background preloader

From 64 Things Every Geek Should Know

Facebook Twitter

How to Hide Files in JPEG Pictures. If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe!

Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Hide File in Picture In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. Create a folder on your hard drive, i.e. Now here’s the fun part! And that’s it! Downloads. How to Hack Wireless Internet Connections.

Posted by David • May 24th, 2006 1:30:43 pm - Subscribe | Mood: happy | Music: MxPx - Heard That Sound Explains how to ethically hack a wifi wireless internet connection using free hacking software. Have a laptop, or a wireless internet card in your PC? Have you ever been in the position that where you lost your WEP / WPA key, and you interested on retrieving it back?

Well with Aircrack you can. Aircrack is a set of tools for auditing wireless networks. I have used aircrack to try and hack my own wireless network and I happy to say I am as secure as I can get wirelessly. Ophcrack. How to Crack the Account Password on Any Operating System – Joe Tech. This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access.

Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password. Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. The program used is called Ophcrack, and it is free. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Fsck -fy mount -uw / dscl . That’s it. Tor (anonymity network) Tor (previously an acronym for The Onion Router)[4] is free software for enabling online anonymity and censorship resistance. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays[5] to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.

Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user[6] and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored. An extract of a Top Secret appraisal by the NSA characterized Tor as "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting".[7] Alice's Tor client picks a random path to destination server Steven J. Download Tor.

Tor (anonymity network) Tor (originally short for The Onion Router ) [ 5 ] is free software for enabling online anonymity . Tor directs Internet traffic through a free, worldwide volunteer network consisting of thousands of relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis . Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms", back to the user [ 6 ] and is intended to protect users' personal privacy, freedom, and ability to conduct confidential business by keeping their internet activities from being monitored. " Onion Routing " refers to the layers of the encryption used. The original data, including its destination, are encrypted and re-encrypted multiple times, and sent through a virtual circuit comprising successive, randomly selected Tor relays.

History [ edit ] Originally sponsored by the U.S. Operation [ edit ] Originating traffic [ edit ] How to defeat most keyloggers on public computers - Keyloggers can generally be classified as either software or hardware keyloggers. Software keyloggers are running as a background task on the system while hardware keyloggers are little devices that are most of the time connected between pc and keyboard recording every keystroke to their own memory. The simple keylogger records every keystroke while more advanced ones make screenshots and record mouse movements as well.

The idea for this article was born while reading the excellent Technospot article about keyloggers. The most secure way to defeat keyloggers is of course not to use public computers at all, and to keep a good eye on your own systems or the systems you are working on. You sometimes do not have a choice though which leads to the next most secure way to defeat them: Live CDs. If you are allowed to boot from DVD or CD you should pop in your Linux live CD and use it to go online.

This defeats all software keyloggers but not the hardware ones obviously. 64 Things Every Geek Should Know | Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years.

What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 2. If you rolled your eyes here, that is a good thing. 1. 3. 4. 5. 6. 7. 8. 9.