Get flash to fully experience Pearltrees
Almost everyone reading the articles on this site will have spare computers languishing about. The rapid growth and improvements in hardware means that we cycle through a whole machine in only a few years. If you have spare machines and parts languishing about, you can put them to good use! In this article I have outlined some of the purposes your old hardware can serve.
Sysinternals Suite The entire set of Sysinternals Utilities rolled up into a single download. AccessChk v5.1 (August 2, 2012) AccessChk is a command-line tool for viewing the effective permissions on files, registry keys, services, processes, kernel objects, and more. AccessEnum v1.32 (November 1, 2006) This simple yet powerful security tool shows you who has what access to directories, files and Registry keys on your systems. Use it to find holes in your permissions.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question.
We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Latest Google Hacking Entries
Working with the new Excel 2007 is now more frustrating than ever when it comes to finding the right commands. Sometimes it seems like part magic and part luck. That’s why I’ve put together the cream of the crop of Excel shortcuts in easy to use cheatsheets you can print up and keep handy. Highlighting the most commonly used and commonly looked for Excel commands, this list puts it all at your fingertips. Keyboard Shortcuts
In February 2007, TJX, parent company of discount stores T.J. Maxx and Marshalls, disclosed that thieves had stolen information on possibly tens of millions of credit and debit cards. The company first thought its systems had been compromised for about eight months, but it turned out the vulnerability might have lasted for almost a year longer than that. The incident wound up costing TJX millions of dollars paid to the FTC, credit card companies, banks, and consumers. Oh, and 11 hackers were eventually arrested for the break-in.
Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better.