I remember a couple of years a go, I used an hack from somewhere to update link hits in the background. What I remember is that I had an onclick event on my links that triggered a javascript function which tried to load an image or something (this is the hack), but instead of an image (or whatever it was) you put in an url like 'mysite.c...
Objective-C keeps all its methods in a huge hashtable - so shouldn't it possible to patch this table and replace an existing method with my own patched method (which then calls the original)?
I need a way to hook up the NSWindow KeyUp method in a window which i can't subclass cause it's already created.
I need some code or at least so...
Hi,
I need somehow to trick Windows OS to use dual-monitor function, for expanding the desktop, when i use only one monitor. Registers, api calls, drivers installation... there should be something, that triggers d-m.
Why I need this? I want to hide window out of visible desktop coordinates and still be able to get that window image.
P...
Yesterday my site was comprised. The attacker changes the index.php file to their own (with all their glory messages and greet). I've notified the hosting company about this (we are running on a dedicated server), and on my part, I'm trying to fix anything that seems to be the cause, cause I'm still unable to point how exactly did our se...
Since many operations like holding on the PS2 bus are forbidened ,
what's the lowest level operation still available to windows users?
...
I'm trying to use the python-daemon module. It supplies the daemon.DaemonContext class to properly daemonize a script. Although I'm primarily targeting Python 2.6+, I'd like to maintain backwards compatibility to version 2.4.
Python 2.5 supports importing contexts from future, but Python 2.4 has no such facility.
I figured I could just ...
Hi, if anyone hacks a site, then I would like to check which files are changed maybe in the last 24 hours in the directory htdocs, that means the files in the subdirectories form htdocs too. How to do this?
I will be happy for any suggestions,
Cheers
Nik
...
Hello people
Since the whole Android stuff is open source I was thinking about to do some minor modifications in a few internal classes from the com.android.internal.telephony package and of course then I would love if somehow my application could use the modified classes. I was thinking about replacing the classes with the original one...
Hi I have an application written in visual c++ or visual basic (not sure, sorry) that I do not have source code access to. One of the toolbar options it offers generates an HTML report from a template that has bookmarks or space-holders that are filled by variables calculated in the program before it renders the HTML report. I would like...
Sometimes I need such method, which could change class of its own object. There are String#delete!, #downcase!, #encode!, #gsub!, #strip!, #slice!, etc. They are all trying to change string, but resulting class is anyway still String. And I want a method, which can convert String to Array.
Some way to make this:
irb(main):082:0> str = "...
I decided to work around a bug in GNU libstdc++ by accessing an internal variable. Recalling that Johannes solved the problem on his blog, I checked that out… but couldn't comprehend the code, aside from the basic concept of getting a static initializer to do the dirty work. So, I boiled it down to this, which is pretty compact.
But, as...
Microsoft released their out of band release to fix the security flaw in ASP.NET the yesterday.
What methods did Microsoft use to end the viability of this vector?
...
Our MS Access 2000 developer left the company a year ago. We need to open his app in design mode in order to make modifications. Double-clicking the .mdb file while holding the shift key doesn't work. When I do that the developer toolbar shows for a split second, then all toolbars go away and the app opens as users would see it. No toolb...
I usually organise tournaments on my site (flash based) and this time I have added a tournament in which users have to complete a jigsaw puzzle and the one who completes it in the least time wins some prize. As the jigsaw puzzle always produces random location, it is difficult for them to hack. They can't even directly download the game ...
Hi,
I have a huge partitioned table stored at a PostgreSQL table. Each child table has an index and a check constraint on its id, e.g. (irrelevant deatils removed for clarity):
Master table: points
Column | Type | Modifiers
---------------+-----------------------------+----------------------...
Hey, so I'm not entirely sure this is possible, but I am curious if it is possible to hack the definitions of "undefined" objects. Primarily, the purpose of this is to prevent errors from launching when doing a .replace on an object that is undefined. Is it possible to go into the "back end" (is there even such a thing??) and add a met...
I am using windows 7, in commond prompt "arp -a"
Besides my wifi ip address, i will always see. Is my computer hacked?
149.171.11.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.25...
I have an obfuscated executable and I want to debug the EXE. I've tried to look into the source code with the .NET Reflector. While looking into the source, an internal exception has been thrown within the .NET Reflector. So I want to get the source code or to debug the application. Are there any possibilities to debug the app or to get ...
This maybe is a very simple question, but i did not have any resources for hack. I searched google and there was nothing to help me out. I need to know some basic information about hacking. Questions in my mind are like these:
What is hack?
What can be done with hacking?
what should we know (about stuff like
OS, etc.) bef...