Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Sa
Infohash:
2801FE3A5E874AA9745ECB3DCE67A1D5F7BCEEBE
Type:
Other
Title:
The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Sa
Category:
Other/Other
Uploaded:
2010-07-03 (by brainphreak)
Description:
The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety
NOTE: These videos are all recent, not OLD technology and most have great info that is timeless.
This torrent was created to introduce those in the truth community to various forms of hacking. I have hand
picked only videos and tutorials which I think will apply to those preparing for tragedy, martial law, large
EMP events, and overall survival. Many of the skills found on this DVD could save your life, be useful for
hacktivism, or help you setup your own communications network. I focused mostly on talks which were not too
technical for those who are not computer programmers, and many in fact do not need the use of a PC (my fav).
Topics include, voting systems, electronic billboards, picking locks, HAM radio, keeping yourself self secure
on social networks, survival skills from a hacker perspective, hacking with just your eyes, creating ID's
will full security features, police procedure, how constitutional laws apply in the digital age and much more.
See below for complete listing.
Enjoy, and feel free to ask questions if you have them!
**brainphreak**
---------------------------------------------------------
DVD CONTENTS (most taken directly from Defcon's website)
01 - Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival
- Explains the types of disasters you may need to prepare for, the importance of preparing BEFORE they
occur. Everything from leaving your house in 5 minutes, to being stuck without electricity for more than
5 hours. This video includes Fire, Shelter, Signaling, Water and more from a hackers perspective.
02 - Personal Disaster Preparedness: Surviving mass EMP events.
- Did you know a single warhead over the USA can take out ALL modern electronics? How do you get out of
the building? A giant EMP destroying all electronics and creating fires in some could be triggered by
solar flares, nuclear devices, EMP specific weapons etc. Avoid trampling, visibility, finding water, guns,
medicines, doctors, avoiding the panic and madness of others.
03 - No Tech Hacking - Hacking without the use of as PC
- You'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Gain info
about a person by looking at details such as the type of shoe and wear, taking photos of a PC screen or ID badge etc.
04 - Physical Attacks: Beyond Social Engineering and Dumpster Diving
- Techniques of industrial espionage and physical security, hacking without a computer, and collecting or
recording data both video and audio. Examples and methods covered include physically making your way through
electronic locks, numbered keypads, biometric locks, listening to keyboard strokes, listening with lasers, etc.
Also relationship based trust, including sex, fake resume's, and display of credentials.
05 - Identification Card Security: Past, Present, Future
- This great presentation covers the REAL ID Act, History of identification cards, Amateur ID Manufacturing,
and other High Tech ID concepts. Our reliance on ID, fake ID's, privacy issues, magnetic strips, rfid, etc.
Complete demonstration creating an ID with laminate, magstripe, hologram, UV, and where to purchase supplies.
06 - Lockpicking Forensics - How Lockpicking and Locks Work
- Learn the basics of how locks work on the inside. Detailed diagrams explaining how internal mechanisms are
designed and how they are defeated. Includes the various tools and methos used to open locks.
07 - Urban Exploration - A Hackers View
- The art of finding entry points into secured or abandoned buildings. Going to floors or areas of buildings
nobody else does. Preparing for the exploration of new areas which are possibly rotted, damaged, or otherwsie
unsafe. Also some great stories and pictures of places these speakers have gone to in their ventures.
08 - Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
- What is a secret? Why protect a secret? Why sharing secrets may increase secrecy, using encryption, where to
store the encryption key, how to eliminate the encryption key, distributing secrets among groups. Hiding data
inside images or audio (steganography), detecting hidden data, tools, physically hiding stuff at home and elsewhere.
09 - Everything about Police Procedure in 50 Minutes
- When can the police pull you over? When can they frisk you? How do they determine reasonable suspicion? This
talk explains how a cop decides to take interest in your activities. What miranda rights mean to you. when can
the police offer frisk you? when can they search your car? knock down your door? Speed traps etc.
10 - Search and Seizure Explained - They Took My Laptop
- A brief outline of the Constitutional laws, privacy, the ammendments and how they are applied to search and
siezure. Special focus on the 4th and 5th ammendments this talk describes various methods of search and seizure.
Simply being pulled over, scanners and xrays that are found in airports, or confiscation of equipment at the border.
Should you use a lock and key or a combination lock? How do emails, snail mail, and phone calls apply? Many examples.
11 - Your Mind: Legal Status, Rights, and Securing Yourself
- Some examples of how the laws are applied to you and your data. Data in various locations may be covered
under different laws. Use of encryption, and your level of education may put you in different categories.
What if you hide your data in laptops? usb sticks in your pocket? cell phones? websites? computer clouds?
What can be obtained by investigators if they look in your car computers? Prosthetic devices? Does your
computer really belong to YOU? What is the best protection? Social Networking, GPS, and more...
12 - Are You Socially Owned in the Cloud?
- Covers social networking and other sites which store your personal data. Including facebook, myspace,
Amazon, itunes, etc. Where does your info go? Who owns it? Can you delete it? What happens when the owner dies?
13 - Social Zombies - Your Friends Want To Eat Your Brains
- Social networks and blogs are the 4th most popular activity on the internet. How do these places make money
off of your personal info? Fake profiles and spotting bots. Using facebook to steal personal information or even
learn passwords. This talk covers various attacks, disinformation, spam, bots, and other exploits in these websites.
14 - How Can I Pwn Thee? Let Me Count The Ways
- This talk covers several techniques to hack into a system. From wifi hot spots to social engineering random
passengers on a flight. Also covers methods to keep yourself safe while travelling, and the most common security
risks observed in travellers, and hacking cell phones and bluetooth devices.
15 - Hacking and Playing with Barcodes
- How barcodes work. Learn about how they are used for routing in mail systems, transit systems, tagging of
items etc. This video also explains how to make or modify your own barcodes, methods to read them, and how to
use your own specially formatted barcodes to hack into systems that are not secure.
16 - Hijacking the Outdoor Digital Billboard Network
- Explains various types of digital billboards in use, the companies who create them. How these billboards work,
their security flaws, and tools used to hack into them. Covers both survellience, electronic, physical security,
and what not to do when hacking into these billboards.
17 - Death Envelope - Midieval Solution to a 21st Century Problem
- Covers the topic of a "death envelope". What is a death envelope? Who should create one? What should it contain?
This covers how to create the envelope, how to update the envelope, combining computers with physical access etc.
This information can be as simple as personal account info and passwords, or financial secrets.
18 - HAM for Hackers - Take Back the Airwaves
- Who is experimenting with HAM radio? What frequencies can you use? What can be broadcast? This covers the use of encryption, profanity, licensing,
wattage limits, amateur radio, and bandwidth. A great detailed intro into the technology in less than 20 minutes,
how to get started, how to utilize the frequencies for experimentation, and HAM radio users dying off.
19 - Climbing Everest - An Insiders Look at One States Voting System
- An insider hired to check the security of Ohios voting system explains how the entire system works, its flaws,
and how the technical systems work. Also details of who owns the voting machines, who designed them, and the fact
that 80% of all votes are currently being counted on systems made by 2 brothers who own 2 companies?
20 - Mobile Hacker Spaces
- A mobile hacking space put simply is a Van, mobile home, or bus, turned into a meeting space and set up to be
ready for classes, talks, wardriving, or just to check email while on a trip/outing. This presentation includes
everything you need to get a mobile hacker space up and running, the advantages and disadvantages are discussed.
00 - The Secret History of Hacking
- Explains the beginnings of hacking. Starting with phone hackers or 'phreaks' who could make free phone calls
soon taking complete control of the telephone systems. Covers the lives of Captain Crunch, Kevin Mitnick, Steve
Wozniak, and several other key hackers. Hackers were once embraced, due to bad press they are now feared.
00 - Web Warriors
- This documentary explains the differences between white hat and black hat hackers. Examples of hacks that have
been in the wild including virii, power grid hacks, etc. Hear from professional hackers about how the community
works, the motivation for their hobby, and utilizing hacked computers to work as a team against another target.
00 - Revolution OS
- This documentary explains how the free software foundation and GNU was created to ensure users could share
free software and source code. This was done as a reaction to Bill Gates and others who were upset about software
being shared freely between hackers and hobbiest. This program also explains the origins of the Linux Operating
System, Apache Webserver, the Support model, .
Painfully hand picked by **brainphreak** of www.theblackpacket.com for the good of the community! Enjoy!
Learn all this and you too can be a ninja! mwahahaha
Tags:
Files count:
44
Size:
4467.27 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
brainphreak (2010-07-18)
Apparently Demonoid does not agree with the material found in these torrents and felt the need to ban my account. Who would of expected that from an 'underground' torrent site? with all those 9/11 documentaries and info on Demonoid and they ban me over these? Not so much as an email... I did nothing but support them, but fuck them now... The next time I connect to their server it will be in a million session DOS attack.. *jk* I wouldnt waste my time on their POS tracker thats always breaking anyways...My Message to Demonoid:
fuck you demonoid, fuck you in the ass.
You can all go eat a bowl of dick.
mohsin0042700 (2012-01-21)
had any one downloaded yet ??????Files:
1. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/00 - Revolution OS.avi 701.37 Mb
2. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/00 - The Secret History Of Hacking.avi 244.38 Mb
3. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/00 - Web Warriors.avi 349.96 Mb
4. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/01 - Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival-pt2.pdf 7.79 Mb
5. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/01 - Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival.m4v 326.73 Mb
6. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/01 - Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival.pdf 1.42 Mb
7. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/02 - Personal Disaster Prepardness.m4v 113.32 Mb
8. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/02 - Personal Disaster Preparedness.pdf 473.70 Kb
9. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/03 - No Tech Hacking.m4v 103.23 Mb
10. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/04 - Beyond Social Engineering and Dumpster Diving.m4v 197.48 Mb
11. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/04 - Beyond Social Engineering and Dumpster Diving.pdf 6.89 Mb
12. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/05 - Identification Card Security - Past Present Future.m4v 176.51 Mb
13. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/05 - Identification Card Security - Past Present Future.pdf 20.57 Mb
14. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/06 - Lockping Forensics - How Lockpicking and Locks Work-wp.pdf 1.82 Mb
15. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/06 - Lockping Forensics - How Lockpicking and Locks Work.m4v 170.50 Mb
16. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/06 - Lockping Forensics - How Lockpicking and Locks Work.pdf 2.68 Mb
17. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/07 - Urban Exploration - A Hackers View.m4v 203.54 Mb
18. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/07 - Urban Exploration - A Hackers View.pdf 10.92 Mb
19. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/08 - Keeping Secret Secrets Secret and Sharing Secrets Secretly.m4v 140.71 Mb
20. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/08 - Keeping Secret Secrets Secret and Sharing Secrets Secretly.pdf 135.95 Kb
21. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/09 - Everything you wanted to know about Police Procedure in 50 minutes.m4v 92.82 Mb
22. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/09 - Everything you wanted to know about Police Procedure in 50 minutes.pdf 49.88 Kb
23. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/10 - Search and Seizure Explained - They Took My Laptop.m4v 173.81 Mb
24. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/10 - Search and Seizure Explained - They Took My Laptop.pdf 5.12 Mb
25. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/11 - Your Mind Legal Status Rights and Securing Yourself.m4v 160.96 Mb
26. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/11 - Your Mind Legal Status Rights and Securing Yourself.pdf 2.05 Mb
27. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/12 - Are You Socially Owned in the Cloud.m4v 50.06 Mb
28. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/12 - Are You Socially Owned in the Cloud.pdf 40.09 Kb
29. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/13 - Social Zombies - Your Friends Want To Eat Your Brains.m4v 149.96 Mb
30. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/13 - Social Zombies - Your Friends Want To Eat Your Brains.pdf 108.01 Kb
31. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/14 - How Can I PWN Thee - Let Me Count The Ways.m4v 187.05 Mb
32. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/15 - Hacking and Playing with Barcodes.m4v 182.46 Mb
33. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/16 - Hijacking the Outdoor Digital Billboard Network.m4v 73.58 Mb
34. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/17 - Death Envelope - Midieval Solution to a 21st Century Problem.m4v 155.22 Mb
35. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/17 - Death Envelope - Midieval Solution to a 21st Century Problem.pdf 208.52 Kb
36. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/18 - Ham For Hackers.m4v 75.61 Mb
37. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/18 - Ham For Hackers.pdf 1.18 Mb
38. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/19 - Climbing Everest - An Insiders Look at One States Voting System.m4v 193.59 Mb
39. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/19 - Climbing Everest - An Insiders Look at One States Voting System.pdf 5.66 Mb
40. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/20 - Mobile Hacker Space.m4v 176.52 Mb
41. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/20 - Mobile Hacker Space.pdf 736.30 Kb
42. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/README.txt 10.11 Kb
43. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/theblackpacket.jpg 104.36 Kb
44. The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety (DVD Master)/Torrent downloaded from Demonoid.com.txt 47 bytes