My advice to all CO’s concerning this issue is the same as it is whenever lib-tards and the “powers that be” try to FLEX their fascist muscles and “CONTROL” our guns or “BAN” our ammo….GEAR UP NOW and KEEP GEARING UP; THINGS ARE NOT GOING TO GET ANY BETTER FROM HERE ON OUT.-SF It’s time…
Tag: Anonymous
The Civilian Guide to Fighting ISIS Online
Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS…
Hackers can Disable a Sniper Rifle-or Change it’s Target
Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…
Using a LiveCD (or LiveUSB) Operating System
By: HCS Technical Staff (Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.) What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything…
Your Old Computer and You: Part 1
By HCS Technical Staff It was recently announced that Microsoft will be ending any and all support, including updates, for Windows XP in two short years. Nearly 45% of the world’s computers run Windows XP. This announcement just made the day of every malware writer and botnet owner and cyber-villain out there…
“At Loggerheads”
BY HCS Technical Staff Disclaimer: HCS and any affiliated persons are not responsible for anything that may result from the use or misuse of the information below. The unauthorized interception of anyone’s communications without their consent or the appropriate legal authority is a serious crime in most jurisdictions. This information is for academic study and…
Malware & Cyber Warfare
by HCS Technical Staff How is it done? Offensive computer attacks are usually conducted by exploiting flaws in a computer web interface (most often a “login screen”) or surreptitiously installing malicious software (“malware”) on targeted computers to produce a number of effects on the computer system or devices that it controls. How does it happen? In the broadest…
Using a Live CD Operating System
By: HCS Technical Staff (Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.) What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything…