Intro to packet sniffing - Wireshark
#3038363 - Pastie - StumbleUpon
Free Calls From Your Old Nokia Phones - Video
How To Hack The Nook Color
How To Unlock A Cell Phone - Globalunlock.com - Video
Tips and tools
Howto Rip a DVD - Easy and Free with Linux
How to take down a website in seconds evilexe.com
The free software listed here is perfect for the most mischievous pranks and computer gags. StumbleUpon
How To Make Fake Harmless Virus - Video
Exploiting Software: How to break code
4d00a959a6a17hive.png from imageshack.us
How I Change My IP Address (5 Ways) - Video
-: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! Chat with Your Friends through ms dos Command Prompt
Snort :: Home Page
Internet TV Plugins - XBMC - Linux Mint 7
Open Source community has great Audio Applications. We had featured 20 Audio Editors. Here is a best of the Audio Applications list that has, Audio Editors, Audio Sequencers, Stream Rippers, CD Rippers and much more. 30+ Awesome Free and Open Source Audio Applications List | Open Source...
10 Search Engines to Explore the Invisible Web The Invisible Web refers to the part of the WWW that’s not indexed by the search engines.
Linux HOWTO #3, Part 1: Anonymous Web Browsing with Tor
How to write a Keygen Part1/2
Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank).
How To Set Up SSH Encrypted MySQL Replication - Network Computing
Hack This Site!
FreeMyPDF.com - Removes passwords from viewable PDFs
The Great Boot Race
How to recover deleted files in Ubuntu #12
TIOBE Index for January 2014 January Headline: Transact-SQL programming language of 2013! TIOBE Software: Tiobe Index
The Man Behind Linux: The Accidental Invention That Is Taking Hold of Wall...
Here is an updated version of the ‘Using Google’s Full Capabilities’. UPDATED - Using Googles Full Capabilities & XBOX, XBOX 360, PS2, PS3,...
The Hacker Crackdown
ZeroDibs : best of free & opensource software
25 Best SSH Commands / Tricks OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.
how to easily delete your online accounts | accountkiller.com
insight3d - opensource image based 3d modeling software
Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker...
Turn Your Home Router Into a Super-Powered Router with DD-WRT - How-To Geek Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded.
Need to hack someone’s Facebook password? PASSWORD HACKING | Go Hacking
Hacking with command prompt
We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... Think you're safe from a cyberattack just because you're a small biz? Think again. Here's how to prevent a hacking.
Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Short Film of the Day: Stuxnet: Anatomy of a Computer Virus | Film School...
My Favorite Smallware
How to gain access to system account the most powerful account in Windows.... There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article.
Virtual-Browser&153; - Browse and surf safely & anonymously
Firesheep - Wikipedia, the free encyclopedia The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process. It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries.
BitTorrent's been around for a whopping ten years, but it continues to evolve and remains one of the best file-sharing tools available. If you really want to make your downloads soar—and keep Big Brother out of your business—this guide's for you. Title image by Ben Krebs. How to Boost Your BitTorrent Speed and Privacy - Lifehacker
How to Break into a Mac (And Prevent It from Happening to You) - Lifehacker