background preloader

IT...

Facebook Twitter

Power IT Pro Home Page. Main Page - iDroid Project. News. How You Can Make Good Use of Your Old Machines. Almost everyone reading the articles on this site will have spare computers languishing about.

How You Can Make Good Use of Your Old Machines

The rapid growth and improvements in hardware means that we cycle through a whole machine in only a few years. If you have spare machines and parts languishing about, you can put them to good use! In this article I have outlined some of the purposes your old hardware can serve. Like the article? Be sure to subscribe to our RSS feed and follow us on Twitter to stay up on recent content. Local File Server Everyone secretly wants one, and if you have the resources kicking around then why not have one? There are so many reasons to have a personal server. If you set up a Windows Share correctly, then you needn’t use FTP programs like FileZilla to conduct transfers. I am connected to my local server, and streaming music to my Windows box. Web Server This uses pretty much the same software and simple tech as the Local File Server. BOINC Node Here is Rosetta@Home running away. Torrent Box Proxy Server. Hack This Site! Free Learning Resources on various subject categories at LearnersTV.

Free Open-Source Disk Encryption - Documentation - Encryption Algorithms. Sysinternals Utilities. Sysinternals SuiteThe entire set of Sysinternals Utilities rolled up into a single download.

Sysinternals Utilities

Sysinternals Suite for Nano ServerSysinternals Utilities for Nano Server in a single download. AccessChkv6.1 (February 17, 2017)AccessChk is a command-line tool for viewing the effective permissions on files, registry keys, services, processes, kernel objects, and more. AccessEnumv1.32 (November 1, 2006)This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions. AdExplorerv1.44 (November 15, 2012)Active Directory Explorer is an advanced Active Directory (AD) viewer and editor. AdInsightv1.2 (October 26, 2015)An LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications.

Things Every Computer Geek Should Know. « Arrow Webzine. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.

A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. How to become a real computer Geek? W3Schools Online Web Tutorials. Spychips.com - how RFID will compromise privacy, security, freedom. FiftyThree.

Google Hacking Database, GHDB, Google Dorks. Compliance : Tech Center. Most Popular Hacking Tools. 10 Massive Security Breaches. They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data.

10 Massive Security Breaches

There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit 1 of 11 In February 2007, TJX, parent company of discount stores T.J. Security breaches have only increased in scope and frequency in recent years, as more businesses store their data in digital files and thieves become increasingly sophisticated in how they gain access to those files. See Also Nasdaq Confirms Servers Breached Online Dating Site Breached Two Arrested For AT&T iPad Network Breach. I.B.M. Aims to Sharply Simplify Corporate Data Center Technology. It can take up to six months, research shows, to get a new business application up and running, from buying the hardware to fine-tuning the software. An estimated 70 percent of corporate technology budgets is spent on installing, updating and maintaining current technology — keeping the digital lights on.

Although the problem has been developing for a long time, technology managers and analysts agree it is growing worse. That’s because the pace of technological change is accelerating and business users expect more services, faster. The difficulties, by all accounts, are worldwide. “The current model is broken, it doesn’t scale,” said Sunil Bajpai, group general manager for the Center for Railway Information Systems, the technology arm of India’s state-owned railway system.

Is bringing its answer to the marketplace on Wednesday — an effort that industry executives and analysts say is the most ambitious step yet to simplify and streamline data center technology. Protect The Business – Enable Access. Js/kh.js. Password Hacking FAQ. I get a lot of emails about hacking.

Password Hacking FAQ

It’s hard for me to answer each and every question which is asked more frequently. So here I have compiled some of the Most Frequently Asked Questions (FAQs) about hacking. Hope this helps. What is Hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.

Turn Your Home Router Into a Super-Powered Router with DD-WRT. Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it?

Turn Your Home Router Into a Super-Powered Router with DD-WRT

How Secure Is My Password?