background preloader

Ashwintr

Facebook Twitter

Ashwin

How To Fix Small Annoyances On The Web With Stylish [Firefox & Chrome] Web designers have an almost impossible job. They need to come up with one design that pleases everyone. When talking about a service like Gmail, used by countless millions of people all over the world, you can really drop the “almost” part – it’s just impossible. Even if a redesign is well liked by most people, there will always be users who really don’t like the new look. Sometimes there are enough of these users to force a company to backtrack, like Google recently did with the Gmail icon buttons. But what if there’s something you really hate, and the company doesn’t change it back? Introducing Stylish Stylish is a free add-on available both for Firefox and Chrome, and it lets you do something pretty magical – apply your own styles to webpage elements. For example, I had a problem with the default font size in Gmail. With Stylish, it was really simple, and I’ll show you how.

UserStyles.org If something is getting on your nerves, it is entirely possible you are not alone. 7 Tools Every Hacker Must Possess. 25 Resources On Penetration Testing. 8 Free eBooks With Hacking Tricks And Tutorials. 1. Hacking Ubuntu Linux The introduction of the book says, "Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels. " 2. The book carries Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS. 3.

The introduction of the book says, "This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. 4. 5. The introduction of the books says, "Admit it. 6. 7. Sources. 25 Best Linux Apps. 13 Things To Do After Installing Kali Linux. 10 Video Tutorials On Kali Linux. Learn JavaScript Through These 10 Good Video Tutorials! 1.Douglas Crockford, Advanced JavaScript Douglas looks closely at code patterns from which JavaScript programmers can choose in authoring their applications.

He compares familiar constructs like the Pseudoclassical Pattern with more unique patterns like the Parasitic Pattern that (he argues) run more “with the grain” of JavaScript. 2.Introduction to Javascript Expert technical trainer Mark Lassoff hosts this series of videos on the Javascript language. 3.JavaScript Tutorial Videos Learn JavaScript programming online free by viewing video tutorials by Adam Khoury. 4.Introduction to JavaScript and HTML5 Canvas Topics covered include fundamentals of the JavaScript language, creating an HTML5 page with a Canvas on it, drawing rectangles to the Canvas, and animation. 5.Speed Up Your JavaScript As an interpreted language, JavaScript is filled with hidden performance issues that conspire to slow down your code and ruin the user experience. 6.Introduction to Javascript Programming 10.YUI Blog.

A List Of 8 Free Wi-Fi Hacking Tools For You! 1.WiFi Hacker Pro Have you ever imagined that you can hack a password of any Wi-Fi network? Now you can with WiFi Hacker Pro. The application will help you to hack a password of any Wi-fi network. Application is very easy to use, you will hack it by just clicking on any network you want. 2.WiFi Hacker It allows you to hack an unlimited number of Wifi passwords in few minutes and without paying any cent.

The Wifi Hacker V3.2 guarantees the hacking of any wireless network without any problems, and makes it easier. 3.WiFi Password Hacker ULTIMATE This app allows to simulate hacking and cracking of wireless WEP, WPA and WPA 2 encrypted network. 4. With WiFi Buddy you can quickly and easily connect your Smartphone to a WiFi network, where you’ll enjoy a quicker and more reliable internet experience, and you won’t use up your mobile data allowance. 5.WiFi Hacker Pro 6.AirSnort AirSnort is a Linux and Microsoft Windows utility (using GTK+) for decrypting WEP encryption on an 802.11b network. 6 Programming Languages That Many Programmers Dislike But Can't Avoid! 10 Websites To Learn Coding Interactively. 1. Codecademy Thanks to its helpful interface and well-structured courses, Codecademy is indisputably the most famous website to teach you to code interactively.

You can make your pick amongst Web Fundamentals, PHP, JavaScript, jQuery, Python, Ruby and APIs. Every lesson carries a panel which can explain the necessary code and instruction. 2. Take our words, Code Avengers is designed to make you fall in love with programming. You can also play with the code and immediately see how the changes impact. 3. After you finished courses in Codecademy or Code Avengers, and you are ready to step further, Code School is the right place to be at. Overall, the courses are categorized into 4 main streams i.e. The courses are streamlined with excellent design and informative screencasts.

Most of the offered courses are free, some of them will require you to spend $25/month to access the entire course including all screencasts and challenges, and also all other courses in Code School. 4. 5. 6. 7. 8. 9. 10 Websites To Learn Coding Interactively. Top 7 Cyber Criminals That Are Most Wanted By FBI. REWARD: The FBI is offering a reward of up to $100,000 for information leading to the arrest of Alexsey Belan. Alexsey Belan was put under the charge of intruding into the computer networks of three major United States-based e-commerce companies in Nevada and California between January of 2012, and April of 2013. He allegedly stole the user databases including the user data and the encrypted passwords of millions of accounts which was then used to negotiate for the sales of the databases. Belan carries a Russian citizenship and holds a Russian passport. REWARD: The FBI is offering a reward of up to $50,000 for information leading to the arrest of Peteris Sahurovs.

Peteris Sahurovs was allegedly involved in international cybercrime scheme that made use of computer virus which involves online sale of fraudulent computer security programs that victimised more than $2 million internet users between February of 2010 to September of 2010. Shailesh Kumar P. Sundin belongs to Sweden. Femme Fatale: 8 Of The Most Notorious Female Hackers. Bold and beautiful, these women have gone on to create some serious buzz and some great headlines time and again! The fairer sex manages to inspire and amaze us all, no wonder they are giving men some serious competition on all fronts across domains. The world of technology too boast of some real inspiring women who have achieved rare milestones. However, hacking is what we are looking at today. We have compiled here a list of 8 of the most notorious female hackers that abound the digital world. 1.Susan Headley aka Susy Thunder/Susan Thunder -A member of the notorious hacking group Cyberpunks (during the late 1970s and early 1980s), Headley was one of the first females to join the group and specialised in social engineering. 2.Joanna Rutkowska 3.Jude Milhon aka St Jude -Beginning her career as a computer programmer in 1967, Jude Milhon went on to become the founding member of the hacker group known as Cypherpunks. 6.Kimberley Vanvaeck aka Gigabyte 7.Adeanna Cooke aka Hacker Fairy.

Top Hacking Tools And Software. IIT Kanpur engineers unveil new supercomputer, 5th most powerful in India | Digit.in. IIT Kanpur has launched its second supercomputer this week. The new supercomputer is the 5th best in India in terms of its performance and is the best 130th in the world’s top 500 supercomputers list, published in November 2013. The computer was developed at IIT-Kanpur by a team lead by the institute's deputy director SC Srivastava. Ashish Dutta, head of the computer centre unveiled the computer stated that the new supercomputer would be used by the institute for education, research and training. The new supercomputer will benefit IIT Kanpur's advanced aircraft design and scientific agri-forecasting projects.

The computer was manufactured by HP and assembled and tested by a team of engineers headed by IITK’s deputy director SC Shrivastava.. Supercomputers are used in many areas of science and engineering research," said Dutta. "The general area of research that uses supercomputers is called high-performance computing (HPC). This is the second supercomputer by IIT-Kanpur. Source: TOI.

These 8 Hacks Will Make Your Firefox Browser Lightening Fast! 1.Enable pipelining To enable it: Type about:config in the address bar > double-click network.http.pipelining and network.http.proxy.pipelining so their values are set to true > double-click network.http.pipelining.maxrequests > set this to 8. This will dramatically reduce page download times. 2.Render quickly Type about:config and press Enter > right-click (Apple users ctrl-click) somewhere in the window and select New > Integer > Type content.notify.interval as your preference name > click OK, enter 500000 > click OK again > Right-click again in the window and select New > Boolean > create a value called content.notify.ontimer > Set it to True. 3.Faster loading Type about:config and press Enter > right-click in the window and select New > Integer > Type content.switch.threshold > click OK > enter 250000 > click OK. 4.No interruptions 5.Block Flash Installing the Flashblock extension will block all Flash applets from loading, web pages will therefore display much more quickly. 8.Compress data.

Everyday habits that are damaging your back. Looking To Speed Up Your Wireless Connection? Here Are Some Tips! 1.Your equipment might be the problem Your equipment might be the black sheep for starters. Notably, your wireless speed will only be as fast as the slowest piece of equipment you got. Therefore it's ideal you check the speed you're getting on each of the devices you're using. Then connect these devices directly to the router to ascertain the loss. 2.Router positioning Your router positioning might be the reason of slower speed since placement of your router is key to determine the speed you're receiving. 3.Antennas could help Adding an antenna to your router and your devices could help in boosting your wireless connection. 4.Repeaters could help too A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances. 5.Change the band and the channel 6.Shut down bandwidth consumers 7.For heaven's sake, get a better provider!

Saurabh Singh, EFYTIMES News Network. Builds India's fastest PC worth Rs 16.5 lakhs Slideshow - Slide 1. The Revolutionary Quantum Computer That May Not Be Quantum at All | Enterprise. Better yet, Rose and Ladizinsky predicted that a quantum annealer wouldn’t be as fragile as a gate system. They wouldn’t need to precisely time the interactions of individual qubits. And they suspected their machine would work even if only some of the qubits were entangled or tunneling; those functioning qubits would still help solve the problem more quickly. And since the answer a quantum annealer kicks out is the lowest energy state, they also expected it would be more robust, more likely to survive the observation an operator has to make to get the answer out.

“The adiabatic model is intrinsically just less corrupted by noise,” says Williams, the guy who wrote the book that got Rose started. By 2003, that vision was attracting investment. The D-Wave team huddled in a rented lab at the University of British Columbia, trying to learn how to control those tiny loops of niobium. As I watch, Hilton pulls out one of the wafers just back from the fab facility. Rose quietly panicked. Recycling CPUs Processor Heat. Hack a $30 WiFi Pan-Tilt Camera - Video, Audio, and Motor control with Python.

In this Instructable, you'll learn how to intercept the video, microphone, and controls of the $30 Kaicong SIP1602 wireless pan-tilt camera on Windows, Linux, or OSX! Everything is rolled neatly into python scripts; you can use the output data for things like voice transcription, computer vision, and automated directional control. If you're feeling truly adventurous, keep on reading and you'll learn my methods to discover and reverse engineer wireless cameras! Installation time: ~30 minutes You will Need: A Kaicong SIP1602 WiFi Pan-Tilt Camera NOTE: Apparently the popularity of this Instructable wiped out Amazon's stock. Others have reported that this $45 Tenvis camera is a good substitute. A computer or network router with an ethernet port A working 802.11B/G wireless network (wireless N isn't supported with this camera) Basic knowledge of command prompt or terminal (change directories, run a file)

Silicon Valley’s Youth Problem. Photo The Cisco Meraki office in Mission Bay, San Francisco, is 40 paces from the water, and just as nice as Google’s. On a clear winter day in late December, I sat in one of its conference rooms with a company spokeswoman on my right and Sanjit Biswas on my left, peering out through floor-to-ceiling glass. On the other side: brightly patterned furniture, murals and paneled wood, a well-stocked cafeteria, a deck with spectacular views of the bay.

Twelve months earlier, in a deal meant to bring fresh edge to Cisco, the networking behemoth bought Meraki from Biswas and two co-founders for $1.2 billion. Now they were making good on their promise — starting with the décor. Like Cisco, Meraki makes networking equipment — routers, wireless devices and the software to manage them, the sorts of products that even by tech standards have always been a little short on glamour.

Continue reading the main story As an enterprise start-up, Meraki has been impeded by its distance from the web scene. The Infinite Lives Of BitTorrent. Bram Cohen sits at a round desk, surrounded by a pod of open cubicles. He looks lonely and isolated out here, hardly befitting the tech celebrity he’s become. This is the guy who single-handedly changed the way files are transferred on the Internet. His technology helped create one of the greatest headaches in Hollywood history. He birthed the term--BitTorrent--synonymous with piracy, or a radical rethinking of how to organize the Internet, depending on which side you take.

But here at his company’s headquarters, where he was once CEO, he’s now functionally a product manager. Most people know BitTorrent as a technology used to illegally download music and movies, but what few realize is that it’s also a company, a venture-backed startup like any other. That’s only part of BitTorrent’s circular rises and falls. Revenue now comes to BitTorrent in many forms. Cohen doesn’t join the hackathon this time. “Take them apart,” he says. But the opportunity was hard to resist. And Cohen? ZigBee. ZigBee was conceived in 1998, standardized in 2003, and revised in 2006. The name refers to the waggle dance of honey bees after their return to the beehive.[2] Overview[edit] ZigBee is a low-cost, low-power, wireless mesh network standard targeted at wide development of long battery life devices in wireless control and monitoring applications. Zigbee devices have low latency, which further reduces average current.

The ZigBee network layer natively supports both star and tree networks, and generic mesh networking. ZigBee builds on the physical layer and media access control defined in IEEE standard 802.15.4 for low-rate WPANs. ZigBee is one of the global standards of communication protocol formulated by the relevant task force under the IEEE 802.15 working group. History[edit] ZigBee-style self-organizing ad-hoc digital radio networks were conceived in the 1990s. Cluster Library[edit] ZigBee PRO[edit] Use cases[edit] Typical application areas include:[7] Standard and profiles[edit]