Security. FunBrain.com - The Internet's #1 Education Site for K-8 Kids and Teachers. Windows stuff. Technology. Operating Systems. Business Sites. Mzblaze added: Brandieself added: +network security tools sniffer software. Mzblaze added: Top 15 Security/Hacking Tools & Utilities. 1.
Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. Yes, JTR 1.7 was recently released! You can get JTR Here 4. Get Nikto Here 5.
Powerful TCP port scanner, pinger, resolver. Get SuperScan Here 6. p0f. Mzblaze added: Brandieself added: Best Data Recovery Software for PC - The Vuze BlogThe Vuze Blog. People are addicted to photos and images.
So much in fact that Facebook reported more than 250 billion photos have been uploaded to its social platform with 350 million photos uploaded every day on average. With all of those photos of family, friends, vacations and memories that you’ve taken what would you do if you lost all of them? What if you forgot to create a backup of your digital photo albums? What if your photo database became corrupted? Having a backup and recovery plan for your electronic media and personal files is important because, well, you just never know when or if something could go wrong. Mzblaze added: Cs0rfe added: Lock and unlock a Mac using Bluetooth detection. I discovered a great little app, Proximity, and have now made my Mac's security very seamless.
This approach requires: Bluetooth-enabled Mac and a Bluetooth-capable phone (including the iPhone).Some AppleScript writing or copying-and-pasting.Tested only on 10.5.6 and 10.5.8 install; untested in 10.4 and 10.6. Read on for the background on the solution, as well as the step-by-step implementation. I frequent various sites such as Gizmodo, Lifehacker, TUAW, macosxhints, and many others, and I was pleasantly surprised to discover that I could have an Ubuntu-like security feature with my iPhone.
In Ubuntu, I paired my old Nokia Bluetooth phone with my netbook via BlueProximity, which was a great little app that detected how close I was to my netbook, and either logged me out if I were outside of the proximity field (the phone was not being registered by BlueProximity), or if I came within the proximity field, I’d be seamlessly logged in again without any user intervention.
Mzblaze added: Attack Tool Kit / Download. Mzblaze added: Linux Distro. Mzblaze added: Pentest. Mzblaze added: Kali Linux / BackTrack. Mzblaze added: Hacking / Pen testing. Mzblaze added: Linux Distributions. Hacking Schools. Hacking and viruses. Slave hack game.
Hacking/phishing/viruses. Hacking Tips And Tricks 2012 Free Download Software Hacking Gprs. Privacy - Back Ups - Hacking - Downloading. Hacking, Cracking & Phreaking. Hacking & cyberactivism. Hacking && Hackers && H(a)cktivism. COMPUTER HACKS. Ethical Hacking. Attacks (Hacking) Anonymous. MS Windows. Add a Custom Command to an Answer File. Customizing the Default User Profile in Windows 7 (Part 1) If you would like to read the other parts in this article series please go to: Introduction If you are an admin of a Windows-based network, there are a number of reasons why you might want to customize the default user profile.
For example: You might want to customize users' desktops prior to deploying Windows 7 onto new computers so that users have a pre-configured desktop experience to start from.You might want to use roaming profiles to enable users to roam between different computers on your network while accessing their own personalized desktops and you might want to customize the initial desktop experience of your users.You might want to use mandatory roaming profiles to provide a locked-down, customized desktop experience to users in a Remote Desktop Services (RDS) or Virtual Desktop Infrastructure (VDI) environment based on Windows Server 2008 R2 SP1 Hyper-V. 1. Start by opening the Deployment Workbench on the computer that has MDT 2010 Update 1 installed. 2. 3. Conclusion.
SCCM 2012 R2: Build and Capture Task Sequence with Updates by Jodie Gaver on Prezi. FlockDraw - Free Online Drawing Tool - Collaborative Group Whiteboard. Sketchpad - Online Paint/Drawing application. Diagram Software and Drawing Tool. A diagramming platform that lets you display, communicate, and present dynamically.
Powerful enough to draw everything from basic flowcharts to complex engineering schematics. Live Object technology dynamically displays linked data. Compatible with MS Visio 2013 (.vsdx) files, making it the premier diagramming solution. diagramming platform with dynamic presentation power. ConceptDraw PRO offers a professional set of drawing tools, templates, numerous object libraries, and a variety of custom printing and file export options. The integration technologies used in this product are: ConceptDraw Solution Park Live Objects ConceptDraw PRO contains solutions for project management and corporate dashboards for business management and planning. Drawing Tools Create drawings and other illustrations using ConceptDraw PRO drawing tools, library objects, and sample documents.
Diagramming Tools Effortlessly create flow charts, schematics, and other diagrams with ConceptDraw PRO. DIY sites. Free cloud storage |& online backup. BitTorrent sites. Learn how to code.
Tools. How to -General Stuff. Bit Torrent Sites. Computer Saavy. Team Maker. Search Engines. White Privilege. SCCM 2012. VBScripting.