background preloader

You better believe it

Facebook Twitter

Interesting/Funny/Controversial. Entheogens. Stimulant. Kava Kava Root. Food. Virtual burglary. Online defamation. Data breach. Unsollicited spam & SMS fined. Permaculture Credit Union. Do it anyway: Improving yourself and dealing with those who don't understand. I recently started reading The Flinch, by Julien Smith.

Do it anyway: Improving yourself and dealing with those who don't understand

The basic idea is that we humans have this inclination to protect ourselves. Hopper — save links, text, images, and files in moments. Observando:thank you god for showing me this picture xdsuperior problem-solving skills typical of macintosh and its users. picture on VisualizeUs. CamTwist (Mac) - Download. HardlyWork.in. Spokane / coeur d'alene free stuff classifieds - craigslist. How to Hide Secret Documents, Videos or Audio Messages inside JPG Image Files ? A USA Today story says that al-Qaeda were sending out encrypted messages by hiding them inside digital photographs [jpg files] and video files.

How to Hide Secret Documents, Videos or Audio Messages inside JPG Image Files ?

Turn out that it is actually very easy to hide (or embed) other file inside a JPEG image. You can place video clips, pdf, mp3, Office documents, zipped files, webpage or any other file format inside a JPEG image. Learn to code. Wix Free Website Builder. YourMechanic, The “Uber Of Car Maintenance,” Offers On-Demand, Certified Mechanics At 30-50% Savings. YourMechanic, a peer-to-peer car repair marketplace that enables mechanics to fix users’ cars at their home or office, launched at TechCrunch Disrupt SF today.

YourMechanic, The “Uber Of Car Maintenance,” Offers On-Demand, Certified Mechanics At 30-50% Savings

It claims it will lower costs 30-50% from shops and dealers, offering an “Uber-like experience” where the mechanic visits you to service your car. YourMechanic offers mechanic profiles, reviews from customers, a fair price calculator “to ensure that you are paying a fair price,” and online repair records. They will also offer maintenance notifications on smartphone apps and via email, so you don’t forget to change your oil. Your Mechanic says its instant pricing engine, which uses half a billion data points, is an industry first. The company receives a transaction fee by selling parts. “Think about the cab market before Uber came,” co-founder Abhas Art Agrawal tells me. 20 Google Search Shortcuts to Hone Your Google-Fu. SCHOPENHAUERS 38 STRATAGEMS, OR 38 WAYS TO WIN AN ARGUMENT.

Spreecast. Getting Real: Dropping F-Bombs For Pleasure and Profit. Pen.io - Publish Content Online. Some chemical structures. Free Software Downloads and Software Reviews. Martin Luther King Jr. Quotes. With Classtivity, You Can Stop Googling for Fitness Classes. You may want your yoga, kickboxing or painting class to challenge you.

With Classtivity, You Can Stop Googling for Fitness Classes

But you probably don't want finding that class to be a challenge, too. A new site called Classtivity aims to be an easy discovery portal for fitness and creative classes. It allows you to search by location, time and activity. Bohemian Coding. Ten Unusual Ways to Improve Your Appearance of Confidence That Really Work. I’ve seen it over and over again: the person in the office with self-confidence is the one that gets the plum assignments.

Ten Unusual Ways to Improve Your Appearance of Confidence That Really Work

The promotions. The raises. The recognition. The others, who sit back quietly, get left behind (and sometimes resent it). Mahatma Gandhi Quotes. Neurotransmitters and Drugs Chart. Erowid. How to report a computer crime: malware by email. Do you know how to report a computer crime?

How to report a computer crime: malware by email

Or even who you would report it to? We looked at unauthorised email account access in the first of our series of articles on how to report a computer crime. Now we turn our heads to malware by email. Background Addict? Here's Your Fix. How to create a Blog, Tools and Tips. The Weekly Review: How One Hour Can Save You A Week’s Worth of Hassle and Headache. Anonymous 101: Introduction to the Lulz. (Editor’s Note: Any decent coverage of Anonymous is going to verge on some NSFW material at points.

Anonymous 101: Introduction to the Lulz

There will be questionable language and strange imagery.) Last week the net and the media were ablaze with the news that Anonymous might be taking on the Zeta drug cartel in Mexico, a story that has morphed into a wider drug corruption story, and led to one American law enforcement official in North Carolina being named as a gang conspirator. Also this year, Anons released documents on, or d0xed, several police organizations and one prominent police vendor in retaliation for heavy-handed law enforcement reaction to occupations associated with the Occupy Wall Street movement.

Globalists, Elite and New World Order Explained. The Globalist Report by Andrew Puhanic.

Globalists, Elite and New World Order Explained

The Bureau of Communication - Fill-in-the-blank Correspondence. Decrypting text. Encrypted text is sometimes achieved by replacing one letter by another.

Decrypting text

To start deciphering the encryption it is useful to get a frequency count of all the letters. The most frequent letter may represent the most common letter in English E followed by T, A, O and I whereas the least frequent are Q, Z and X. Common percentages in standard English are: and ranked in order: Common pairs are consonants TH and vowels EA. How to Make a Survival Shotgun. Editor’s note: This is a guest post from Creek Stewart of Willow Haven Outdoor. As a Survival and Preparedness instructor, I take my line of work very seriously–sometimes too seriously. Occasionally, though, I like to take on survival projects that are just downright fun. This article highlights one of those projects. I’m fortunate in that I’ve been able to turn my passion into my profession–this being the study of Survival and Preparedness.

I’ve always enjoyed building survival kits of all shapes and sizes. Ultimately your survival needs fall into five main categories. - StumbleUpon. MineCraft. Hacks. Word & text monitoring. How Anonymous Picks Targets, Launches Attacks, and Takes Powerful Organizations Down. Image Design: Giles Revell No one but Hector Xavier Monsegur can know why or when he became Sabu, joining the strange and chaotic Internet collective known as Anonymous.

How Anonymous Picks Targets, Launches Attacks, and Takes Powerful Organizations Down

But we know the moment he gave Sabu up. On June 7, 2011, federal agents came to his apartment on New York’s Lower East Side and threatened the 28-year-old with an array of charges that could add up to 124 years in prison. So Hector Monsegur, who as Sabu had become a mentor and icon to fellow members of Anonymous, surrendered his online identity to a new, equally faceless and secretive master: the FBI. For the next eight months, Sabu continued to rage across the Internet as a core member of AntiSec, a blackhat hacking group within Anonymous. Creative Sites discovered using Google+ Those Dark Hiding Places: The Invisible Web Revealed.