background preloader

Computer

Facebook Twitter

Programs

Top Blog Sites « Blogging 101 « Blogtap.net. PHP. 10 Twitter no-nos: Don’t scare away your potential agent, publisher, or reader. Posted on Mar 26, 2011 | 4 comments There’s this saying, that you shouldn’t post anything on a social networking site that you wouldn’t want your grandmother to see.

10 Twitter no-nos: Don’t scare away your potential agent, publisher, or reader

I’m going to take it a step further: Don’t post anything a prospective agent/publisher/reader would hold against you. I don’t think I need to remind you how important sites like Twitter are for marketing and networking. It’s sort of like the Wild West – cool, mysterious, but also sometimes dangerous and if you’re not careful you’ll catch dysentery.

If you’re here, there’s a good chance you know the basics about Twitter, so we’ll skip the introductions. Here are the top 10 mistakes writers make on Twitter, and how to avoid them: 1. 2. 3. 4. Free Ringtones - Download, Share and Make Ringtones : Ventones.com.

Website related

Top 21 Desktop Shortcut Keys To Ever Use. What Is...every file format in the world - A through E. Web Hosting, Unix Hosting, E-Mail, Web Design. Making A Cool Login System With PHP, MySQL. Martin Angelov Introduction Today we are making a cool & simple login / registration system.

Making A Cool Login System With PHP, MySQL

It will give you the ability to easily create a member-only area on your site and provide an easy registration process. It is going to be PHP driven and store all the registrations into a MySQL database. To add the needed flair, we are using the amazing sliding jQuery panel, developed by Web-kreation. Step 1 – MySQL First we have to create the table that will hold all the registrations. Table.sql CREATE TABLE `tz_members` ( `id` int(11) NOT NULL auto_increment, `usr` varchar(32) collate utf8_unicode_ci NOT NULL default '', `pass` varchar(32) collate utf8_unicode_ci NOT NULL default '', `email` varchar(255) collate utf8_unicode_ci NOT NULL default '', `regIP` varchar(15) collate utf8_unicode_ci NOT NULL default '', `dt` datetime NOT NULL default '0000-00-00 00:00:00', PRIMARY KEY (`id`), UNIQUE KEY `usr` (`usr`) ) ENGINE=MyISAM DEFAULT CHARSET=utf8 COLLATE=utf8_unicode_ci; Step 2 – XHTML demo.php demo.css.

Online tools

How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document.

Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you want to be a hacker, keep reading. 10 Alternative Ways To Access Blocked Sites. Websites like facebook , twitter and other social networking sites are generally blocked in schools, colleges and offices .

10 Alternative Ways To Access Blocked Sites

People search on the internet how to access blocked facebook or any website. There exist some tricks by which you can bypass the restrictions and access blocked websites , the most obvious is the use of proxies or Anonymizer websites . Proxies doesn’t always works as they gets blocked by firewall . Here I am listing some other methods to access blocked contents . Tempalias - Temporary Email Aliases. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method.

Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. . * A compatible wireless adapter—This is the biggest requirement. . * A BackTrack 3 Live CD. Network Calculators. How to Burn Any Video File to a Playable Video DVD. How to Make Your PC as Fast as the Day You Bought it.

Computer hardware chart.