256 Kilobytes

Hacking the Government

Type All Category Hacking the GovernmentContent about hacking the US government, such as how to steal computercoins from the US Mint. Tag All

Profile Photo - Hash Brown

How I used PHP skills and social engineering to get unbanned from a gay club

Articles in Hacking the Government | By Hash Brown

Published 1 month agoWed, 29 May 2019 19:59:57 -0700 | Last update 1 month agoWed, 29 May 2019 20:00:49 -0700 📌

Profile Photo - Hash Brown

Not your usual post, but real none the l...

MoreI am a man who likes to pour the fuck up, and when I pour up at a high enough level I do things such as: throw bottles from a 12th floor balcony...
🗨
0
🐏
1
👁
536
Profile Photo - Huevos Rancheros

The Insane, Unholy Life of John McAfee – A Biography

Articles in Information Security | By Huevos Rancheros

Published 4 months agoTue, 19 Feb 2019 16:48:34 -0800 | Last update 4 months agoThu, 28 Feb 2019 14:16:01 -0800

Profile Photo - Hash Brown

Last Reply Hell yeah John. This is what the world needs, a man who was pump and dumping crypto to make a trading platform. Hash Brown,

Hell yeah John.

Wed, 12 Jun 2019 13:31:18 -0700 1 month ago
🗨
7
🐏
2
👁
4,177
Profile Photo - August R. Garcia

Busting reCaptcha Myths: Reverse Engineering Anti-spam Algorithms and Examining Existing Research in Realistic Contexts

Articles in Hacking the Government | By August R. Garcia

Published 2 months agoMon, 22 Apr 2019 22:23:34 -0700 | Last update 1 month agoSat, 08 Jun 2019 01:28:52 -0700

Profile Photo - August R. Garcia

Last Reply The .tar.gz of sorted reCaptcha photos has been moved to this URL on the 256 Kilobytes server, since the old link expired: https://www.256kiloby... August R. Garcia,

The .tar.gz of sorted reC...

Sat, 08 Jun 2019 01:29:54 -0700 1 month ago
🗨
1
🐏
2
👁
924
Profile Photo - Five Dollars

How to hack Cookie Clicker?

Answers in Hacking the Government | By Five Dollars

Published 3 months agoWed, 20 Mar 2019 01:22:58 -0700

Profile Photo - Default

Last Reply Yes, you can play without any limits, that's true. I have found some source where you can learn the cheats and trick to hack the cookie clicker!! c... bapji,

Yes, you can play without...

Fri, 31 May 2019 23:58:23 -0700 1 month ago
🗨
5
🐏
0
👁
198
Profile Photo - Some Guy

Why is bank mode not working in Avast Safe Zone?

Answers in Information Security | By Some Guy

Published 7 months agoSun, 16 Dec 2018 09:38:51 -0800

Profile Photo - Univa

Last Reply Bank Mode provides a virtual desktop which acts as a safe and clean PC within your real PC. This protects against a potentially hijacked host or netwo... Univa,

Bank Mode provides a virt...

Sun, 26 May 2019 11:22:02 -0700 1 month ago
🗨
1
🐏
0
👁
143
Profile Photo - Some Guy

Should I disable Port Scan and DoS Protection?

Answers in Information Security | By Some Guy

Published 7 months agoSun, 16 Dec 2018 09:33:21 -0800

Profile Photo - Univa

Last Reply Port scan is An attack that sends client requests to a range of TCP port addresses on a host, with the goal of finding an active port and exploiting a... Univa,

Port scan is An attack th...

Sun, 26 May 2019 11:16:24 -0700 1 month ago
🗨
1
🐏
0
👁
228
Profile Photo - Hash Brown

Spoofing Browser URL Previews

Articles in Unintended Behavior and Exploits | By Hash Brown

Published 1 month agoWed, 22 May 2019 12:41:22 -0700

Profile Photo - Hash Brown

Last Reply > muh right click -> open in new tab / mousewheel click. There's plausibly some workaround for that. IDK LOL Why would you even do that Hash Brown,

> muh right click...

Wed, 22 May 2019 13:41:17 -0700 1 month ago
🗨
3
🐏
2
👁
136
Profile Photo - IncstedibleMrE1

reCaptcha not showing up? How do I fix this on Tor?

Answers in Hacking the Government | By IncstedibleMrE1

Published 3 months agoTue, 19 Mar 2019 20:36:07 -0700

Profile Photo - Default

Last Reply easiest just throw the computer in your trash teh man,

easiest just throw the co...

Thu, 25 Apr 2019 12:34:06 -0700 2 months ago
🗨
4
🐏
0
👁
155
Profile Photo - August R. Garcia

3.5 Web Dev Security Considerations You Didn’t Know About

Articles in Hacking the Government | By August R. Garcia

Published 2 months agoSun, 21 Apr 2019 01:31:32 -0700 | Last update 2 months agoSun, 21 Apr 2019 05:22:14 -0700

Profile Photo - August R. Garcia

Despite the obscene amounts of time that...

MoreDespite the obscene amounts of time that goes into computer security, there are always new computer security vulnerabilities, bugs, and exploits being...
🗨
0
🐏
0
👁
5,873
Profile Photo - Some Guy

Got the error "Ping transmit failed. General failure"?

Answers in Information Security | By Some Guy

Published 7 months agoSun, 16 Dec 2018 09:44:04 -0800

Profile Photo - Univa

Last Reply If the default gateway entry is missing, the message “General failure” could appear. This happens, when the computer tries to reach a host... Univa,

If the default gateway en...

Tue, 16 Apr 2019 07:32:48 -0700 3 months ago
🗨
1
🐏
0
👁
195
Profile Photo - August R. Garcia

Client-Side Input Validation Exploit in KK-Star Ratings Plugin

Articles in Unintended Behavior and Exploits | By August R. Garcia

Published 3 months agoSun, 14 Apr 2019 11:59:00 -0700 | Last update 3 months agoMon, 15 Apr 2019 13:36:23 -0700

Profile Photo - August R. Garcia

The KK-Star Ratings plugin is one of the...

MoreThe KK-Star Ratings plugin is one of the easiest ways to implement structured data to show star ratings next to posts, which I’ve used on WordPr...
🗨
0
🐏
0
👁
2,664
Profile Photo - Some Guy

How to block websites on router?

Answers in Unintended Behavior and Exploits | By Some Guy

Published 5 months agoWed, 06 Feb 2019 16:06:51 -0800

Profile Photo - roxblade

Last Reply There is no need for you to spend money on net-monitoring websites to block certain sites. Your router can be used to block unencrypted websites. On t... roxblade,

There is no need for you...

Thu, 04 Apr 2019 07:39:29 -0700 3 months ago
🗨
2
🐏
0
👁
148
Profile Photo - Five Dollars

How does a password brute force/dictionary attack work?

Answers in Hacking the Government | By Five Dollars

Published 3 months agoTue, 19 Mar 2019 20:01:18 -0700

Profile Photo - zeshelton

Last Reply Essentially it can be enacted in several ways, one way is to have a database, or a huge list, of common passwords, and one by one tell their program t... zeshelton,

Essentially it can be ena...

Sat, 30 Mar 2019 16:09:31 -0700 3 months ago
🗨
1
🐏
0
👁
103
Profile Photo - Some Guy

How to tell if you are being ddos'ed?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:24:17 -0800

Profile Photo - amifriskin

Last Reply Focus on tracking normal activity so you can recognize if anything is a unusual. Improve you capacity so it is high enough to carry the load for optim... amifriskin,

Focus on tracking normal...

Sat, 30 Mar 2019 16:05:35 -0700 3 months ago
🗨
1
🐏
0
👁
147
Profile Photo - Some Guy

How to DDoS someone with their IP?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:12:46 -0800

Profile Photo - -alxl_

Last Reply A DDOS is short for a distributed denial of service. A DOS - denial of service is when a service is made unavailable usually through flooding the serv... -alxl_,

A DDOS is short for a dis...

Sat, 30 Mar 2019 15:56:19 -0700 3 months ago
🗨
1
🐏
0
👁
157
Profile Photo - Ethan
Profile Photo - -alxl_

Last Reply There is a couple ways of answering this question and it can be complicated. Rather than talking about password guessed/cracking per second, it is bet... -alxl_,

There is a couple ways of...

Sat, 30 Mar 2019 15:38:29 -0700 3 months ago
🗨
1
🐏
0
👁
78
Profile Photo - The Big Bad Wolf
Profile Photo - Zhaybib

Last Reply There are some people who solve CAPTCHAS as a job and this is meant to weed out bots. People of any ethnicity are involved in this type of work. Zhaybib,

There are some people who...

Sat, 30 Mar 2019 15:28:49 -0700 3 months ago
🗨
1
🐏
0
👁
87
Profile Photo - Some Guy

How to get around OpenDNS?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:36:58 -0800

Profile Photo - thegstocersson

Last Reply There are a lot of different opinions on this. After reading a lot of different pages on this subject I believe this one is the easiest to follow. htt... thegstocersson,

There are a lot of differ...

Sat, 30 Mar 2019 15:21:57 -0700 3 months ago
🗨
1
🐏
0
👁
148
Profile Photo - Some Guy

Where does Avast store boot scan log?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:08:25 -0800

Profile Photo - Graln_of_Truth

Last Reply You can find it by going to C:ProgramDataAVAST SoftwareAvast eport and the file you're looking for should be called "aswBoot". If you need more help r... Graln_of_Truth,

You can find it by going...

Sat, 30 Mar 2019 15:18:53 -0700 3 months ago
🗨
1
🐏
0
👁
131
Profile Photo - Some Guy

What does "receptacle blocked" mean?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:10:25 -0800

Profile Photo - -alxl_

Last Reply It most likely means they couldn't get to the Mail Box to drop off the letter. Someone may have parked/blocked the front of the mail box or there was... -alxl_,

It most likely means they...

Sat, 30 Mar 2019 15:04:19 -0700 3 months ago
🗨
2
🐏
0
👁
147
Profile Photo - Your Dad

How to bypass "I'm not a robot" captcha?

Answers in Hacking the Government | By Your Dad

Published 3 months agoTue, 19 Mar 2019 23:10:30 -0700

Profile Photo - -alxl_

Last Reply Here is some things to try: Assuming the captcha is the Google captcha, you may be able to by pass the captcha using Google Chrome. You may need to lo... -alxl_,

Here is some things to tr...

Sat, 30 Mar 2019 14:53:47 -0700 3 months ago
🗨
1
🐏
0
👁
105
Profile Photo - VectorMan

Please help me get around this Japanese Captcha in PSO2.

Answers in Hacking the Government | By VectorMan

Published 3 months agoTue, 19 Mar 2019 14:48:53 -0700

Profile Photo - -alxl_

Last Reply Yes, working with a Captcha in foreign languages can be difficult with the languages. Refer to this thread on Reddit about PS02 that give some strateg... -alxl_,

Yes, working with a Captc...

Sat, 30 Mar 2019 14:49:58 -0700 3 months ago
🗨
1
🐏
0
👁
85
Profile Photo - Some Guy

What can people do with your IP address?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:17:56 -0800

Profile Photo - w3nsi012

Last Reply They can't get any info from just your IP address, the only thing anyone can do it leach off your power and slow your connectivity down. w3nsi012,

They can't get any info f...

Sat, 30 Mar 2019 14:44:58 -0700 3 months ago
🗨
1
🐏
0
👁
140
Profile Photo - Some Guy

How to hack a DSI?

Answers in Hacking the Government | By Some Guy

Published 5 months agoWed, 06 Feb 2019 14:32:42 -0800

Profile Photo - WTCMolybdenam4753

Last Reply I found a link on the internet that is a guide to DSI hacking. It appears to have some useful information and may answer your questions. Here is the l... WTCMolybdenam4753,

I found a link on the int...

Sat, 30 Mar 2019 14:44:30 -0700 3 months ago
🗨
1
🐏
0
👁
135
Profile Photo - Some Guy

Enable IPSec pass through?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:03:25 -0800

Profile Photo - Zhaybib

Last Reply Since you want to make sure you are doing everything right in terms of enabling IPSec pass through, make sure that you check out here, https://www.tom... Zhaybib,

Since you want to make su...

Sat, 30 Mar 2019 14:42:03 -0700 3 months ago
🗨
1
🐏
0
👁
125
Profile Photo - IncstedibleMrE1

How do captcha breakers work?

Answers in Hacking the Government | By IncstedibleMrE1

Published 3 months agoTue, 19 Mar 2019 08:28:59 -0700

Profile Photo - KacssPL

Last Reply The captcha breaker isn't actually trying to figure out what the captcha is, but more how it processes the captcha and making it simpler. The main goa... KacssPL,

The captcha breaker isn't...

Sat, 30 Mar 2019 14:37:11 -0700 3 months ago
🗨
1
🐏
0
👁
87
Profile Photo - Some Guy

How to fix MalwareBytes Real Time Protection?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:52:09 -0800

Profile Photo - Zhaybib

Last Reply Since you say you have limited skills in fixing Malware, you should check out this site here that will tell you how to fix MalwareBytes Real Time Prot... Zhaybib,

Since you say you have li...

Sat, 30 Mar 2019 14:35:27 -0700 3 months ago
🗨
1
🐏
0
👁
131
Profile Photo - rfc1385

How does Supreme's Captcha work?

Answers in Hacking the Government | By rfc1385

Published 3 months agoTue, 19 Mar 2019 22:36:17 -0700

Profile Photo - KacssPL

Last Reply It uses google's captcha system and is used to prevent any bots or spammers that are trying to "checkout" from the website. KacssPL,

It uses google's captcha...

Sat, 30 Mar 2019 14:31:47 -0700 3 months ago
🗨
1
🐏
0
👁
89
Profile Photo - Some Guy

How to open port 25565?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 14:49:24 -0800

Profile Photo - Graln_of_Truth

Last Reply If you want to port forward, you'll need to access your router configuration page and head to the Port Forwarding tab. To find the URL and login info... Graln_of_Truth,

If you want to port forwa...

Sat, 30 Mar 2019 14:19:51 -0700 3 months ago
🗨
1
🐏
0
👁
103
Profile Photo - Some Guy

Windows firewall log viewer?

Answers in Information Security | By Some Guy

Published 5 months agoWed, 06 Feb 2019 15:07:15 -0800

Profile Photo - Zhaybib

Last Reply Since you are wondering about how to protect your information on your computer, you can find out how to look at the windows firewall log viewer here,... Zhaybib,

Since you are wondering a...

Sat, 30 Mar 2019 14:18:02 -0700 3 months ago
🗨
1
🐏
0
👁
129