If it's connected, we can break into it.   Downloads  |  About Us  |  Contact  |  Careers  |  News  | 

 
 
 Emergency  |  SanityCheck|  Penetration Test |  Risk Assessment | Product Testing | Security Solutions |
  Check your security NOW!
  Latest Security News 
 
"So in war, the way is to avoid what is strong and to strike what is weak."  - Sun Tzu, The Art of War
 
 

Greyhat Legal

Greyhat will NOT at any time entertain offers or solicitations for unlawful acts. All communications of this nature will be forwarded to the proper authorities. Solicitation to commit a crime is, in itself, a crime. 

This is a private secured computer system. It is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site, law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized site. All activity is logged with your host name and IP address. Unauthorized or improper use of this system may result in civil and criminal penalties. By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use.

LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning.

 
Greyhat LLC   © 1998-2005  All Rights Reserved Worldwide   | Is Hacking legal? | WhatisGreyhat | Legal | Privacy |
Updated 03.27.05  dated