<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking Archives - Wayne Pendragon Owens</title>
	<atom:link href="https://wayne-owens.uk/category/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://wayne-owens.uk/category/hacking/</link>
	<description></description>
	<lastBuildDate>Mon, 12 Jan 2026 10:42:17 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://wayne-owens.uk/wp-content/uploads/2017/11/cropped-BLOG-WPO-32x32.png</url>
	<title>Hacking Archives - Wayne Pendragon Owens</title>
	<link>https://wayne-owens.uk/category/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackers &#8211; 40 Years on and still Relevant!</title>
		<link>https://wayne-owens.uk/hackers-40-years-on-and-still-relevant/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 10:37:29 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=7820</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-40-years-on-and-still-relevant/">Hackers &#8211; 40 Years on and still Relevant!</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 align="center">The <a href="http://www.mithral.com/~beberg/hacker.html">Hacker</a> Manifesto</h2>
<p align="center">by<br />+++The Mentor+++<br />Written January 8, 1986</p>
<p align="left">Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”…</p>
<p><em>Damn kids. They’re all alike.</em></p>
<p>But did you, in your three-piece psychology and 1950’s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?</p>
<p>I am a hacker, enter my world…</p>
<p>Mine is a world that begins with school… I’m smarter than most of the other kids, this crap they teach us bores me…</p>
<p><em>Damn underachiever. They’re all alike.</em></p>
<p>I’m in junior high or high school. I’ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. “No, Ms. Smith, I didn’t show my work. I did it in my head…”</p>
<p><em>Damn kid. Probably copied it. They’re all alike.</em></p>
<p>I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it’s because I screwed it up. Not because it doesn’t like me… Or feels threatened by me.. Or thinks I’m a smart ass.. Or doesn’t like teaching and shouldn’t be here…</p>
<p><em>Damn kid. All he does is play games. They’re all alike.</em></p>
<p>And then it happened… a door opened to a world… rushing through the phone line like heroin through an addict’s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought… a board is found. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked to them, may never hear from them again… I know you all…</p>
<p><em>Damn kid. Tying up the phone line again. They’re all alike…</em></p>
<p>You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.</p>
<p>This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.</p>
<p>Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.</p>
<p>I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.</p></div>
			</div><div class="et_pb_module et_pb_divider_0 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-40-years-on-and-still-relevant/">Hackers &#8211; 40 Years on and still Relevant!</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; Never send a boy to do a woman’s job</title>
		<link>https://wayne-owens.uk/hackers-never-send-a-boy-to-do-a-womans-job/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Tue, 10 Oct 2023 10:23:51 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=2383</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-never-send-a-boy-to-do-a-womans-job/">Hackers &#8211; Never send a boy to do a woman’s job</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Today is “<strong>Ada Lovelace Day</strong>“.</h3>
<blockquote>
<p><em>It is an international day of blogging (</em><em>videologging, podcasting, comic drawing etc.!) to draw attention to the achievements of women in technology and science.</em></p>
<p><em>Women’s contributions often go unacknowledged, their innovations seldom mentioned, their faces rarely recognised. We want you to tell the world about these unsung heroines, whatever they do.</em></p>
</blockquote>
<p>I decided to take part in helping to promote the achievements of women in fields they do not normally get the credit the deserve in.   Deciding to take part was easy, its the actual doing something about it that’s hard. I have spent the last four hours trying to decide who to write about.</p>
<p>Its easy to say “<em>I was not influenced or inspired by particular woman to the point I can post about it</em>“, Yet the more I consider it, the more stupid that statement is. Part of my job entails writing Programs, Scripts, etc. And The first computer Programmer was a lady, and a Lady lady at that. Lady Ada Lovelace (<em>Who today’s named after.</em>)</p>
<p>So who to pick? I then considered maybe using a Character from TV/Film that’s a role model showing you can be cool, feminine, and geeky. Only I could not decide on one of them, either. I have decided to face the fact that I’m useless.</p>
<p>So Instead I will just Raise a pint, and tip my hat to a lost community. “<strong>Female Hackers</strong>”</p>
<p>Raven Alder, a network administrator at Maryland-based company Intermedia, was utterly boggled by an unexpected question at a hacker convention where she’d just presented a paper. “<em>A reporter asked me how it felt to be the world’s first female hacker,</em>” she recalled. “<em>What the hell?</em>” she spluttered in response. She knew of many other women hackers at the conference, and she was certainly not the first. But the reporter’s question revealed the dilemma facing most women hackers today.</p>
<p>EvilGrrl, a member of the notorious GhettoHackers crew (<em>who won Capture the Flag three years running at Defcon</em>), has noticed this “not existing” problem too. “<em>At conferences, lots of people assume I’m somebody’s girlfriend</em>,” she said, laughing. “<em>I usually just reply that I’m a GhettoHacker and no, I’m not a girlfriend.</em>”</p>
<p>So lets all the Men take a step back, and take today to acknowledge our Female counterparts.</p>
<p>Any in the North Wales area let me know, I’ll get you a pint (<em>or drink of choice</em>)</p>
<blockquote>
<p><em>NOTE: The Title of the Post is a quote from the Character “</em><em>Acid Burn” from the film </em><em>Hackers. I’ve never really considered it before, But she really is a poor example of Women in Technology. Looking back on the film, she was the only female in the hacking community shown. I believe in the clips at the end, where the worlds hackers unite, there’s possibly a female hacker shown. Amongst the main group and extended community she is the only one, The other female characters are mothers, or Bimbos. So I appologise, its just that I like the Character, Like the Quote, and Like the Young Angelina Jolie.</em></p>
</blockquote></div>
			</div><div class="et_pb_module et_pb_divider_1 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-never-send-a-boy-to-do-a-womans-job/">Hackers &#8211; Never send a boy to do a woman’s job</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; 30 Years on and still Relevant!</title>
		<link>https://wayne-owens.uk/hackers-30-years-on-and-still-relevant/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Fri, 08 Jan 2016 11:26:10 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=2385</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-30-years-on-and-still-relevant/">Hackers &#8211; 30 Years on and still Relevant!</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 align="center">The <a href="http://www.mithral.com/~beberg/hacker.html">Hacker</a> Manifesto</h2>
<p align="center">by<br />+++The Mentor+++<br />Written January 8, 1986</p>
<p align="left">Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”…</p>
<p><em>Damn kids. They’re all alike.</em></p>
<p>But did you, in your three-piece psychology and 1950’s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?</p>
<p>I am a hacker, enter my world…</p>
<p>Mine is a world that begins with school… I’m smarter than most of the other kids, this crap they teach us bores me…</p>
<p><em>Damn underachiever. They’re all alike.</em></p>
<p>I’m in junior high or high school. I’ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. “No, Ms. Smith, I didn’t show my work. I did it in my head…”</p>
<p><em>Damn kid. Probably copied it. They’re all alike.</em></p>
<p>I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it’s because I screwed it up. Not because it doesn’t like me… Or feels threatened by me.. Or thinks I’m a smart ass.. Or doesn’t like teaching and shouldn’t be here…</p>
<p><em>Damn kid. All he does is play games. They’re all alike.</em></p>
<p>And then it happened… a door opened to a world… rushing through the phone line like heroin through an addict’s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought… a board is found. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked to them, may never hear from them again… I know you all…</p>
<p><em>Damn kid. Tying up the phone line again. They’re all alike…</em></p>
<p>You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.</p>
<p>This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.</p>
<p>Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.</p>
<p>I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-30-years-on-and-still-relevant/">Hackers &#8211; 30 Years on and still Relevant!</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; News of the World Phone Hacking Scandal</title>
		<link>https://wayne-owens.uk/hackers-news-of-the-world-phone-hacking-scandal/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Thu, 14 Jul 2011 10:21:39 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=2380</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-news-of-the-world-phone-hacking-scandal/">Hackers &#8211; News of the World Phone Hacking Scandal</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Unless you have been living in a small cave half way up an inhospitable mounting for the last month you would have heard of the News of the World (<strong>NotW</strong>) Phone Hacking Scandal. It’s especially bad if you live in the UK.</p>
<p>If you are that cave dwelling hermit let me say “<em>How the frak are you reading this post? Did you follow the <a title="Subscribe to Blogs/News Sites on the Kindle for FREE" href="http://three-ninjas.co.uk/2011/05/subscribe-to-blogsnews-sites-on-the-kindle-for-free/">article on reading blogs on kindles</a>? How have you got internet access? inquiring minds want to know!</em>” *<strong>relax</strong>* I mean to say, that this scandal is about slime masquerading as reporters who accessed a vast (<em>possible 4,000</em>) number of people’s (<em>Celebrity’s, Sports Stars, Politicians, Victims of Crime</em>) answer phone messages. Now there was such an amount of this going on that the paper has closed down after 168 years in print.</p>
<p>I have no intention of writing about the incident itself, or any of the fallout, or anything directly in relation to this case. That has been covered in depth all over the Internet &amp; Surviving media. What I would like to address is the term thrown about “<strong>Phone Hacking Scandal</strong>“. Why must everyone insist on calling it Hacking?</p>
<blockquote>
<p>*NOTE: Phone Hacking is referred to as Phreaking</p>
</blockquote>
<p>Nowhere in any of the reports is any activity mentioned that even faintly falls into the category of “Hacking” under any definition. Even if you take the original definition of Hacking, as in using some piece of technology or item in a way that was different to the intended use. Or knowing or wanting to learn about the inner working of different things, you still can not fit the term “<em>Hacker</em>” or “<em>Hacking</em>” to what the NotW reporters actually did.</p>
<p>What they did was to access peoples voicemail’s. Yes this is wrong, its an intrusion of privacy, it’s probably illegal as “unauthorised to personal communication” but it is not Hacking. They phoned up the voicemail number, and using the Victims phone number, and the generic default pin number accessed they voice mail system in the way it was intended to, in the way we all access it, they just did it without the Victims permission.</p>
<p>Surely it should be called “<em>illegal phone tapping</em>” or “<em>illegal access to mail</em>” or by whatever legal term it is for the crime they committed. The media like using the term Hacker to scare the public about these faceless super-criminals with secret abilities that let them to do almost anything. I think its time to stop the mass-hysteria and excessive incorrect use of this term.</p>
<p>We do not call someone who sticks a plaster on a small graze a Doctor, We do not call the small child playing with a plastic gun in the street a terrorist, and we should not call someone who phones up a publicised phone number and follows the instructions the recorded message tells them a Hacker.</p>
<p>Come on Media People, Your reputation is tarnished over this NotW incident, don’t make it worse by not doing your homework, and just falling into your old scaremongering ways.</p>
<blockquote>
<p>A few words about the misappropriation of the term “Hacker“.</p>
<p>To quote Randal from Clerks. “I’m taking it back”</p>
</blockquote></div>
			</div><div class="et_pb_module et_pb_divider_2 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-news-of-the-world-phone-hacking-scandal/">Hackers &#8211; News of the World Phone Hacking Scandal</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; Subscribe to Blogs/News Sites on the Kindle for FREE</title>
		<link>https://wayne-owens.uk/hackers-subscribe-to-blogs-news-sites-on-the-kindle-for-free/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Mon, 30 May 2011 12:56:08 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=3594</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-subscribe-to-blogs-news-sites-on-the-kindle-for-free/">Hackers &#8211; Subscribe to Blogs/News Sites on the Kindle for FREE</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Another example of how you can get more out of your devices with just a little bit of sideways thinking. (<em>AKA Hacking</em>)</p></div>
			</div><div class="et_pb_module et_pb_divider_3 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="214" height="300" src="https://wayne-owens.uk/wp-content/uploads/2024/03/kindle.jpg" alt="" title="kindle" class="wp-image-3597" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>I  love nothing more than finding new ways to use Technology, Or Ways to use it in a different manner to that which it was intended. I also like finding legal ways of doing things for free, that would normally cost money.</p>
<p>So what was the first thing I did when I got our hands on one of Amazons Kindles? I decided it would be nice if we could read my favorite Blogs &amp; News sites directly off the Kindle in weekly digests. Unfortunately Amazon charges for this service, Which is OK I guess since some of the money can go to the Bloggers who write the sites.</p>
<p>No I do not want to cost fellow Bloggers Money, BUT if you think about it, you can use the Kindle’s web browser to read free Blogs for Free, so If you could get it sent directly to your device for free, its only really saving you time.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>So heres the procedure I followed to get Weekly Digests of my Favorite blogs sent directly to the Kindle. (<em>NOTE: If you really enjoy someone&#8217;s Blog consider supporting it with some comments, or some other way to show your thanks</em>)</p>
<p><span id="more-2225"></span><strong>1:</strong> Download &amp; Install <strong>Calibre </strong>– EBook Manager (<em>Free Software</em>)</p>
<p><strong>2:</strong> Click on “<strong>Fetch News</strong>” -&gt; “<strong>Add Custom news source</strong>”</p></div>
			</div><div class="et_pb_module et_pb_divider_4 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="751" height="675" src="https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_addfeed.png" alt="" title="calibre_addfeed" srcset="https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_addfeed.png 751w, https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_addfeed-480x431.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 751px, 100vw" class="wp-image-3596" /></span>
			</div><div class="et_pb_module et_pb_divider_5 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>3:</strong> Give your list a title “<strong>Recipe Title</strong>“, Set “<strong>Oldest Article</strong>” to be “7 Days”. Then using the “<strong>Feed Title</strong>” “<strong>Feed URL</strong>” box’s at the bottom keep “<strong>Add Feed</strong>” until you have all your Blogs added.</p>
<p><strong>4:</strong> Hit “<strong>Add/Update Recipe</strong>” to save your list.</p>
<p>Your custom feed list is now saved, You just need to assign a time to auto download it to Calibre (<em>You need to leave the software running on your Computer for the auto download to work</em>)</p>
<p>5: Hit “<strong>Fetch News</strong>” and look in the “Custom” header in the list.</p></div>
			</div><div class="et_pb_module et_pb_divider_6 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="802" height="610" src="https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_scedule.png" alt="" title="calibre_scedule" srcset="https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_scedule.png 802w, https://wayne-owens.uk/wp-content/uploads/2024/03/calibre_scedule-480x365.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 802px, 100vw" class="wp-image-3601" /></span>
			</div><div class="et_pb_module et_pb_divider_7 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>6:</strong> Pick “<strong>Days of Week</strong>” and a Day to suit yourself, then pick a Download Time, Make sure “<strong>Schedule for Download</strong>” is checked, and hist Save.</p>
<p>Thats all you need to do to get Calibre to download a “book” made up of your favorite blogs/news feeds. You may want to have a look at the other newsfeeds Calibre has listed as standard.</p>
<p>Now there is just one small thing left to do to get your downloads sent directly to your Kindle (<em>Providing you have WiFi or 3g Turned on</em>)</p>
<p><strong>7:</strong> “<strong>Preferences</strong>” -&gt; “<strong>Sharing Books by Email</strong>” Make sure you add your free kindle email address there *****@free.kindle.com. and Make sure “<strong>Auto Send</strong>” is checked.</p>
<p>8: “<strong>Preferences</strong>” -&gt; “<strong>Behavior</strong>” Make sure “<strong>Automatically send Downloaded news to ebook reader</strong>” is checked.</p>
<p>Now when Calibre downloads your custom newsfeed, it will auto convert them into an epub format and email them directly to your Kindle. So they popup ready for you to read.</p></div>
			</div><div class="et_pb_module et_pb_divider_8 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-subscribe-to-blogs-news-sites-on-the-kindle-for-free/">Hackers &#8211; Subscribe to Blogs/News Sites on the Kindle for FREE</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; UK hacker fined for personnel database mischief.</title>
		<link>https://wayne-owens.uk/hackers-uk-hacker-fined-for-personnel-database-mischief/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Thu, 09 Sep 2010 14:55:25 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=2451</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-uk-hacker-fined-for-personnel-database-mischief/">Hackers &#8211; UK hacker fined for personnel database mischief.</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Once again the Media forces miss appropriate the word “Hacker”. This time in an article posted on the IT based site <a href="http://www.theregister.co.uk/" target="_blank" rel="noopener">The Register</a>, the article is titled “UK hacker fined for personnel database mischief” and the full article can be read <a href="http://www.theregister.co.uk/2010/09/08/salary_database_hack/">here</a>.</p>
<p>Now this could be fair I guess, lets see what the guy did. According to the article he “<em>gained unauthorised access to staff contracts containing salary details and emailed this to around 400 workers at his ex-employer</em>” Now, I can see why gaining unauthorised access to digital information could be associated to Hacking, Only lets read some more.</p>
<p>How did he manage to bypass the companies security and gain access? When he was sacked he stole his bosses laptop, and emailed out information he found on there. Yes. That’s right! The Mad 1337 h4x0r skillz this guy used was 1)theft of a object, 2)The ability to send an email. Wow.</p>
<p>The title should be X-employees fined for theft and breaking the Data Protection Act. Only the Media likes its word Hacker.</div>
			</div><div class="et_pb_module et_pb_divider_9 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-uk-hacker-fined-for-personnel-database-mischief/">Hackers &#8211; UK hacker fined for personnel database mischief.</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; Getting More from Your Wii</title>
		<link>https://wayne-owens.uk/hackers-getting-more-from-your-wii/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Wed, 18 Aug 2010 19:02:08 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=3181</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-getting-more-from-your-wii/">Hackers &#8211; Getting More from Your Wii</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>There are many things you normally do with your Wii. You can play with it, Sing with it, Get fit with it. Lots of things.  But have you ever wanted to do MORE. get more fun with your Wii?</p>
<p>This is the kind of questions a &#8220;Hacker&#8221; will often ask. &#8220;<em>How can I do more with X bit of equipment?</em>&#8220;.</p>
<blockquote>
<p><em><strong>NOTE:</strong> Anyone here looking for water sports, please go away now. Unless you are a Good looking Female with an ENTP personality, who should send me her Photo + CV.</em></p>
</blockquote>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_divider_10 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>This post is about the Nintendo Wii, and how to get more from it.  I got a Wii last weekend. Mainly to get Wii Fit and play the fun looking games with the Balance Board.  The only thing is, I have not yet got the board, only the Wii.  Within Twenty four hours of receiving the Wii in the post the immortal words were uttered. “Hummmmm! I wonder if I could use this as a media server to stream films/tv from the network?”</p>
<p>After these words were uttered all other projects were dropped and the Wii was studied and hacked/jailbroke/improved.  Here’s the process that was used, in case anyone else out there wants to play media files on a Wii.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="150" height="150" src="https://wayne-owens.uk/wp-content/uploads/2024/03/black-wii.jpg" alt="" title="black-wii" class="wp-image-3185" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_divider_11 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="150" height="150" src="https://wayne-owens.uk/wp-content/uploads/2024/03/sandisk-2gb-sd-card.jpg" alt="" title="sandisk-2gb-sd-card" class="wp-image-3184" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><blockquote>
<p><em><strong>NOTE: </strong>This is only a “soft mod” you do not open the Wii at any point, or do any physical modifications to the device.</em></p>
</blockquote>
<p>For this you will need 1xSD Card. (<em>I used two cards to save time, but you only really need one</em>).</p>
<p>You need your Wii connected to your wireless network. (<em>You can do this with a none networked Wii, But networked is easier</em>)</p>
<p>You will also need to download a few files off the internet and unzip them.</p></div>
			</div><div class="et_pb_module et_pb_divider_12 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Phase 1: (<em>Getting the Homebrew Channel</em>)</h3>
<p>The HomeBrew channel is a Wii channel that lets you run Applications &amp; Software written by third party’s, extra applications, and games that are made available for you to use by people other than Nintendo.  It also helps for you launching Linux apps, or distro’s.  So before we can have fun we need to get this on the Wii.</p>
<p><strong>FILE Pack 1:</strong> <a title="File Pack 1" href="http://www.mediafire.com/download.php?zijhwznyowh" target="_blank" rel="noopener">Download</a> &lt;=- Files not stored on this Blog.</p>
<ol>
<li>Download this pack, and extract the files onto your SD Card. (<em>There should be three folders &amp; four files</em>)</li>
<li>Place the SD Card into the Wii (<em>The slots under the cover at the front.</em>)</li>
<li>Click on the SD Card Icon (<em>Bottom Left</em>), You should get a warning screen (<em>Press OK</em>), You get a black screen with disclaimer (<strong><em>Press 1</em></strong> )</li>
<li>You now should have a screen with three lines. Homebrew channel, which can be isntalled, DVDx, also can be installed, Bootmii, which possibly will give you an error. Install Homebrew Channel, DVDX. On bootmii option, select “<em>prepare SD card</em>“. After it finishes, install it as boot2 (<em>if possible</em>) or as an IOS.</li>
<li>When your finished, Remove the SD Card and return to computer.</li>
</ol>
<h3>Phase 2: (<em>Fixing the Nintendo Fix to Stop people doing what were doing</em>)</h3>
<p>You see, Nintendo did not like people getting full use of their Wii’s so the put a fake empty bit of code in the area most programmers use, this prevents “Other” code being fully run on the Wii. Well we say “Hack The Planet!” and fix this fix. :0)</p>
<p><strong>FILE Pack 2:</strong> <a title="File Pack 2" href="http://www.mediafire.com/download.php?5wgnmyy5wve" target="_blank" rel="noopener">Download</a> &lt;=- Files not stored on this Blog.</p>
<ol>
<li>Download this pack, format SD Card. and extract the files onto your SD Card.</li>
<li>Place the SD Card into the Wii</li>
<li>Go to The Homebrew Channel, Press the Home button and select Bootmii (<em>Some Wii’s auto start Bootmii so you can skip this one</em>)</li>
<li>Wadmanager should start.(On ios select, select ios36</li>
<li>Select SD card and (<strong><em>Press A</em></strong>).</li>
<li>Select ios249 from wad folder and (<strong><em>Press A</em></strong>).</li>
<li>change the action to “<em>uninstall wad</em>“, (<strong><em>Press A</em></strong>).</li>
<li>When your finished, Remove the SD Card and return to computer.</li>
</ol>
<h3>Phase 3: (<em>Adding cios</em>)</h3>
<p>You need this fix if you want to stream media over the Wii’s WiFi. or if you should want to play “<em>Backup Games</em>”</p>
<p><strong>FILE Pack 3:</strong> <a title="File Pack 3" href="http://www.mediafire.com/download.php?zzn2yy3mu1x" target="_blank" rel="noopener">Download</a> &lt;=- Files not stored on this Blog.</p>
<ol>
<li>Download this pack, format SD Card. and extract the files onto your SD Card.</li>
<li>Place the SD Card into the Wii</li>
<li>Go to The Homebrew Channel, Press the Home button and select Bootmii (<em>Some Wii’s auto start Bootmii so you can skip this one</em>)</li>
<li>At the beginning you should see ios249 highlighted. Keep pressing left on the wii pad until you see “<em>Do not reload IOS</em>” at the ios select screen, press A.</li>
<li>If you have internet connection, select “<em>Network install</em>“, else select “<em>SD card</em>“, (<strong>Press A</strong>).</li>
<li>When your finished, Remove the SD Card and return to computer.</li>
</ol>
<h3>Phase 4: (Setting up the final Card)</h3>
<p>You are all finished now. You just need to set yourself up for day to day running of Apps. Oh and to add a media player. Basically you can place apps in a folder called apps on the SD Card and they become runnable from the HomeBrew Channel. To get you started :-</p>
<p>Format the SD Card and extract File Pack 1 back onto it. This one has a few applications already on it for Playing Back up Games and fixing a few bugs.</p>
<p>To get a media server on there, Just download and extract to the apps folder. I tried and liked two applications.</p>
<p>1) Geexbox Which is a multi platform media server. The only downside is that it can not access the Wii’s WiFi drivers so will only play of USB harddrives, or using a Wired Network connection. There is a Lite version that can use WiFi.</p>
<p>2)<a title="MPlayer CE" href="http://code.google.com/p/mplayer-ce/" target="_blank" rel="noopener">MPlayer CE</a> Which is the one I’m using, It works from the box over the Wii’s WiFi. and plays a good amount of different file formats. And connects to local media, or network media using ftp, Windows Shares, SMB Shares.  You do have to edit the <strong>smb.conf</strong> in the MPlayer_CE folder to add up to 5 network shares (<em>and optional passwords</em>)</p>
<p>And its as easy as that. You can go from Taking a Wii out the box, to having it up and running as a full media server in less than an hour.</p>
<p>Happy Hacking.</p>
<p>P.S. The password for the files listed is: www.wiihacks.com</p></div>
			</div><div class="et_pb_module et_pb_divider_13 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-getting-more-from-your-wii/">Hackers &#8211; Getting More from Your Wii</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; Abusing the Cat… The UniCat</title>
		<link>https://wayne-owens.uk/hackers-abusing-the-cat-the-unicat/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Thu, 12 Aug 2010 10:27:22 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=3358</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-abusing-the-cat-the-unicat/">Hackers &#8211; Abusing the Cat… The UniCat</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Just a quick post to show I have not forgotten my series of small articles to show how the mainstream view of Hackers &amp; Hacking is wrong, and we are not all evil misfits trying to do harm to YOU!</p>
<p>When I was in university, the library was short on Computer Workstations and you often had to wait for a free one to come available to check your email, play on the Internet, do work, etc. This was very annoying if you were in a rush and just wanted to check your email to see where you were supposed to be, or quickly email in an assignment to your lecturer.</p>
<p>Now, scattered around the library were UniCat terminals, simple terminals with a BBS style catalogue program running on them that allowed you to search the books in the library, see what they had, what was out (<em>and when it was due back</em>), order books and periodicals, and so on.  Another hand feature it had was the ability to connect to similar programs running at other universities.</p>
<p>Now the first time i connected to another university to see how the system work I saw the familiar.</p>
<blockquote>
<p>Connected to ***********.****.****.<br />Escape character is ‘^]’.</p>
</blockquote>
<p>So what do you do in such a situation, I pressed ^] which gave me the telnet prompt and decided to connect to a different address, that of my linux account. It connected fine. Which allowed me when in a rush to check my email &amp; ICQ, Spod, code, and do anything else I needed too without waiting for a machine to come free. It also stopped me tying up machines that could otherwise be used by others.</p>
<p>Playing with these terminals also helped out, since there was a bug in the system and occasionally they would crash down to the VAXos, and be unusable until the one IT staff who knew the system went around restarting them. Unless I happened to spot it was down and would help out. Well I could not leave my emergency terminals out of use.</p></div>
			</div><div class="et_pb_module et_pb_divider_14 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-abusing-the-cat-the-unicat/">Hackers &#8211; Abusing the Cat… The UniCat</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; CyberSecurityChallenge Cipher – Walkthrough</title>
		<link>https://wayne-owens.uk/hackers-cybersecuritychallenge-cipher-walkthrough/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Wed, 28 Jul 2010 08:12:53 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=3329</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-cybersecuritychallenge-cipher-walkthrough/">Hackers &#8211; CyberSecurityChallenge Cipher – Walkthrough</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>After seeing all the people posting on Twitter/Facebook/Blogs how they have solved the cipher challenge on the <a href="https://cybersecuritychallenge.org.uk/" target="_blank" rel="noopener">CyberSecurityChallenge</a> website when all they have done is take the first step, I thought it might be nice to post a small walkthrough to give some pointers, help, and show them that first impressions are not always correct.</p>
<p>Only read on if you have stopped trying to solve the puzzle yourself, or if you just need a push in the right direction. <strong>AKA, here be spoilers</strong>.</p>
<p><span id="more-1572"></span><strong>Step 1: The starting line.</strong></p>
<p>So you went to https://cybersecuritychallenge.org.uk/cipher.html and looked at the big pile of gibberish. While wondering how to start you noticed the gibberish had a familiar look &amp; feel. Kind of like images in emails. You have an eureka moment and base64 decrypt the gibberish and get an image.  When you stop cheering, please pay attention to the Image. You are not at the end of the rabbit hole yet.</p></div>
			</div><div class="et_pb_module et_pb_divider_15 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="350" height="175" src="https://wayne-owens.uk/wp-content/uploads/2024/03/wayne.jpg" alt="" title="wayne" srcset="https://wayne-owens.uk/wp-content/uploads/2024/03/wayne.jpg 350w, https://wayne-owens.uk/wp-content/uploads/2024/03/wayne-300x150.jpg 300w" sizes="(max-width: 350px) 100vw, 350px" class="wp-image-3331" /></span>
			</div><div class="et_pb_module et_pb_divider_16 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Step 2: Into the Rabbit Hole.</strong></p>
<p>Look at the picture above, does anything look a bit Hinky? What about that odd looking border to the image? Do the pixels give you any ideas? (<em>Nope its not Morse, but good thinking</em>)  What if I Say the pixels are lengths 1-7? That&#8217;s right they are binary 1’s and 0’s. Here is the binary output going from top, right, bottom, left:</p>
<blockquote>
<address>0100001101111001011100100110111001100110011100100010000001110</address>
<address>0110110001001111001011110010110001001101010001000000110011101</address>
<address>1101010111011001100110001000000111100101110110011000010111100</address>
<address>000111010001000000010000000100000001000000010000000100000</address>
<address>01110101011001110110011101100011011001100011101000101111001011</address>
<address>11011100000110110001101111011100100110010101100110011100100111</address>
<address>0000011010000110010101110110011001110110110001110000011101010</address>
<address>11011100111100101111001011100100110000101110100011100100010111</address>
<address>0011000100110010101110100001011100110100001111000001011110011</address>
<address>10000011001100110100011101110110011101100011001011100111010101</address>
<address>10011101111010011110010010000001110101011001110110011101100011</address>
<address>01100110001110100010111100101111011100000110110001101111011100</address>
<address>1001100101011001100111001001110000011010000110010101110110011</address>
<address>00111011011000111000001110101011011100111100101111001011100100</address>
<address>1100001011101000111001000101110011000100110010101110100001011</address>
<address>1001101000011110000010111100111000001100110011010001110111011</address>
<address>00111011000110010111001110101011001110111101001111001000000</address>
</blockquote>
<p>So a quick conversion to ASCII using one of the many free online app’s gives us :-</p>
<blockquote>
<address>Cyrnfr sbyybj guvf yvax: uggcf://plorefrphevglpunyyratr.bet.hx/834wgc.ugzy uggcf://plorefrphevglpunyyratr.bet.hx/834wgc.ugzy</address>
</blockquote>
<p><strong>Step 3: That’s almost readable.</strong></p>
<p>Gibberish right? did you guess the binary thing wrong? But, uggcf:// looks very much like https://,  in fact the characters are just 13 apart from each other? Yes, it really could be that simple. a ROT13 cipher.</p>
<p>we now have. :-</p>
<blockquote>
<p>Please follow this link: https://cybersecuritychallenge.org.uk/834jtp.html https://cybersecuritychallenge.org.uk/834jtp.html</p>
</blockquote>
<p><strong>Step 4: The New Code.</strong></p>
<blockquote>
<address>68edcdec4e2c8eae8d2c8e2dedcd6e04d2042fedae52ceac04ccedaecd8c042ccd</address>
<address>8c046cedad0e8dac8eac8c048e0dac044aa82889046c0d2c8d8daccdecacc504</address>
<address>2bedae4e04ee2dcd046ced8cac042d6e04046c2f4c664ea76e666cae4e268e2f4</address>
<address>56c0d088d8d66cdecac6546c6a506e6a546062606c504a141a1410a8dac2c6ea</address>
<address>c04acad2c2d8d048e0d2d6e046ced8cac048eed04edae4e048eac2cad042c8e0</address>
<address>4adac8c2d2c086c2f4cac4e6eac6cae4e2d8e2f6c0d2c8d8daccdecacc5ed4eecc5</address>
<address>ae6dc50429cc042fedae524eac048e0dac04cc2d4e6e8e040eac4e6eedcd048ee</address>
<address>d048ced046eed85042ccd8c046c2ccd040e4eedceac042fedae04adacac8e048</address>
<address>e0dac04ac8d2dec2d4c2d8d2d8e2f046c4e2d8eac4e2d2c0405484e2d8e2d6e0</address>
<address>d046c2d8e2d4faccd046cae4e4eaccd8e8d2f044eac6e2d8caccd8e042dcd048</address>
<address>e0dac04aa692504eeac04ee2d8d8d044cac042dcd048eedae6c0d048eed042c</address>
<address>8cce2d6eac040dedee048eed046c8d2c2dad042fedae4e040e4e2d4facc504eaa</address>
<address>c8d8d048cedcdac042ccd8c04eceded8c048dae6c6d042dcd048e0dac04682f4</address>
<address>cac4e046aac6cae4e2d8e2f04680d2c8d8daccdecac046cedad0eac8e2d8e2ded</address>
<address>cd6e048e2c6d2dcdec040e8d2c6cac048e0d4eedaeec0dedae8e048e0dac044e</address>
<address>ac6e8e04edcc048e0dac042fac2c4ec5</address>
</blockquote>
<p>I added the carriage returns to make the code fit on the page better. So are you wondering if there is a light at the end of the tunnel yet? and if there is, will it turn out to be a train?</p>
<p>Do not worry, you are just one step away from completing the challenge. there is nothing fancy about this last code, its a simple text substitution code,  swamping letters, numbers, &amp; symbols with two bit hex values. So using simple Number frequency analysis you can work out most the text in the message. (A clue to start you off, 04 appears 77 times so lets say space.  c5 is the last character so lets say . Adding the next 4 most popular characters will give you enough of a URL to get more characters)</p>
<p>Now using this method you will solve the message telling you how to report your success. You will just not get the actual code to use. But come on, you have the substituted vales for a, b, c, d, e, f, etc. You should be able to realise the system they used to pick the substitutions.</p>
<p><strong>Step 4: The end</strong></p>
<blockquote>
<p>Congratulations d2 you’ve found and completed the REAL challenge. Your win code is  <strong>REDACTED</strong>.</p>
<p>Please email this code to our team at <strong>REDACTED</strong>. If you’re the first person to do so, and can prove you meet the eligibility criteria (British citizen currently resident in the UK) we will be in touch to advise how to claim your prize. well done and good luck in the Cyber Security Challenge competitions taking place throughout the rest of the year.</p>
</blockquote>
<p>Well you did not expect me to just give you the code/email address so you could claim you solved it without doing some of the work?</p></div>
			</div><div class="et_pb_module et_pb_divider_17 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-cybersecuritychallenge-cipher-walkthrough/">Hackers &#8211; CyberSecurityChallenge Cipher – Walkthrough</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers &#8211; Britain’s Got Computer Talent.</title>
		<link>https://wayne-owens.uk/hackers-britains-got-computer-talent/</link>
		
		<dc:creator><![CDATA[Wayne Pendragon Owens]]></dc:creator>
		<pubDate>Mon, 26 Jul 2010 14:46:29 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://wayne-owens.uk/?p=3318</guid>

					<description><![CDATA[<p>The post <a href="https://wayne-owens.uk/hackers-britains-got-computer-talent/">Hackers &#8211; Britain’s Got Computer Talent.</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>On Monday the 26th July 2010 the UK Minister for Security Declares Cyber Security Challenge UK Open.</p>
<p>The Cyber Security Challenge is a series of national online games and competitions that will test the cyber security abilities of individuals and teams from every walk of life. It is designed to excite and inspire anyone considering a career in the cyber security industry.</p>
<p>The Challenge will identify talented individuals capable of becoming part of the UK’s cyber security profession now and in the future.</p>
<h3>Why should I participate?</h3>
<p>Participation in the Challenge offers three fantastic opportunities:</p>
<ol>
<li>The Challenge will award more than 30 superb prizes. These will include:
<ul>
<li>Places on the Detica Academy</li>
<li>Funded or part-funded places for masters-level university security courses</li>
<li>Funded security courses provided by SANS Institute.</li>
<li>Memberships of trade bodies and professional associations</li>
<li>Professional mentoring sessions</li>
<li>Time on the CREST penetration test rig</li>
<li>Delegate passes to industry conferences</li>
<li>An internship at one of the UK’s premier security companies</li>
<li>Prizes will be allocated based on individuals’ ambitions and the stage they are at in their career.</li>
</ul>
</li>
<li>The Challenge will provide participants with the opportunity to use world-class technology and facilities that would otherwise be inaccessible.</li>
<li>It will also provide a way for individuals to meet with, work with, and learn from some of the UK’s most prominent organisations in cyber security, education and politics.<br />Those who demonstrate excellent levels of skill and talent will be exposed to potential employers who will look favourably on anyone who can perform well throughout the Challenge.</li>
<li>The Challenge offers an opportunity for all participants to publicly demonstrate their cyber security skills and build their reputation with peers and potential employers as the UK’s most talented security experts.</li>
</ol>
<p>The first challenge to get yourself started with is up here</p>
<p>Get playing!.</p></div>
			</div><div class="et_pb_module et_pb_divider_18 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://wayne-owens.uk/hackers-britains-got-computer-talent/">Hackers &#8211; Britain’s Got Computer Talent.</a> appeared first on <a href="https://wayne-owens.uk">Wayne Pendragon Owens</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
