Security

Facebook Twitter
LifeHacker LifeHacker While I've no qualms about a DIY project that gets you tinkering around, I'd think an easier, possibly more efficient solution would be to just get one of those cassette tapes devices that connect to your player's headphone connection. A 'drawback' is that you'll have to have a wire hanging down from your cassette deck, and you won't be able to just slide your phone/MP3 player back into your pocket or wherever out of the way, but... But some advantages would be you'd be able to use just about any device you wanted. Rather than a binder of CDs, you could get a lot of cheap MP3 players and load your favorite band's discographies onto each, instead of taking up potentially valuable space on your phone's storage. Or you could connect your friends laptop or whatever without having to worry if they have Bluetooth.
Hacking Practice

Hacking Practice

written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process.

How to use Google for Hacking. | Arrow Webzine - StumbleUpon

How to use Google for Hacking. | Arrow Webzine - StumbleUpon Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites.
[lcamtuf.coredump.cx]