background preloader

Computing

Facebook Twitter

Ultimate Guide to Google Plus. I’ve seen quite a few people who don’t understand Google Plus or think Google Plus is some sort of wasteland with giant swaths of inactivity.

Ultimate Guide to Google Plus

I was one of these people until I decided to dive in and really explore the social network and become active on there to see what this G+ thing is all about. The end result is this guide, a complete Google Plus guide for the person who is just getting started, or quite simply, started but staring at a boring feed with zero activity. Take a look at the sections below and click any section that has your interest. The Google Plus Beginner Guide Sections When browsing this guide, you can click the below links to jump to the section you are interested in. How safe is your network? – Kali Tutorial.

Security is something that everyone needs to be aware of and something that everyone needs to deal with.

How safe is your network? – Kali Tutorial

While you can go out and collect a number of tools and utilities to help you out, there is an easier path. There are several Linux distributions out there that provide an entire suite of tools to fit your security needs. One of the more popular ones is Kali Linux (originally BackTrack). There are other ones, like BackBox or Lightweight Portable Security, which may fit specific needs better. How to Hack Your Own Network and Beef Up Its Security with Kali Linux. 18 Creative & Useful Ways To Use NFC Tags With Your Android Phone. Editor’s note: This post was originally published in October 2013 and has been completely updated and for accuracy and with more uses.

18 Creative & Useful Ways To Use NFC Tags With Your Android Phone

NFC (Near Field Communication) has been getting more attention by the media after becoming a technology for mobile payments and creative marketing. Most of the recent mobile devices support NFC, but most people don’t really know about or use it. NFC has a very uncertain future. DSL information. Protect your home or business from cyber crime. How to Use Your Cat to Hack Your Neighbor's Wi-Fi. Coco, modeling the WarKitteh collar.

How to Use Your Cat to Hack Your Neighbor's Wi-Fi

Gene Bransfield Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected. Coco the cat can hack your WiFi network with his WarKitteh collar. Coggle. Kali Linux - Part 4. The PinkHat Journal. Using a password manager on Android? It may be wide open to sniffing attacks. Whatsapp brings strong end-to-end crypto to the masses.

In a coup for privacy advocates, strong end-to-end encryption is coming to Whatsapp, a cross-platform instant messaging app with more than 500 million installations on the Android platform alone.

Whatsapp brings strong end-to-end crypto to the masses

Until now, most popular messaging apps for smartphones have offered woefully inadequate protections against eavesdropping. Whatsapp, which Facebook recently acquired for $19 billion, has itself been criticized for a series of crypto blunders only spooks in the National Security Agency would love. Most other mobile apps haven't done much better, as a recent scorecard of 39 apps compiled by the Electronic Frontier Foundation attests. Hacker Challenge: Share Your Clever Uses for USB Flash Drives. Tutorial How to build the Ultimate Bootable Custom USB Flash Drive with Multiple ISOs for Windows, Linux, Etc, and PortableApps for Windows Desktop. If you’re like me at all you probably have more flash drives than you want to carry around, especially when they could all probably fit on one.

Tutorial How to build the Ultimate Bootable Custom USB Flash Drive with Multiple ISOs for Windows, Linux, Etc, and PortableApps for Windows Desktop.

After my old 64GB flash drive took a dump I decided to purchase a new 64GB flash drive with USB 3.0 and compatibility for USB 2.0 and USB 1.1. When I got the new flash drive I was determined to figure out a way to get rid of my bulky CD case and just carry this one drive around with me. That means getting rid of all my Windows 7, Windows XP, Windows 8, Server 2003, Server 2008, Ubuntu 12.04, Linux Mint 13…I think you get the point. The problem is there’s no real easy way to create a flash drive that can store all of these, and boot into any of your choosing, and still be functional under Windows when using it for troubleshooting or repairing workstations…until now.

All of those applications run on Windows besides MultiSystem which proved to only run correctly under Ubuntu (and not just any Debian flavor). Format USB/Flash Drive With Fat32. Rebirth of BackTrack, the Penetration Testing Distribution. DE(E)SU - Liberté Linux. Summary Liberté Linux is a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments.

DE(E)SU - Liberté Linux

Tech. SURF ANONYMOUS. Do More Faster: 10 Best Apps & Tools. Tutorials. How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes. So, you think you're doing a pretty good job in terms of computer security on your home PC? You've kept your computer fully patched against the latest vulnerabilities? You've ensured that your PC is running the latest-and-greatest anti-virus updates? Latest computer security news, opinion and advice. Sydney wallows in cesspit of WiFi obsolescence and ignorance. Build a Business Case: Developing Custom Apps Sophos has brought its Raspberry-Pi-powered World of Warbiking WiFi-sniffing peloton to Sydney and found, as it does everywhere around the world, that some people just can't be bothered with WiFi security.

Sydney wallows in cesspit of WiFi obsolescence and ignorance

The Word of Warbiking sees Sophos' head of security research James Lynbe strap a Pi and various WiFi cards to his bicycle and then tour a city to get a feel for which versions of encryption are used by resident WiFi networks. In London, the penetrative peloton found 29.5 per cent were using either the dud Wired Equivalent Privacy (WEP) algorithm, or nothing. Sydney fared a little better, with just 3.98 per cent running WEP and 23.85 running naked.

HALF of London has outdated Wi-Fi security, says roving World of War, er, BIKER. Build a Business Case: Developing Custom Apps Wireless security across London remains flaky despite the well-known risks, according to an infosec bod who has been riding his bike all around town identifying insecure wireless networks and highlighting shoddy user behaviours that could be exploited by rogue hackers.

HALF of London has outdated Wi-Fi security, says roving World of War, er, BIKER

James Lyne, global head of security research at Sophos, went “warbiking” across the streets of the British capital over the course of two days. The Easiest Way to Transfer Files Wirelessly from Your Nexus 7 to Your Computer (& Vice Versa) « Nexus 7. The Easiest Way to Transfer Files Wirelessly from Your Nexus 7 to Your Computer (& Vice Versa) For the most part, transferring files from your computer to your Nexus 7 (and vice versa) is a simple process.

The Easiest Way to Transfer Files Wirelessly from Your Nexus 7 to Your Computer (& Vice Versa) « Nexus 7

Just hook up your tablet to your computer with the USB cable and transfer. However, most of the time you'll need additional software on your computer to do this, and then, of course, you need the USB cable. Here's how you can set up Netflix on your brand new Chromecast - Ausdroid. With Chromecast launching today in Australia, it’s hard to believe that these devices have been available in the US for almost a year. Explore the Second Life Physics Lab.

[an error occurred while processing this directive] Back in 1980, Papert proposed ‘physical microworlds’ (Papert, 1980), where, before being receptive to Newton's laws of motion, students could learn some other laws of motion, not as complex, subtle, and counterintuitive, build alternative laws of motion, evolving from the historically and psychologically important Aristotelian laws through the ‘correct’ Newtonian ones to the more complex Einsteinian ones. Second Life users can walk around, enjoy the 3D scenery, fly, drive cars and other vehicles, interact with other avatars, play games, or create complex objects, with many different textures, such as chairs, clothes, jewels, vehicles, guns and even entire buildings. Second Life Physics Lab I became interested in this new technology and started to create a microworld, a laboratory within the virtual environment Second Life to investigate its use. Feel free to visit my Second Life Physics Lab!

The Good Techie - Email Just Got A Whole Lot Better. PPC Luddite: GarageBand Alternative for Linux. It's called LMMS (Linux MultiMedia Studio). Recently I decided to get more into learning about and making music. I'm always on the lookout for productive outlets for my OCDing and thought this could be the ticket. Also it has the added benefit of making me stop regretting that I couldn't play a note of music. When looking for music production software on Linux, the first thing I became aware of is a lot of these programs require the JACK Audio server. Why you should root your Android device - Reasons & Benefits. Informatique. About Hackers & Hacks. 12 things to do after installing Linux Mint 16 (Petra) XFCE.

6 GarageBand Alternatives. The GarageBand alternatives featured here let you create pure musical masterpieces via your PC. They each slide to the forefront armed with a whole slew of exciting attributes that should have any musician or acoustic enthusiast grinning from ear to ear. Now while the software in question is solely fashioned to please Mac and iOS device owners, the options we’ve mentioned here go beyond that particular niche and attempt to satisfy audiophiles who prefer a different system altogether.

About Hackers & Hacks. How to Buy a Wireless Router. Google Tips, Tricks & Hacks. Virtual Conferences. Remove TornTV. Once you decide to install TornTV onto the personal computer, you may think that you are going to receive “Absolutely 100% free live sports!” GNU/Linux. Join.me.

Adsl

Mobile broadband. View topic - Scratch Build : L3p D3sk - Small update :P 15-7. 2 days from 09:00 till 23:00 and 10:00 till 17:00 Still seems like nothing has changed ^^ Breaking down already took a few hours. Build A Computer Into Your Desk For Easy Upgrades, Hidden Cables. Computer Desk Case. How to View Passwords Hidden Under Asterisks [Video] Google Chrome, Firefox and other browsers hide passwords behind asterisks but you can easily view the saved passwords using the built-in developer tools. Web browser hide passwords under asterisk characters for improved security. Learn. Portal 2 General Discussions. 2 Errata - Mageia wiki. From Mageia wiki.

Desk

Bodhi Linux. The following are instructions for installing Bodhi Linux on to your computer from a working Linux system via a USB stick (also known as a thumb-drive). This is the recommended method. Installation using another operating system or via CD/DVD is also possible, but not covered here. Remastering The Bodhi Linux Live CD. Linux. Bodhi Linux. The Best Linux Distribution 2013: Netbooks and Old Hardware.