hack

javascript load url in background

I remember a couple of years a go, I used an hack from somewhere to update link hits in the background. What I remember is that I had an onclick event on my links that triggered a javascript function which tried to load an image or something (this is the hack), but instead of an image (or whatever it was) you put in an url like 'mysite.c...

Objective-C, how can i hook up a method in another class

Objective-C keeps all its methods in a huge hashtable - so shouldn't it possible to patch this table and replace an existing method with my own patched method (which then calls the original)? I need a way to hook up the NSWindow KeyUp method in a window which i can't subclass cause it's already created. I need some code or at least so...

Calling windows dual monitor function

Hi, I need somehow to trick Windows OS to use dual-monitor function, for expanding the desktop, when i use only one monitor. Registers, api calls, drivers installation... there should be something, that triggers d-m. Why I need this? I want to hide window out of visible desktop coordinates and still be able to get that window image. P...

My php site was hacked by codes uploaded as image..?!

Yesterday my site was comprised. The attacker changes the index.php file to their own (with all their glory messages and greet). I've notified the hosting company about this (we are running on a dedicated server), and on my part, I'm trying to fix anything that seems to be the cause, cause I'm still unable to point how exactly did our se...

What's the lowest level of operation you can play in windows?

Since many operations like holding on the PS2 bus are forbidened , what's the lowest level operation still available to windows users? ...

Dealing with context classes in Python 2.4

I'm trying to use the python-daemon module. It supplies the daemon.DaemonContext class to properly daemonize a script. Although I'm primarily targeting Python 2.6+, I'd like to maintain backwards compatibility to version 2.4. Python 2.5 supports importing contexts from future, but Python 2.4 has no such facility. I figured I could just ...

What is a hack?

...

How to list last changed files in one directory

Hi, if anyone hacks a site, then I would like to check which files are changed maybe in the last 24 hours in the directory htdocs, that means the files in the subdirectories form htdocs too. How to do this? I will be happy for any suggestions, Cheers Nik ...

Modify android internal class(es) / Call Handling

Hello people Since the whole Android stuff is open source I was thinking about to do some minor modifications in a few internal classes from the com.android.internal.telephony package and of course then I would love if somehow my application could use the modified classes. I was thinking about replacing the classes with the original one...

hook application procedure and change target file name

Hi I have an application written in visual c++ or visual basic (not sure, sorry) that I do not have source code access to. One of the toolbar options it offers generates an HTML report from a template that has bookmarks or space-holders that are filled by variables calculated in the program before it renders the HTML report. I would like...

A way to implement `String#split!`

Sometimes I need such method, which could change class of its own object. There are String#delete!, #downcase!, #encode!, #gsub!, #strip!, #slice!, etc. They are all trying to change string, but resulting class is anyway still String. And I want a method, which can convert String to Array. Some way to make this: irb(main):082:0> str = "...

What's the cleanest way to defeat C++ access qualification?

I decided to work around a bug in GNU libstdc++ by accessing an internal variable. Recalling that Johannes solved the problem on his blog, I checked that out… but couldn't comprehend the code, aside from the basic concept of getting a static initializer to do the dirty work. So, I boiled it down to this, which is pretty compact. But, as...

How was the oracle padding attack on ASP.NET Fixed?

Microsoft released their out of band release to fix the security flaw in ASP.NET the yesterday. What methods did Microsoft use to end the viability of this vector? ...

MS Access 2000: How to open locked app in design mode?

Our MS Access 2000 developer left the company a year ago. We need to open his app in design mode in order to make modifications. Double-clicking the .mdb file while holding the shift key doesn't work. When I do that the developer toolbar shows for a split second, then all toolbars go away and the app opens as users would see it. No toolb...

Flash game hacking

I usually organise tournaments on my site (flash based) and this time I have added a tournament in which users have to complete a jigsaw puzzle and the one who completes it in the least time wins some prize. As the jigsaw puzzle always produces random location, it is difficult for them to hack. They can't even directly download the game ...

PostgreSQL+table partitioning: inefficient max() and min()

Hi, I have a huge partitioned table stored at a PostgreSQL table. Each child table has an index and a check constraint on its id, e.g. (irrelevant deatils removed for clarity): Master table: points Column | Type | Modifiers ---------------+-----------------------------+----------------------...

Hack Javascript Definitions for "undefined" objects.

Hey, so I'm not entirely sure this is possible, but I am curious if it is possible to hack the definitions of "undefined" objects. Primarily, the purpose of this is to prevent errors from launching when doing a .replace on an object that is undefined. Is it possible to go into the "back end" (is there even such a thing??) and add a met...

[Networking] Is my computer hacked?

I am using windows 7, in commond prompt "arp -a" Besides my wifi ip address, i will always see. Is my computer hacked? 149.171.11.255 ff-ff-ff-ff-ff-ff static 224.0.0.22 01-00-5e-00-00-16 static 224.0.0.252 01-00-5e-00-00-fc static 239.255.255.250 01-00-5e-7f-ff-fa static 255.255.255.25...

How do I debug an obfuscated executable?

I have an obfuscated executable and I want to debug the EXE. I've tried to look into the source code with the .NET Reflector. While looking into the source, an internal exception has been thrown within the .NET Reflector. So I want to get the source code or to debug the application. Are there any possibilities to debug the app or to get ...

Things to know before starting hack and what books can help me

This maybe is a very simple question, but i did not have any resources for hack. I searched google and there was nothing to help me out. I need to know some basic information about hacking. Questions in my mind are like these: What is hack? What can be done with hacking? what should we know (about stuff like OS, etc.) bef...