CyberGuerrilla 2013
 Vol.3--No.2013 | 2 Users Online
Tuesday,Oct 15,2019 
By Doemela | March 12, 2013 - 21:46 | Posted in CyberGuerrilla | 1 Comment | Post is random.

Hackers Wanted (2008) This film explores the origin of true hackers vs. today’s computer criminals by following the adventures of Adrian Lamo and other well-intentioned hackers, who found security holes and pointed them out so they might be fixed, only to eventually be arrested. Commonly thought of as computer criminals and vandals, a true hacker Read more » 

By ro0ted | May 6, 2013 - 02:05 | Posted in /b/ | Comments Off on #ro0ted Basic Data Types

Variables are nothing but reserved memory locations to store values. This means that when you create a variable you reserve some space in memory. Based on the data type of a variable, the operating system allocates memory and decides what can be stored in the reserved memory. Therefore, by assigning different data types to variables, Read more » 

By Anonymous | July 28, 2013 - 04:47 | Posted in AnonyNews | Comments Off on NSA – Anonymous . Enough, elite. You are FINISHED.

Greetings NSA, Thanks to the actions of Edward Snowden the world is now aware of your absurdly intrusive and elaborate monitoring agenda. Every Verizon user. Every Facebook LinkedIn, Google+ and Twitter account. Every Yahoo!, Bing and Google search result. Every Microsoft Windows, Google Chrome and Apple Mac operating system. Every Safari, Chrome and Internet Explorer Read more » 

By Anonymous | July 26, 2013 - 03:11 | Posted in AnonyNews | 2 Comments

PLEASE READ THE DESCRIPTION FIRST! The video was made in teamwork by Anons around the world and its content belongs to the Internet. This is only an excerpt from the actions of Anonymous during 2012. The operations which are listed in the video are only examples, there are far more operations. Some of them still Read more » 

By Anonymous | July 22, 2013 - 22:59 | Posted in AnonyNews | 1 Comment

For all the newfags & famefags saying shit don’t matter. You obviously haven’t heard of??Agent Robert Smith yet, eh??? [This paste has been removed!]

By Anonymous | July 9, 2013 - 23:46 | Posted in AnonyNews | Comments Off on @MeltemArikan, is victim of a vicious smear campaign in Turkey.

We hear worrying reports that ours friends Memet Ali Alabora, Meltem Arikan, and Pinar Ogun who have been behind the first massively digital play Mi Minor are being the targets of vicious smear campaign by some newspapers. Read Meltem’s post on her website. This sounds like opportunists who have been waiting for an excuse to Read more » 

By Doemela | July 28, 2013 - 05:33 | Posted in CyberGuerrilla | Comments Off on Anarchists in the Turkish Uprising

An interview with anarchists in ??stanbul. They talk about the background of the revolt, the relationship between this uprising and others around the world, and its implications for the future of Turkey. What preexisting organizations have played a role in this new explosion of social struggle? The important thing about this rebellion is that there Read more » 

By ro0ted | July 28, 2013 - 04:33 | Posted in CyberGuerrilla | Comments Off on #ro0ted Hack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer Overflow

This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the ???name??? attribute of the file element. This results in overwriting a structured exception handler record. Exploit Targets Apple Quicktime 7.7.3 Internet Explorer 8 Windows XP Read more » 

By ro0ted | July 27, 2013 - 11:56 | Posted in CyberGuerrilla | Comments Off on #ro0ted Big banks paid corrupt detectives to spy, hack and steal personal data in run-up to the financial crash

Global banks and big City institutions paid corrupt private detectives to carry out spying missions in Britain in the run-up to the financial crisis. International banking institutions dominate a list of 102 companies and named individuals who hired private investigators engaged in hacking, blagging and stealing private information. The revelations are a further blow to Read more » 

By ro0ted | July 27, 2013 - 11:28 | Posted in CyberGuerrilla | Comments Off on #ro0ted Computer researchers demonstrate how cars can by hacked via laptop

A team of computer security researchers recently demonstrated just how easy it is for malicious hackers to physically hijack a modern car using a laptop. By taking advantage of the computer hardware and software built into the automobile???s systems, researchers Chris Miller and Chris Valasek showed that they were able manipulate the displays on the Read more » 

nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <