30 Mar 2019 16:05:35 -07001 year ago1
🗨 1
🐏 0
👁 428
Profile Photo - Some Guy

How to DDoS someone with their IP?

Answers in Information Security | By Some Guy

Published

Profile Photo - -alxl_

Last ReplyA DDOS is short for a distributed denial of service. A DOS - denial of service is when a service is made unavailable usually through flooding the serv... -alxl_,

A DDOS is short for a dis...

Sat, 30 Mar 2019 15:56:19 -07001 year ago1
🗨 1
🐏 0
👁 438
Profile Photo - Ethan
Profile Photo - -alxl_

Last ReplyThere is a couple ways of answering this question and it can be complicated. Rather than talking about password guessed/cracking per second, it is bet... -alxl_,

There is a couple ways of...

Sat, 30 Mar 2019 15:38:29 -07001 year ago1
🗨 1
🐏 0
👁 339
Profile Photo - The Big Bad Wolf
Profile Photo - Zhaybib

Last ReplyThere are some people who solve CAPTCHAS as a job and this is meant to weed out bots. People of any ethnicity are involved in this type of work. Zhaybib,

There are some people who...

Sat, 30 Mar 2019 15:28:49 -07001 year ago1
🗨 1
🐏 0
👁 356
Profile Photo - Some Guy

How to get around OpenDNS?

Answers in Information Security | By Some Guy

Published

Profile Photo - thegstocersson

Last ReplyThere are a lot of different opinions on this. After reading a lot of different pages on this subject I believe this one is the easiest to follow. htt... thegstocersson,

There are a lot of differ...

Sat, 30 Mar 2019 15:21:57 -07001 year ago1
🗨 1
🐏 0
👁 453
Profile Photo - Some Guy

Where does Avast store boot scan log?

Answers in Information Security | By Some Guy

Published

Profile Photo - Graln_of_Truth

Last ReplyYou can find it by going to C:ProgramDataAVAST SoftwareAvasteport and the file you're looking for should be called "aswBoot". If you need more help r... Graln_of_Truth,

You can find it by going...

Sat, 30 Mar 2019 15:18:53 -07001 year ago1
🗨 1
🐏 0
👁 408
Profile Photo - Some Guy

What does "receptacle blocked" mean?

Answers in Information Security | By Some Guy

Published

Profile Photo - -alxl_

Last ReplyIt most likely means they couldn't get to the Mail Box to drop off the letter. Someone may have parked/blocked the front of the mail box or there was... -alxl_,

It most likely means they...

Sat, 30 Mar 2019 15:04:19 -07001 year ago1
🗨 2
🐏 0
👁 437
Profile Photo - Your Dad

How to bypass "I'm not a robot" captcha?

Answers in Hacking the Government | By Your Dad

Published

Profile Photo - -alxl_

Last ReplyHere is some things to try: Assuming the captcha is the Google captcha, you may be able to by pass the captcha using Google Chrome. You may need to lo... -alxl_,

Here is some things to tr...

Sat, 30 Mar 2019 14:53:47 -07001 year ago1
🗨 1
🐏 0
👁 369
Profile Photo - VectorMan
Profile Photo - -alxl_

Last ReplyYes, working with a Captcha in foreign languages can be difficult with the languages. Refer to this thread on Reddit about PS02 that give some strateg... -alxl_,

Yes, working with a Captc...

Sat, 30 Mar 2019 14:49:58 -07001 year ago1
🗨 1
🐏 0
👁 719
Profile Photo - Some Guy

What can people do with your IP address?

Answers in Information Security | By Some Guy

Published

Profile Photo - w3nsi012

Last ReplyThey can't get any info from just your IP address, the only thing anyone can do it leach off your power and slow your connectivity down. w3nsi012,

They can't get any info f...

Sat, 30 Mar 2019 14:44:58 -07001 year ago1
🗨 1
🐏 0
👁 390
Profile Photo - Some Guy

Enable IPSec pass through?

Answers in Information Security | By Some Guy

Published

Profile Photo - Zhaybib

Last ReplySince you want to make sure you are doing everything right in terms of enabling IPSec pass through, make sure that you check out here, https://www.tom... Zhaybib,

Since you want to make su...

Sat, 30 Mar 2019 14:42:03 -07001 year ago1
🗨 1
🐏 0
👁 378
Profile Photo - IncstedibleMrE1

How do captcha breakers work?

Answers in Hacking the Government | By IncstedibleMrE1

Published

Profile Photo - KacssPL

Last ReplyThe captcha breaker isn't actually trying to figure out what the captcha is, but more how it processes the captcha and making it simpler. The main goa... KacssPL,

The captcha breaker isn't...

Sat, 30 Mar 2019 14:37:11 -07001 year ago1
🗨 1
🐏 0
👁 374
Profile Photo - Some Guy

How to fix MalwareBytes Real Time Protection?

Answers in Information Security | By Some Guy

Published

Profile Photo - Zhaybib

Last ReplySince you say you have limited skills in fixing Malware, you should check out this site here that will tell you how to fix MalwareBytes Real Time Prot... Zhaybib,

Since you say you have li...

Sat, 30 Mar 2019 14:35:27 -07001 year ago1
🗨 1
🐏 0
👁 355
Profile Photo - rfc1385

How does Supreme's Captcha work?

Answers in Hacking the Government | By rfc1385

Published

Profile Photo - KacssPL

Last ReplyIt uses google's captcha system and is used to prevent any bots or spammers that are trying to "checkout" from the website. KacssPL,

It uses google's captcha...

Sat, 30 Mar 2019 14:31:47 -07001 year ago1
🗨 1
🐏 0
👁 340
Profile Photo - Some Guy

How to open port 25565?

Answers in Information Security | By Some Guy

Published

Profile Photo - Graln_of_Truth

Last ReplyIf you want to port forward, you'll need to access your router configuration page and head to the Port Forwarding tab. To find the URL and login info... Graln_of_Truth,

If you want to port forwa...

Sat, 30 Mar 2019 14:19:51 -07001 year ago1
🗨 1
🐏 0
👁 344
Profile Photo - Some Guy

Windows firewall log viewer?

Answers in Information Security | By Some Guy

Published

Profile Photo - Zhaybib

Last ReplySince you are wondering about how to protect your information on your computer, you can find out how to look at the windows firewall log viewer here,... Zhaybib,

Since you are wondering a...

Sat, 30 Mar 2019 14:18:02 -07001 year ago1
🗨 1
🐏 0
👁 375