background preloader

File search & share and Hacks

Facebook Twitter

The 50 Best Registry Hacks that Make Windows Better. We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured. Also, you should create a System Restore point before doing so. Prevent Windows Update from Forcibly Rebooting Your Computer We’ve all been at our computer when the Windows Update dialog pops up and tells us to reboot our computer.

There’s a couple of ways that we can disable this behavior, however. Prevent Windows Update from Forcibly Rebooting Your Computer How to Clean Up Your Messy Windows Context Menu One of the most irritating things about Windows is the context menu clutter that you have to deal with once you install a bunch of applications. How to Clean Up Your Messy Windows Context Menu. Les hackers (3/3) Researchers defeat CAPTCHA on popular websites. IDG News Service - Researchers from Stanford University have developed an automated tool that is capable of deciphering text-based anti-spam tests used by many popular websites with a significant degree of accuracy. Researchers Elie Bursztein, Matthieu Martin and John C. Mitchel presented the results of their year-and-a-half long CAPTCHA study at the recent ACM Conference On Computer and Communication Security in Chicago. Researchers make weak passwords strong with CAPTCHAs plus an algorithm CAPTCHA stands for 'Completely Automated Public Turing test to tell Computers and Humans Apart' and consists of challenges that only humans are supposed to be capable of solving.

Websites use such tests in order to block spam bots that automate tasks like account registration and comment posting. There are various types of CAPTCHAs, some using audio, others using math problems, but the most common implementations rely on users typing back distorted text. Hacker Fantastic: Defeating Facial Recognition Technology. I came across a copy of FxGaurd Windows Login software and was immediately intrigued by it's claims of "Computer Access Control with Face Recognition Technology".

I purchased the software and eventually managed to get a licenced copy of FxGaurd Windows Logon 4.0 installed on my Laptop. The software offers the ability to replace the GNIA screen to Windows desktops with a WebCam capture that performs facial recognition for Authentication. It also supports encrypting files with faces. I immediately thought this sounded like a bad idea as my face, unlike my password, is usually given away freely everytime I pass a CCTV or other video capture system. The vendor claims the following "Embedded with state-of-the-art facial recognition technology, FxGuard Windows Logon 4.0 provides higher security than conventional password-based verification security systems for personal computers.

Hacking. Partager simplement des fichiers sur le Web avec DropCenter. Suite à mon billet sur les solutions auto-hébergées de partage de fichiers par interface Web, quelques lecteurs et followers m'ont conseillés de regarder du coté de DropCenter. Une solution libre (licence CC BY-NC-ND 2.0), légère (sans base de données) et que l'on peut auto-héberger. Cerise sur le gâteau, le projet est développé par deux jeunes Français (aka IdleMan et Fox). Il ne m'en fallait pas plus pour me plonger dans le test de DroCenter. C'est partie pour la visite guidée. Nous allons commencer par détailler l'installation de DropCenter sur une machine Debian 6 (mais la procédure peut être suivie pour n'importe quelle distribution GNU/Linux ou BSD). Les pré-requis sont réduits au strict minimum car il suffit de disposer d'un serveur Web compatible avec le langage PHP (j'utilise personnellement le stack NGinx + PHP FPM). cd /tmp wget unzip .

"That's all folks ! ". L'interface utilisateur est simple: Les hackers (2/3) Les hackers (1/3) Hacks. Materials - HackerThings. What Is...every file format in the world - A through E. Stockage en ligne. Hacking. Hackings. Download. Hackers & hacking. Descargue. Pro Tools Hack - Create Track Presets In Pro Tools. This was sent to us by community member Phillip Nichols. It’s a simple hack to get Pro Tools to create track presets. Simple and genius. If this doesn’t make it into Pro Tools 11, then Avid need shooting! If you are on 8 or 9, then here’s how to do it… 1) Go to Applications > Avid > Pro Tools (or Digidesign > Pro Tools for v8 or 9).

Once your templates are saved to folders within the “Track Presets” folder, they will appear as options in the New Track dialog below the normal track types (audio track, aux input track, etc). Hackteria.org. HackCollege - Student-Powered Lifehacking. Hack N Mod - Amazingly Cool Hacks, Mods, and DIY Projects. El enjambre: cultura hacker, redes y tecnopolítica. Korben. Software Download Portale. The 50 Best Registry Hacks that Make Windows Better.

Hey, Let's Fix The Internet. Industry veteran: LimeWire pirates were iTunes’ best customers. Internet pirates are always portrayed as parasitic freeloaders responsible for countless instances of DRM, the "death" of PC gaming, ISP bandwidth caps and more, but according to one industry veteran, that's entirely unfair. During a keynote speech at CA Expo in Sydney, former Google CIO and EMI executive Douglas C. Merrill said that he believes filesharers shouldn't be punished for downloading copyrighted material because it often drives them to make legitimate purchases. While employed by EMI (one of the world's largest music labels and an RIAA member), Merrill supposedly profiled LimeWire users and discovered that they were actually some of the biggest spenders on iTunes.

"That's not theft, that's try-before-you-buy marketing and we weren't even paying for it… so it makes sense to sue them," Merrill said sarcastically. In an amusing analogy, he said that suing people for filesharing "is like trying to sell soap by throwing dirt on your customers. " How to Crack a Wi-Fi Network. | Arrow Webzine - StumbleUpon. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done.

. * A compatible wireless adapter—This is the biggest requirement. . * A BackTrack 3 Live CD. . * A nearby WEP-enabled Wi-Fi network. . * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0.

Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down macchanger –mac 00:11:22:33:44:55 (interface) airmon-ng start (interface) </i>*} Now it’s time to pick your network. You’re almost there. </b>*} And much more! 3. Hackers & hacking. Gabe Says Piracy Isn't About Price - Games News at IGN. Here's Valve's co-founder and CEO Gabe Newell talking about piracy in the games industry. The man behind online retail service Steam tackles those who claim that lower prices for games will make piracy go away, and he takes on companies that seek to fight piracy by inconveniencing consumers. "We think there is a fundamental misconception about piracy," Newell said. "Piracy is almost always a service problem and not a pricing problem. For example, if a pirate offers a product anywhere in the world, 24/7, purchasable from the convenience of your personal computer, and the legal provider says the product is region-locked, will come to your country three months after the U.S. release and can only be purchased at a brick and mortar store, then the pirate's service is more valuable.

"Most DRM solutions diminish the value of the product by either directly restricting a customer's use or by creating uncertainty. " "We usually think of ourselves as customer centric rather than production centric. MegaUpload Alternatives See Surge in Traffic After Shutdown. After losing access to their favorite file-hosting service last week, millions of former MegaUpload users have fled to the many alternatives available. Filefactory, Depositfiles and many of the other top cyberlockers have seen an unprecedented surge in traffic in recent days, showing that people haven't stopped sharing even though the authorities have closed one of the main players in the business. With a self-proclaimed 50 million users a day, MegaUpload was one of the largest file-hosting sites on the Internet.

Last week the feds shut down the popular site accusing its founder and six others of money-laundering and several copyright related crimes. The site’s former users, meanwhile, are left without their files and forced to find a new place to share. The big question is, where do these millions of people go now? The RIAA hopes that the people who used MegaUpload to share copyrighted music are turning to iTunes, but this is not the case for everyone. Tus descargas en mediafire. The Best Hacking Tutorial Sites - Learn Legal Hacking - StumbleUpon. Internet Download Manager Integration guide for Firefox. Q. I've just updated Firefox to its newest version and IDM integration into Firefox stopped working. IDM does not take over downloads from Firefox anymore. What can I do to fix it? Q. Firefox said it had disabled the IDM extension because it wasn't compatible. 3.a. Dropbox.

FTP Search Engines - Including Ftp Hosting Resources. FilesHunt. Rapidshare Search Engine. RapidShare Files Search - RapidShare Search Engine - RSFind.com. Rapidshare-search-engine.com - Find files on rapidshare. Rapid Downloads. TorrentZ. ISP ordered to drop 'three strikes' rule against pirates. High performance access to file storage The Irish data protection watchdog has ordered the country's largest internet service provider (ISP) to stop using its 'three strikes' system for identifying and warning alleged illegal file-sharers, according to media reports.

The Office of the Data Protection Commissioner in Ireland (ODPC) expressed concern that Eircom's system of using IP addresses to identify alleged copyright infringers invades customers' privacy, the Sunday Times reported, according to a report by thejournal.ie. Eircom has operated a 'three strikes' system for warning users it suspects of illegal file-sharing that they face being cut off from the internet if they persist with the activity. The system, which Eircom agreed with four major music record companies, had been approved by the Irish Government.

The ODPC would not confirm to Out-Law.com whether the reports were true, but did say its six-month long investigation into Eircom's 'three strikes' system had been "concluded". Storage. Hack. Torrent Search - Search all Torrent Engines from one Site. Annuaire du Pirate. Downloading. Hosting Files.

Keep downloading in The Pirate Bay! Bit Torrent. Hack Story. Hackers. Megaupload Takedown. Hackers. Hacking Tools. Pirates, corsaires et autres. Hacking et sécurité. Hacks. Downloads. Software / Freeware / Utility Download Sites. Software & Download Ressource. Torrents. Torrent Sites. SECURE. Hackers. Download. DOWNLOADS. Torrents. Hacking. Share/freeware. Partage piratage : HADOPI et autres. Freemake Music Box 0.9.0 free download. Stream music to your computer for free with Freemake Music Box Almost anything you might do at your computer can be made more enjoyable by the addition of music.

If you are writing a letter to a friend, listening to music you both enjoy helps to create a sense of connection, while listening to something calming whilst working on a spreadsheet can make the sometimes daunting tasks of working with figure somewhat more bearable. Finding the right music to listen to is important, and this is something that Freemake Music Box can help you with. This free app provides you with access to literally millions of freely available tracks which you can stream to your computer, not only free of charge, but also legally. This is great news for anyone who works with more than one computer. Using the program could hardly be similar.

While the app is very useful and is sure to be an excellent source of free entertainment, there is room for improvement. Version 1.0.1: Fixed the issue with YouTube playback. Download All You Want. Tribler. In 2009 the development team behind Tribler stated that their efforts for the coming years are focused on integration of Tribler in television hardware. [citation needed] In 2012 the lead researcher stated “we’re going to take Internet privacy to the next level” by releasing Tribler with a proxy layer.[7] Features[edit] SwarmPlayer[edit] The core software is free and open source software based on the Tribler platform, licensed under the LGPL 2.1.

Development[edit] Popularity[edit] After a news article on TorrentFreak in February 2012 mentioned Tribler's decentralization and the fact that its index is impossible to take down,[11] the website became hugely popular, causing it to be reduced to just the download page to satisfy demand. Uses[edit] The European Union's P2P-Next project to develop an internet television distribution standard builds on Tribler technology under development at the Delft University of Technology.[12] See also[edit] Comparison of BitTorrent clients References[edit] Books & Magazines. Life Hacks: Institute of Hacking. Trucos Google, Trucos de búsqueda y Curiosidades sobre el buscador - www.elhacker.net.

Todo sobre Google Buscar frase exacta - Si quieres buscar una frase exacta, introdúcela entre comillas (""). Por ejemplo: "diarios deportivos" Encontrar páginas que incluyan determinadas palabras - Para encontrar páginas que incluyan determinadas palabras, pero no otras, deberemos incluir el signo '-' delante de las que no queremos buscar. Tienda -online Encontrar páginas que incluyan una determinada palabra u otra - Si pretendemos encontrar una determinada palabra u otra, usaremos 'OR' (o bien el símbolo '|' (AltGr+1). Tienda (zapatos OR pantalones) tienda (zapatos | pantalones) Forzar palabras para su búsqueda - Hay numerosas palabras (en español: 'a', 'de', 'el', ...; en inglés: 'to', 'of', 'the',...) que Google no tiene en cuenta en sus búsquedas, a no ser que lo indiquemos.

El mundo +el mundo Uso de comodines - Se puede hacer uso de comodines. "los * años" "los * * años" Mayúsculas y minúsculas - No es necesario distinguir las mayúsculas de las minúsculas. Uso del comando Link: allintext:hacker. The Pirate Bay disfruta de 12 millones de visitas adicionales y comparte consejos anti-bloqueo | TranslatedWeb. La semana pasada, el Tribunal Supremo británico determinó que varios de los principales ISPs del país debían bloquear el acceso a sus clientes a The Pirate Bay. La decisión está dirigida a limitar el tráfico al mayor sitio de BitTorrent del mundo, pero a corto plazo ha tenido el efecto contrario. Ayer, The Pirate Bay tuvo 12 millones de visitas más de las que nunca ha tenido, proporcionando una oportunidad de oro para educar a los usuarios sobre cómo eludir los bloqueos.

"Deberíamos escribir una carta de agradecimiento al BPI" dijo un miembro del sitio a TorrentFreak. El viernes pasado el Tribunal Supremo británico determinó que varios de los principales ISPs del país debían censurar The Pirate Bay, debido a la decisión en febrero de que el sitio y sus usarios infrinjen los derechos de autor a gran escala. "Deberíamos escribir una carta de agradecimiento al BPI," añadió. Estos proveedores de VPNs cuestan dinero pero también hay soluciones gratuitas. Trackbacks: menéame. Torrent Search Engine.