|
Articles |
Welcome to the articles section! Here you will find all past/present news and Wang Hack FAQ articles. These texts are an ever expanding collection of security knowledge.
Wang Products aims to explain in detail the most common questions asked about computers and security today, to keep you up to date with security news, and to provide advice on how to keep your systems secure.
Below you will see a list of the latest 25 articles, and a search facility which you can use to search our entire article database.
|
Search
click here to view all articles
|
Latest 25 Articles
|
|
Wang Hack FAQ |
Once we have around 8-10 new FAQ articles published, we release a zip file containing the best of them and your comments/questions (called a "Wang Hack FAQ").
You can download the past Wang Hack FAQ volumes below.
|
|
Volume 1 |
Topics Covered
- What do I need to begin? , What are some good Websites? , What programming languages should I learn? , What is Telnet? , What is an IP address? , How do I find out my IP address? , What is IP spoofing? , What is a trojan/worm/virus/logic bomb? , What is PGP? , What is Unix? , How do I know if I telnet to a Unix system? , What is a shell account? , Where can I get a shell account? , How can I crack Unix account passwords? , What is a shadowed password?
|
click here to download
|
|
Volume 2 |
Topics Covered
- What are Wingates? , Where do I find out the addresses of Wingates? , What are Proxys? , What are Firewalls? , How do I forge email? , What are Email headers? , What does the stuff in an Email header mean? , What is IRC? , How can I hack Ops on an IRC channel? , How can I change my Windows boot-up/turn-off screens? , How can I break into a windows 9x system?
|
click here to download
|
|
Volume 3 |
Topics Covered
- At my workplace, loads of things in Windows are disabled, how can I access them? , Can you explain this telnet / ports thing in a bit more detail? , How can I get round a passworded screen saver? , What are some good techniques of breaking into Windows NT from the Internet? , What open ports should I look out for on my own computer? (Trojan Detection)
|
click here to download
|
|
Volume 4 |
Topics Covered
- Breaking into password protected web sites, What is Linux?, How can I get root access to a Linux system?, What is CGI ?, How to hack web sites (a couple of CGI exploits), An interesting little problem and solution, How to spoof messages using winpopup or net send, Decrypting CuteFTP passwords
|
click here to download
|
|
Volume 5 |
Topics Covered
- How can I spot different CD copying protections and how can I defeat them?, How can I bypass a proxy server and access banned web sites?, Hacking ICQ explained, How to crash someones computer on a windows 9x network, Getting network login passwords, Emails
|
click here to download
|
|
Volume 6 |
Topics Covered
- Decrypting the ICQ99b password, Hacking Guestbooks, Zebulun - stopping the crashes, Accessing the control panel in a restricted environment, Bypassing local restrictions, How do I get rid of the Netscape Messenger advert?, MailMachine.cgi flaws, Emails
|
click here to download
|
|
Volume 7 |
Topics Covered
- Hacking challenge reviews, Hacking CGI scripts, Basics of remaining anonymous on the internet, ICQ and HTML fun, Basics of securing Linux, A better look at Firewalls, Emails
|
click here to download
|
|
Volume 8 |
Topics Covered
- Leaving Backdoors - a variety of methods, How to stop people getting your IP over ICQ, .plan - impress your friends, Stopping the mIRC CTCP replies, NetBIOS hacking, A few Windows NT tips, Emails
|
click here to download
|
|
Volume 9 |
Topics Covered
- Hacking Web-based Email, Unix Ownership/Permissions explained, What are SUID Binaries and why are they dangerous?, Decrypting Trillian Passwords, What is Cross Site Scripting (css/xss) ?, Problems with user input in scripting languages using databases (SQL statements), Emails
|
click here to download
|
|
|