background preloader


Facebook Twitter

Ultimate Guide to Google Plus. I’ve seen quite a few people who don’t understand Google Plus or think Google Plus is some sort of wasteland with giant swaths of inactivity. I was one of these people until I decided to dive in and really explore the social network and become active on there to see what this G+ thing is all about. The end result is this guide, a complete Google Plus guide for the person who is just getting started, or quite simply, started but staring at a boring feed with zero activity.

Take a look at the sections below and click any section that has your interest. The Google Plus Beginner Guide Sections When browsing this guide, you can click the below links to jump to the section you are interested in. What are Google Plus Circles? Think of Google Circles as categories. This video, created by Google, shows you exactly how Circles work, how you interact with them, how to add people to them, and so much more.

Is Google Plus a Wasteland? Click here to go to Scott Buehler’s Hyperball Circle Share. How safe is your network? – Kali Tutorial. Security is something that everyone needs to be aware of and something that everyone needs to deal with. While you can go out and collect a number of tools and utilities to help you out, there is an easier path. There are several Linux distributions out there that provide an entire suite of tools to fit your security needs. One of the more popular ones is Kali Linux (originally BackTrack). There are other ones, like BackBox or Lightweight Portable Security, which may fit specific needs better. You can run these off of a bootable DVD or USB drive, allowing you to run forensics on a compromised machine.

Alternatively, you could install it on a box and set it up on your network for a more permanent security solution. In this tutorial, we’ll use Kali Linux to go through one possible set of steps to analyse and test your local security. Resources Kali LinuxMetasploit Step by Step Step 01 Download and install The first step is to get a copy of Kali Linux to work with. Step 02 Hardware detection p0f. How to Hack Your Own Network and Beef Up Its Security with Kali Linux. 18 Creative & Useful Ways To Use NFC Tags With Your Android Phone. Editor’s note: This post was originally published in October 2013 and has been completely updated and for accuracy and with more uses. NFC (Near Field Communication) has been getting more attention by the media after becoming a technology for mobile payments and creative marketing. Most of the recent mobile devices support NFC, but most people don’t really know about or use it. NFC has a very uncertain future. Whether or not NFC becomes a widely adopted technology, it also needs to lose its image.

Most people still think that NFC is only used for mobile payments and data transfer. That is not true! There is more fun and practical stuff you can do with NFC: using NFC tags! NFC tags can be small stickers, which contain a small unpowered NFC chip. For the ones who haven’t programmed NFC tags before, we created a short video tutorial: And if you are planning to get some for yourself, check out this decent starter kit. At home Wi-Fi, turning off bluetooth and turning up the ringer volume. To sleep. DSL information. Cyber Street | Protect your home or business from cyber crime.

How to Use Your Cat to Hack Your Neighbor's Wi-Fi. Coco, modeling the WarKitteh collar. Gene Bransfield Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. He spent three hours exploring nearby backyards. He killed a mouse, whose carcass he thoughtfully brought home to his octogenarian owner, Nancy. And while he was out, Coco mapped dozens of his neighbors’ Wi-Fi networks, identifying four routers that used an old, easily-broken form of encryption and another four that were left entirely unprotected. Unbeknownst to Coco, he’d been fitted with a collar created by Nancy’s granddaughter’s husband, security researcher Gene Bransfield.

And Bransfield had built into that collar a Spark Core chip loaded with his custom-coded firmware, a Wi-Fi card, a tiny GPS module and a battery—everything necessary to map all the networks in the neighborhood that would be vulnerable to any intruder or Wi-Fi mooch with, at most, some simple crypto-cracking tools. Skitzy the cat. Homepage image: Moyan_Brenn/Flickr. Coco the cat can hack your WiFi network with his WarKitteh collar. Your cat probably does some pretty awesome, YouTube-worthy tricks. Chances are, however, that your cat isn’t quite the geeky little feline that Coco is. Coco, you see, can hack WiFi networks.

Not on his own, mind you. Coco’s got a special collar that was whipped up by security researcher Gene Bransfield. He spent hours upon hours creating WarKitteh, a fur-wrapped collar that’s wired for WiFi reconnaissance. While Bransfield has all the electronic and coding skills required to whip up WarKitteh himself, he needed a bit of help from a kindly neighbor lady to finish the collar off. His first feline operative, Skitzy, turned out to be a little too laid back to be of much use. Bransfield is hopeful that his project will increase awareness and convince people that it’s time to pay more attention to the security of their home networks. Images courtesy Gene Bransfield. Coggle. Linux Blog | Kali Linux - Part 4. The PinkHat Journal. Using a password manager on Android? It may be wide open to sniffing attacks.

Whatsapp brings strong end-to-end crypto to the masses. In a coup for privacy advocates, strong end-to-end encryption is coming to Whatsapp, a cross-platform instant messaging app with more than 500 million installations on the Android platform alone. Until now, most popular messaging apps for smartphones have offered woefully inadequate protections against eavesdropping. Whatsapp, which Facebook recently acquired for $19 billion, has itself been criticized for a series of crypto blunders only spooks in the National Security Agency would love. Most other mobile apps haven't done much better, as a recent scorecard of 39 apps compiled by the Electronic Frontier Foundation attests. Many fail to implement perfect forward secrecy, which uses a different key for each message or session to ensure that an adversary who intercepts a key can't use it to decrypt old messages.

The notable exception among popular messaging apps is Apple's iMessage, but it's not available for Android handsets. Hacker Challenge: Share Your Clever Uses for USB Flash Drives. Tutorial How to build the Ultimate Bootable Custom USB Flash Drive with Multiple ISOs for Windows, Linux, Etc, and PortableApps for Windows Desktop. | If you’re like me at all you probably have more flash drives than you want to carry around, especially when they could all probably fit on one. After my old 64GB flash drive took a dump I decided to purchase a new 64GB flash drive with USB 3.0 and compatibility for USB 2.0 and USB 1.1. When I got the new flash drive I was determined to figure out a way to get rid of my bulky CD case and just carry this one drive around with me.

That means getting rid of all my Windows 7, Windows XP, Windows 8, Server 2003, Server 2008, Ubuntu 12.04, Linux Mint 13…I think you get the point. The problem is there’s no real easy way to create a flash drive that can store all of these, and boot into any of your choosing, and still be functional under Windows when using it for troubleshooting or repairing workstations…until now. All of those applications run on Windows besides MultiSystem which proved to only run correctly under Ubuntu (and not just any Debian flavor). Format USB/Flash Drive With Fat32. Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution.

DE(E)SU - Liberté Linux. Summary Liberté Linux is a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments. Whether you are a privacy advocate, a dissident, or a sleeper agent, you are equally likely to find Liberté Linux useful as a mission-critical communication aid. Download Liberté Linux 2012.3, released on 2012‑09‑01 (pick binary image for full functionality): Why should you choose Liberté over alternative open-source, commercial, or military systems? Unobtrusiveness Liberté promptly installs as a regular directory on a USB/SD key, taking ≈210 MiB of disk space, and not interfering with other files present on the media.

Security Liberté Linux is shipped with the Hardened Gentoo kernel, which includes all grsecurity/PaX security enhancements — radically improving system's resistance to software exploits. Persistence Communication Anonymity Invariance Privacy Desktop Integrity. Tech. SURF ANONYMOUS. Personal Productivity | Do More Faster: 10 Best Apps & Tools. Tutorials. How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes. So, you think you're doing a pretty good job in terms of computer security on your home PC?

You've kept your computer fully patched against the latest vulnerabilities? You've ensured that your PC is running the latest-and-greatest anti-virus updates? Good for you. Now, how about your router? My suspicion is that the typical computer user doesn't give a second thought about whether their router could be harbouring a security threat, imagining that the devices don't need to be treated with suspicion. But if you think that, you're quite wrong. Fabio Assolini, a researcher for Kaspersky Labs, gave a fascinating presentation at the Virus Bulletin conference in Dallas last week, describing how more than 4.5 million home DSL routers in Brazil were found to have been silently hacked by cybercriminals last year. Here's how the attack came about. You're on Google's website, but you're not on Google's website How was this possible?

Exploited routers using malicious DNS servers . Graham Cluley | Latest computer security news, opinion and advice. Sydney wallows in cesspit of WiFi obsolescence and ignorance. Build a Business Case: Developing Custom Apps Sophos has brought its Raspberry-Pi-powered World of Warbiking WiFi-sniffing peloton to Sydney and found, as it does everywhere around the world, that some people just can't be bothered with WiFi security. The Word of Warbiking sees Sophos' head of security research James Lynbe strap a Pi and various WiFi cards to his bicycle and then tour a city to get a feel for which versions of encryption are used by resident WiFi networks. In London, the penetrative peloton found 29.5 per cent were using either the dud Wired Equivalent Privacy (WEP) algorithm, or nothing.

Sydney fared a little better, with just 3.98 per cent running WEP and 23.85 running naked. Lyne opined, in a lamentably bacon-free post-ride briefing, that Sydney's results and those from around the world come about because some people fall through the cracks despite the security industry's ongoing attempts to scare their pants offeducate them about best practice.

HALF of London has outdated Wi-Fi security, says roving World of War, er, BIKER. Build a Business Case: Developing Custom Apps Wireless security across London remains flaky despite the well-known risks, according to an infosec bod who has been riding his bike all around town identifying insecure wireless networks and highlighting shoddy user behaviours that could be exploited by rogue hackers. James Lyne, global head of security research at Sophos, went “warbiking” across the streets of the British capital over the course of two days. Lyne used a little Raspberry Pi running Linux in the bag slung under the crossbar, a powerful battery under the seat to provide power for the scanning rig for a whole day, a small GPS unit, and a scanner aerial strapped to the downtube. Lyne’s exercise revealed that among the more than 81,000 networks surveyed, some 29.5 per cent were using either the insecure Wired Equivalent Privacy (WEP) algorithm, or no security encryption at all.

Warbiking is essentially war driving but using a bicycle instead of a car. The Easiest Way to Transfer Files Wirelessly from Your Nexus 7 to Your Computer (& Vice Versa) « Nexus 7. The Easiest Way to Transfer Files Wirelessly from Your Nexus 7 to Your Computer (& Vice Versa) For the most part, transferring files from your computer to your Nexus 7 (and vice versa) is a simple process. Just hook up your tablet to your computer with the USB cable and transfer. However, most of the time you'll need additional software on your computer to do this, and then, of course, you need the USB cable. What if you forget where the USB cable was, or don't like dragging it around with you everywhere? If you want a better way to transfer files to and from your Nexus 7, go wireless and use your local Wi-Fi connection to do the dirty work for you.

Step 1: Download & Install AirDroid on Your Nexus 7 First, go ahead and install AirDroid from the Google Play Store. Step 2: Create an AirDroid Account When you open up AirDroid for the first time, you'll be greeted with a screen to either register or skip registration. Optional: Turn Find Phone On Image via See Also. Here's how you can set up Netflix on your brand new Chromecast - Ausdroid. With Chromecast launching today in Australia, it’s hard to believe that these devices have been available in the US for almost a year.

Fortunately, some of us at Ausdroid have had Chromecasts for just about as long, and we’ve watched them grow from a niche device to something quite cool. One of the first things we wanted to get working, which was a huge selling point for the Chomecast overseas, as access to Netflix. As many of you would know, getting access to Netflix in Australia isn’t too difficult, but getting it onto a Chromecast is a little bit more tricky.

To get Netflix working on Chromecast in Australia, you really only need three things, and we’ll tell you how to get them working: A way to access Netflix account from Australia, using different DNS servers,A Netflix account, andTo trick your Chromecast into accessing those DNS servers, and thus being able to access Netflix. The good news is the Chromecasts on sale in Australia do work with Netflix if you follow this workaround. Explore the Second Life Physics Lab. [an error occurred while processing this directive] Back in 1980, Papert proposed ‘physical microworlds’ (Papert, 1980), where, before being receptive to Newton's laws of motion, students could learn some other laws of motion, not as complex, subtle, and counterintuitive, build alternative laws of motion, evolving from the historically and psychologically important Aristotelian laws through the ‘correct’ Newtonian ones to the more complex Einsteinian ones.

Second Life users can walk around, enjoy the 3D scenery, fly, drive cars and other vehicles, interact with other avatars, play games, or create complex objects, with many different textures, such as chairs, clothes, jewels, vehicles, guns and even entire buildings. Second Life Physics Lab I became interested in this new technology and started to create a microworld, a laboratory within the virtual environment Second Life to investigate its use. Feel free to visit my Second Life Physics Lab! Buridanian Cannon Lander Simulator Math See also: The Good Techie - Email Just Got A Whole Lot Better. PPC Luddite: GarageBand Alternative for Linux. It's called LMMS (Linux MultiMedia Studio). Recently I decided to get more into learning about and making music. I'm always on the lookout for productive outlets for my OCDing and thought this could be the ticket. Also it has the added benefit of making me stop regretting that I couldn't play a note of music.

When looking for music production software on Linux, the first thing I became aware of is a lot of these programs require the JACK Audio server. So I installed it along with qjackctl (a settings GUI that also turns the daemon on and off) but got errors when I tried to start it. After a bit of googling, I found there are two separate JACKs, jackd1 and jackd2. jackd2 is not a sequel to jackd1. Onto LMMS. It has a song editor for writing melodies and a beat/baseline editor for writing repetitious things and baselines. I've only found a couple of problems. Be sure to check out LMMS's online manual beginning with the Getting Started section. Why you should root your Android device - Reasons & Benefits. Informatique. About Hackers & Hacks.

12 things to do after installing Linux Mint 16 (Petra) XFCE | Dikkii's Desktop. 6 GarageBand Alternatives. About Hackers & Hacks. How to Buy a Wireless Router. Google Tips, Tricks & Hacks. Virtual Conferences. Remove TornTV. GNU/Linux.


Mobile broadband. Cooler Master Forum • View topic - Scratch Build : L3p D3sk - Small update :P 15-7. Build A Computer Into Your Desk For Easy Upgrades, Hidden Cables. Computer Desk Case. How to View Passwords Hidden Under Asterisks [Video] Learn. Portal Two Pack Help :: Portal 2 General Discussions. 2 Errata - Mageia wiki. Desk. Bodhi Linux. Remastering The Bodhi Linux Live CD | Yet Another Opinion. Linux. Bodhi Linux. The Best Linux Distribution 2013: Netbooks and Old Hardware.