Donate to us via Paypal!
You cannot teach a man anything; you can only help him find it within himself. - Galileo
Sunday, April 18, 2021
 Need Help?
Members Online
Total Online: 74
Guests Online: 74
Members Online: 0

Registered Members: 135473
Newest Member: Linzo21
Latest Articles

Articles: Other

10 Commandments Day

Is this the end?

10 Reasons not to get an os

Ten reasons not to get an operating system.



Analog Satellite TV (C-Band) Reception

A quick tutorial on how to get free analog satellite TV channels from all over the earth (every continent), Africa, Europe, N+S America, Australia, Russia, etc...


This little guide will help you protect yourself from data recovery.

Are You Addicted to the Internet Quiz

Take the quiz and find out. The Internet Addiction Test is adapted from Dr. Kimberley S. Young\\\'s book Caught in the Net

Are you cheating your self?

I am resubmitting this Article since it was lost in light of the business with layeredtech. Thanks to all who rated and left comments before. Please rate and feel free to comment.

Artificial Intelligence

I wrote this a while back and thought it would be good to post on here to start some good debates or conversations. This article is a thought prosses on what gaps the real human mind with that of AI

Cisco any one?

Routers and Switches.....I would rather own them, than just pass through

Computerized Revenge

Fun things to do to an ass's computer :D

Crack Hotmail

Don't Hack Hotmail, Just Crack It

Declaration of the Independence of Cyberspace

Declaration of the Independence of Cyberspace

Dream Interpretation, Psychology

Dream Interpretation; Exploring the Subconscious By: maug

Elevator Hacking

Bypass all stops on an elevator...except for yours of course...

Firefox Browser Hacking

Firefox Browser Hacking

Firefox Optimization Guide.

This article aims to set out the optimal settings for Mozilla Firefox and explain what it is they do. PM me if ya want instructions on how to apply the settings or for info.

Flash 8 Animating. Step two

The next step in animating with Flash 8

For New Members

Help for new members. Send them here.

Fun With Math And Science

This is just some interesting permutations of 2 + 2 = 5. This is not hacking related, rather, more of \"out of the box\" thinking.

Gaining access to store display computers.

A simple method of gaining admin on store display computers, no longer the need to crack the SAM file!

Game of Life

A small article examining the influence of Conway's Game of Life on the hacker culture.

Get IP over Msn

As it says.

Glossary of Information for HACKER TERMS

just wonder what the terms are that we the people of tomorrow then read this


This article includes description of the most used hacking slang. It doesn't go to much depth, but hopefully gives the general idea...

Google Hacking

Google Hacking

HP printer Display Hack

This tut will allow you to change the display of most HP printers

Hack to View Wii Shop

Now You Can Hack Wiis

Hacker Terminology

An insight into black hat, white hat, grey hat, brown hat and script kiddies - what are they and how to know if you are one.

Hacking into School Folders.... Made Easy

Easiest possible ways to get into school network folders.

Hacking your school

Hack your school,open cmd at school, bypass webfilters, and much more....

Hacktivism: history & stories

originally written for the HBH Zine

Hardware Virus

An article about howto create an Hardware Virus and how to help spread it into the world. I have seen more of these types of viruses. Many on youtube, Most just at my home.

Hex to Asm

List of helpfull ASM commands in Hex

How to build a miniature remote controled spybot

Build a miniature remote controlled spy robot with video and sound capabilities. Cool project I learned a while back and feel it may be interesting to some other \"techno geeks\" out there. With some of the same abilities used by the military and police force. basic electronic / soldering / welding skills may come in handy. I assume most of you have a little coding knowledge. apparently it seems that people did not understand when i wrote that this is a \"project i learned\" I learned it a couple years ago from a torrent file i downloaded called \"electronic projects\" thanks to Goofus i know know that it comes from a book called \"101 projects for the Evil Genius\" though the torrent that i downloaded was only a few chapters from that book. so download the book read the book and see that i wrote it much simpler as you can see this article is not 10 or more pages from a book

Latest Hacker exploit

Aim is the latest to be hit by Hackers

Logging an unsuspecting user on ur network

A great method if ur at work or at a library with alot of computers.

Me and my router

Basically, I forgot my router password, and couldn't find an article on how to reset it without resetting the router, so, I got lucky, figured it out and thought I should share...

Net Send users anonymous over the network

how to send anonymous net send messages across the network.

NetBIOS Hacking

NetBIOS (Network Basic Input/Output System) Hacking

New To Mozilla Firefox? Read This!

a list of good addons for mozilla to get you started and my first article ;)


A guide to get newbies on their feet to learning to hack

Optimising Firefox

An article to help make your browsing experience more enjoyable, covering extensions, mods in the config and other things

Optimising Firefox

An article to help make your browsing experience more enjoyable

Pad Lock Shim

want to get into your school lockers with the little dail

Philosophical like essay

Short essay on the net

Pipelining FireFox

How to speed up your requests using FireFox. (requires highspeed connection, no dial up)

Positional Number Systems

A tutorial on decimal and non-decimal number systems, conversions between them, and a few potential uses.

Quantum Computers

A new 'state' of mind.

RSS Tutorial

A semi decent RSS guide. Just the basics.

Reality Vs. Fantasy: An ongoing war within ourselves.

This is the second article I've written. this deals with the way we perceive things on a daily basis, and what we determine is real, and what is fantasy.

Skype It

Skype: Encrypted and ready to roll. Let\'s replace AIM.

Solidox Bomb

This is how to make a bomb out of Solidox and sugar

Supercharge a Dart gun

wanna anoy a co-worker or shoot your friend or just plain piss off your siblings well this article is for you

Systems and What each is good for.

Building your own computer can cost a lot more than the cost to have someone else build it for you! Here are some tips on what to look for in what kind of machine.

TCP/IP Addresses Explained

A break down of TCP/IP addressing

TCP/UDP A brief overview

This is a basic look at the roles and structures of the transport control protocol and the user datagram protocol.


Well scaning the Internet and found this dont know how good it is but It looks like a Hacker zine so what the hell

Terminal Rentagrade

THE REASON WE ARE By T,I,C Pass this along give it to other send it to the papers NO LITTLE MAN... WE HAVE JUST BEGAIN...

The Right "title"

The right title awaits your choice of action... Hacker or not Hacker? That is the question.

The Computer Fraud And Abuse act

The COmputer Fraud and Abuse act (as amended Oct. 3, 1996)

The Dunning-Kruger Effect

...and how it applies to you

The Fourth Amendment

Search and Seizure

The Meaning of `Hack'

The Meaning of `Hack' Found on Cool Jargon of the Day

The Outbreak of "Chat-Hackers"

It seems as days go by, the acclaimed "Digichat" software is bypassed more and more, and younger kids/teens are gaining Admin using a few simple tools... Read on if you'd like to hear my two cents.

The Rainbow Hat

A new taking on TRH

The Revised Great hacking war

Sources from Wiki and re written

The Tetris Effect

A quick overview on a psychological condition known as "The Tetris Effect."

The great hacker war

short but interesting

The guide to good revision

Hate revision?? want to boost your grade?? follow the link for my guide on how to make revision more productive and less draining.

The things that are wrong with our society and globalization

How developed countries and big buck corporations look at society and globalization of developing countries. Why do they do this?

The truth about truth(s)

An article about truth.

Theory on optimism and pessimism

Theory on optimism and pessimism by system_meltdown.

Trashing, a complete guide!

My first article on a very powerful and usefull way to obtain information on your targets for hacking and social engineering...

Tunneling TCP traffic

THis article will giude you through tunneling TCP traffic over HTTP and ICMP with use of few tools

USB lamp.

To help with the late night hacking although IBM have lamps built in Fn+pgUP

Uniguest bypass

Exploiting the Uniguest kiosk system

Urban Exploration

Going places you aren't supposed to go

Useful Commands in BAT/DOS

BAT/DOS Commands

What Happens If the RIAA Targets You

If you’re pirating music and video using BitTorrent or LimeWire, here’s what to expect if the lawyers come calling.

What makes a leader?

What makes a leader?

When you are this smart they call you MR

This is a talk in IRC ( #hbh) that I had with a guy.

Who's watching you?

Who's watching you?

Why you Should Care

JUST a banch of things about Hackers nothing really good but who cares


Explaining the differences, and why to use XHTML

a quick guide to ds homebrew

Details on how to set up, the difference between different kinds of hardware, patching homebrew, types of exploits.

computer lab pranks

endless laughs with easy to use scripts etc...pls rate this

computer survey

ever wanted to take a computer survey FOUND IT JUST BY GOOGING IT you might have to print it out


An article about how I found an xss hole in hbh

Most Read Articles

Selecting Your First Programming Language

Reads: 223351

If you are stuck wondering were to start in your programming adventure this is the article for you.

Complete Set Of CGI-BIN Exploits and what they do

Reads: 210074

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

The Impact of the Gold Rush on Western Society

Reads: 193648

Essay for school on Gold Rush. Not really about western society. Just added "western society" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Root in Under Five

Reads: 169198

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 162225

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 139939

A quick overview on a psychological condition known as "The Tetris Effect."

Google Hacking

Reads: 132451

Google Hacking

MySQL injection complete tutorial

Reads: 101544

MySQL injection tutorial by sam207... please rate/comment it

Basic 1 to 17

Reads: 92932

This article is got it....BASIC 1 TO 17! This is a :"how-to-" and may contain some spoliers.

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 88574

Brute-Forcing Logins on Remote Services.

Introduction to Programming I: Installation

Reads: 79740

Python, Ruby, C, C++ and Java.

Game of Life

Reads: 77075

A small article examining the influence of Conway's Game of Life on the hacker culture.

Camera Hacking with Google

Reads: 75837

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Basic Web Hacking *ALL*

Reads: 74413

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*


Reads: 65631


Latest Articles

Introduction to Programming I: Installation

Reads: 79740

Python, Ruby, C, C++ and Java.

Complete Anonymity Guide.

Reads: 39238

How to be Anonymous online and more.

PLC Electronic Basics

Reads: 28895

An overview of how electronics play a role in PLC development.

Introduction to PLC

Reads: 27386

Basic overview of a PLC

Using Google Search AJAX API in Python

Reads: 37714

This article hopefully teaches you how to use Google Search AJAX API in Python.

Pen testing 2 walk through

Reads: 32496

a walk through on the pen testing 2

Top 10 Simple Home Security Tips

Reads: 34987

Easy Home Networking Tips!

Pen Testing 2

Reads: 30661

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 34891

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 26306

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 29841

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 41748

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 37640

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 30501

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 20655

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.