background preloader

Okunası bloglar

Facebook Twitter

Free Software of Mirek Wojtowicz. Top 10 Free Antivirus Software Of Year 2010. Broadcast Yourself. 300 Free Online Courses from Top Universities. Advertisment Take online courses from the world’s top universities for free.

300 Free Online Courses from Top Universities

Below, you will find 1,700 free online courses from universities like Yale, MIT, Harvard, Oxford and more. Our site also features collections of Online Certificate Programs and Online Degree & Mini-Degree Programs. Note: This page includes a lot of Massive Open Online Courses (MOOCs). If you want to enroll in a free version of a MOOC, please select the “Full Course, No Certificate” (edX) or “Audit” (Coursera) option.

Online Mind Mapping and Brainstorming - MindMeister. Calling all security researchers! Submit your new 2010 Web Hacking Techniques. Update 01.03.2011: Voting has begun!

Calling all security researchers! Submit your new 2010 Web Hacking Techniques

Update: Prize information Each year the web security community produces a stunning amount of new hacking techniques documented in white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, web browsers, web proxies, and so on. We are NOT talking about individual vulnerabilities with CVE numbers, nor any particular system compromise, but the actual new methods of Web-based attack. To keep track of all these discoveries and encourage information sharing, the Top Web Hacking Techniques acts as both a centralized knowledge base and a way to recognize researchers who contribute excellent work.

The selection process for 2010 will be a little different. All Facebook - The Unofficial Facebook Blog - Facebook News, Facebook Marketing, Facebook Business, and More! Sony Vegas Movie Studio HD Platinum 10. Marc Ruef. Server-Network Tavsiye(s) :) … « Faruk Can Özdemir Çankaya Üniversitesi Bilgisayar Mühendisliği. Calling all security researchers! Submit your new 2010 Web Hacking Techniques.

AirmonNG Tutorial. Description: Airmon-NG is simple and easy to use tool and is a part of Aircrack-NG suite of products.

AirmonNG Tutorial

Aircrack-NG is a set of tools for auditing wireless networks. These tools automate in between steps involved in WEP cracking, from setting the interface in monitor mode to sniffing packets, re-injecting packets, examining these packets against different attack vectors, cracking the WEP key and finally decrypting the WEP-encrypted packets. Airmon-NG automates the first stop i.e. setting the interface into monitor mode. <p> The enabling step for WEP cracking is the ability to sniff wireless packets and to inject wireless packets. Conference, Convention, Expo, and Trade Show Directory. Top 10 Ways to Access Blocked Stuff on The Web. This Is the Best of Lifehacker 2010. The Easy, Any-Browser, Any-OS Password Solution. Chaîne de ChRiStIaAn008. Music from your favorite tv shows. Microsoft Developer Blogger Shows Easy Sniffing Of WP7 Traffic.

Do you fancy investigating any traffic being sent in and out of your Windows Phone 7 device?

Microsoft Developer Blogger Shows Easy Sniffing Of WP7 Traffic

Aside from the more involved method of using a packet sniffer on your phone or capturing the data over a wireless connection and decrypting it, a member of the Microsoft Developer Network (MSDN) has gone ahead and given some extremely straight forward steps on how to set up a man-in-the-middle proxy to capture and store all HTTP and HTTPS traffic. How it works is very simple – Fiddler, a web debugging proxy, is run on a Windows PC and acts as an intermediary gateway to the outside world, once you configure your device to pass information through it, Fiddler will capture, display and allow you to modify the passing traffic. What legitimate use case could this have? Well it’s useful for developers who are writing apps, however it’s especially useful for enterprising hackers, do-it-yourselfers and anybody else who is concerned about the information that apps are uploading.

Everything you need to know about cryptography in 1 hour Video. Panda Internet Security – 1 Yıllık Yasal Lisans. Répertoire en ligne. Get The App iPhone or Android?

Répertoire en ligne

Live Directory Sign In or Sign Up. Windows CMD Commands. OS X commands. Commands marked • are bash built-in commands. bash is the default shell, it runs under Darwin the open source core of OS X.

OS X commands

OS X Man Pages - Apple Developer ConnectionDiscussion forum Links to other Sites, Books etc... “Mac OS X is a rock-solid system that's beautifully designed. Mozilla Firefox Eklentileri, Temaları ve Kaynak Sitesi » Mozilla Firefox Eklentileri (Full Liste) Sign in. Cell Phone Spy Software. Looks can be deceiving...

Cell Phone Spy Software

And for some reason... even though he LOOKED like he was perfect... I sensed something different. You know that feeling you get when something just isn't right. That's the feeling I got with Scott... and for whatever reason... it wouldn't go away. I made sure to keep a close eye on him... And that's when I started to notice things... I noticed that often when it appeared he was working... he was really just surfing the internet. But that wasn't the worst of it... One afternoon, I noticed through his office window... that he was on the phone.

For whatever reason I decided to hop on the line, patch through to his number and listen in on the call... Digital Inspiration: A Technology Blog on Software and Web Applications. Gawker — Gossip from Manhattan and the Beltway to Hollywood and the Valley.