File search & share and Hacks
Get flash to fully experience Pearltrees
We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered.
IDG News Service - Researchers from Stanford University have developed an automated tool that is capable of deciphering text-based anti-spam tests used by many popular websites with a significant degree of accuracy. Researchers Elie Bursztein, Matthieu Martin and John C. Mitchel presented the results of their year-and-a-half long CAPTCHA study at the recent ACM Conference On Computer and Communication Security in Chicago. Researchers make weak passwords strong with CAPTCHAs plus an algorithm CAPTCHA stands for 'Completely Automated Public Turing test to tell Computers and Humans Apart' and consists of challenges that only humans are supposed to be capable of solving.
I came across a copy of FxGaurd Windows Login software and was immediately intrigued by it's claims of "Computer Access Control with Face Recognition Technology". I purchased the software and eventually managed to get a licenced copy of FxGaurd Windows Logon 4.0 installed on my Laptop. The software offers the ability to replace the GNIA screen to Windows desktops with a WebCam capture that performs facial recognition for Authentication.
Suite à mon billet sur les solutions auto-hébergées de partage de fichiers par interface Web, quelques lecteurs et followers m'ont conseillés de regarder du coté de DropCenter . Une solution libre (licence CC BY-NC-ND 2.0), légère (sans base de données) et que l'on peut auto-héberger. Cerise sur le gâteau, le projet est développé par deux jeunes Français (aka IdleMan et Fox ).
Email Share Sharebar 329 Email Share
Stockage en ligne
The list below represents an extensive, but not necessarily complete list of .com expired domains for 14th January 2008 beginning with the letter P. << 13th January 2008 - - - - - 15th January 2008 >> 14th January 2008 Index pacificoaksmtg.com - www.pacificoaksmtg.com packaging-and-design.com - www.packaging-and-design.com packardautomotive.com - www.packardautomotive.com pafda.com - www.pafda.com palacewiki.com - www.palacewiki.com
hackers & hacking
This was sent to us by community member Phillip Nichols.
El enjambre: cultura hacker, redes y tecnopolítica.
Software Download Portale
I'm not the oldest guy in the world , not by any stretch, but I do remember a time before the Internet. And I remember when it first showed up, full of promise and potential none of us understood. I remember when you needed to make your computer dial a number to access it, and I remember the Internet tying up phone lines, and I remember suddenly losing your Red Alert game if someone in your house tried to make a phone call.
Internet pirates are always portrayed as parasitic freeloaders responsible for countless instances of DRM, the "death" of PC gaming, ISP bandwidth caps and more, but according to one industry veteran, that's entirely unfair. During a keynote speech at CA Expo in Sydney, former Google CIO and EMI executive Douglas C. Merrill said that he believes filesharers shouldn't be punished for downloading copyrighted material because it often drives them to make legitimate purchases. While employed by EMI (one of the world's largest music labels and an RIAA member), Merrill supposedly profiled LimeWire users and discovered that they were actually some of the biggest spenders on iTunes. "That's not theft, that's try-before-you-buy marketing and we weren't even paying for it… so it makes sense to sue them," Merrill said sarcastically.
1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method.
hackers & hacking
Here's Valve's co-founder and CEO Gabe Newell talking about piracy in the games industry. The man behind online retail service Steam tackles those who claim that lower prices for games will make piracy go away, and he takes on companies that seek to fight piracy by inconveniencing consumers.
After losing access to their favorite file-hosting service last week, millions of former MegaUpload users have fled to the many alternatives available. Filefactory, Depositfiles and many of the other top cyberlockers have seen an unprecedented surge in traffic in recent days, showing that people haven’t stopped sharing even though the authorities have closed one of the main players in the business.
written by: Daniel Robson • edited by: Aaron R. • updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost.
Q. I've just updated Firefox to its newest version and IDM integration into Firefox stopped working. IDM does not take over downloads from Firefox anymore. What can I do to fix it?
The Irish data protection watchdog has ordered the country's largest internet service provider (ISP) to stop using its 'three strikes' system for identifying and warning alleged illegal file-sharers, according to media reports. The Office of the Data Protection Commissioner in Ireland (ODPC) expressed concern that Eircom's system of using IP addresses to identify alleged copyright infringers invades customers' privacy, the Sunday Times reported, according to a report by thejournal.ie . Eircom has operated a 'three strikes' system for warning users it suspects of illegal file-sharing that they face being cut off from the internet if they persist with the activity. The system, which Eircom agreed with four major music record companies, had been approved by the Irish Government.
Pirates, corsaires et autres
Hacking et sécurité
Software / Freeware / Utility Download Sites
Software & Download Ressource
Partage piratage : HADOPI et autres
Life Hacks: Institute of Hacking