Sunday 27 November 2011

Researching The Hack: Some Unusual Research Methods

They aren't really all that unusual, because after all, anything that works - works!

Any time you get an idea for a new way of discovering more about an online system or the people who run it you should do your best to act on that idea. In the long run every bit of data is potentially useful. Anything you manage to find will either help you get in your present target computer, or get in an-other one some time in
the future.

Besides, it's always a delight to find confidential data or insider secrets about a system. Share that knowledge with other hackers and you will be re-warded with interesting tips that will be beneficial to you. Here are five further research methods: online computer simulators and tutorials; sorting through trash; found disk analysis; examining screenshots; and snooping.

Remember - these research meth-ods work. Use them to your advantage.