background preloader

Hacks

Facebook Twitter

What are some tech hacks that can be learned in 10 minutes? - Quora. Jeffrey Friedl's Image Metadata Viewer. WeTransfer. Ninite - Install or Update Multiple Apps at Once. Automatic Face Detection in Photos with PHP – Corpocrat Magazine. I have always wondered how to detect faces automatically with php script.

Automatic Face Detection in Photos with PHP – Corpocrat Magazine

I have seen in many photo sharing and social network sites automatically detect a face and tag a name after being uploaded. In this article, i will explain how possible this task can be achieved with simplicity with OpenCV and PHP Facedetect extension. Both are free to download and opensource. Goal To auto detect faces in a photo and draw pink box around the faces with a php script running a linux centos server. Requirements – Linux server running Centos with SSH access – PHP/Apache – GD Library – OpenCV [Download] – PHP Facedetect extension [Download] PHP facedetect extension is very simple. Installation We install opencv and then we compile the php facedetect extension with php. Top 10 Password Cracking Tools for all Platforms. A simple details about password cracking tools from wiki.

Top 10 Password Cracking Tools for all Platforms

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password. Generally Password cracker not hacking a password ,these software is only recover your password. Got it? So don’t use against someone’s system or illegally. Learn How to Pop Your First Lock.

Old versions of Windows, Mac and Linux Software, Apps & Abandonware Games - Download at OldVersion.com. How to Bypass and Reset the Password on Every Operating System. Passwords can be reset or bypassed on every operating system.

How to Bypass and Reset the Password on Every Operating System

On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files. On other devices where you can’t gain access to the files, you can still reset the device and gain access to it without knowing a password. These tricks all require physical access to the device. Windows. Turn an Old Computer Into a Do-Anything Home Server with FreeNAS 8.

Social Engineering

6 links that will show you what Google knows about you. Windows 10 defaults to keylogging, harvesting browser history, purchases, and covert listening. By default, Microsoft gets to see your location, keystrokes and browser history -- and listen to your microphone, and some of that stuff is shared with "trusted [by Microsoft, not by you] partners.

Windows 10 defaults to keylogging, harvesting browser history, purchases, and covert listening

" You can turn this all off, of course, by digging through screen after screen of "privacy" dashboards, navigating the welter of tickboxes that serve the same purposes as all those clean, ration-seeming lines on the craps table: to complexify the proposition so you can't figure out if the odds are in your favor. Oh, and if you've already chosen to use Firefox as your default browser, Microsoft overrides your decision when you "upgrade" and switches you to the latest incarnation of the immortal undead monster formerly known as Internet Explorer. Under "Personalization," the first setting tailors your "speech, typing and inking input" to the way you talk, type and write ... "by sending contacts and calendar details, along with other associated input data to Microsoft.

" Six Great DIY Projects for Hacking Computers and Networks. Roll Your Own Anonymizing Tor Proxy with a Raspberry Pi. Visual Cryptography. The technique I’m going to describe is attributed to two great mathematicians: Moni Naor and Adi Shamir, in 1994.

Visual Cryptography

In this implementation, I'm going to show how to split a secret message into two components. Both parts are necessary to reconstruct and reveal the secret, and the possession of either one, alone, is useless in determining the secret. Individually, there is no discernable message printed on either one of the sheets. Overlapping them creates addition interference to the light passing through (mathematically the equivalent of performing a Boolean OR operation with the images), but still it just looks like a random collection of pixels. Demonstration Let’s look at couple of examples of this in action, then we’ll describe how the technique works. Below you will see two random looking rectangles of dots. PhotoRec. Latest stable version 7.0 April 18, 2015 PhotoRec, Digital Picture and File Recovery PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory.

PhotoRec

PhotoRec ignores the file system and goes after the underlying data, so it will still work even if your media's file system has been severely damaged or reformatted. Hola - Free VPN, Secure Browsing, Unrestricted Access. Www.unix-ninja. In this article I am going to share some bash scripting commands and regular expressions which I find useful in password cracking.

www.unix-ninja

Most of the time, we find hashes to crack via shared pastes websites (the most popular of them being Pastebin.) Develop-photographic-memory. Here is an interesting technique that one can work with to develop a more photographic memory.

develop-photographic-memory

Tools such as this can offer pathways to better understanding your own consciousness of for developing deeper levels of awareness and mindfulness. Everyone wants to remember everything all the time, reach into the sciences behind it all. Things You’ll Need A dark room.A bright lamp.A sheet of paper with a rectangular hole cut the size of a paragraph for the text you want to “photograph”. Instructions. Carlcheo. Johnnylists. Login2. It's simple!

login2

This service is made for you to save your time on registration for many sites. You can not register at all sites, so just type the name of site for which you need to enter login and password and click «Get». Tips: Our project is constantly developing and we try to keep our database in actual state, use more of our services. 6-links-that-will-show-you-what-google. Want to find out all the things Google knows about you?

6-links-that-will-show-you-what-google

Here are 6 links that will show you some of the data Google has about you. 1. Find out how Google sees you Google attempts to create a basic profile of you, your age, gender, interests. Dpl. Merabheja. You can search Google timer in Google for a timer with alarm Search This in Google for Direct Mp3 Links intitle:index.of? Mp3 Your song name here Use your Chrome Browser as Notepad quickly. Just copy the text below to the address Bar. data:text/html, <html contenteditable>

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them. 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users. We share our lives on Facebook. We share our birthdays and our anniversaries.

Null-byte.wonderhowto. Hack Like a Pro: How to Spy on Anyone, Part 1 (Hacking Computers) Welcome back, my rookie hackers! Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old "cloak and dagger" spying. No longer is spying something that only the CIA, NSA, KGB, and other intelligence agencies can do—you can learn to spy, too. In this brand new series, we will explore how we can use the ubiquity of the computer to peek in on just about anyone and anyplace. Unlike the spy movies of yesteryear where the spy had to place a listening device in the lamp or in a houseplant, as long as there is a computer in the room, it can be used as a "bug.

" Www.howtogeek. Just about any self respecting geek always has a flash drive handy. Whether it is on your key ring on in your purse, having the ability to access certain files and utilities anywhere can really come in handy at times. However, if you were to lose or have this flash drive stolen, depending on what is stored on the drive, you could be setting yourself up for a completely preventable disaster. Password_sniffer. Related Links Windows Password Recovery ToolsSmartSniff - Monitoring TCP/IP packets on your network adapter Mail PassView - Recover POP3/IMAP/SMTP email passwords. Dialupass - Recover VPN/RAS/Dialup passwords Search for other utilities in NirSoft Description SniffPass is small password monitoring software that listens to your network, capture the passwords that pass through your network adapter, and display them on the screen instantly.

Versions History. Lifehacker. Infographicjournal. Wpengine. Www.cometdocs. Lifehacker. Geekyprojects. Www.howtogeek. Smallpdf. Fakena.

Www.howtogeek. Www.howtogeek. Crack a Combination Bike Lock in Under 30 Seconds. How to Hide Files in JPEG Pictures. If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. 64 Things Every Geek Should Know. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. USB password stealer. Hack Any Password Protected Wi-Fi Network Unlimited Free Internet Free Download.

Password Secrets of Popular Windows Applications. Top 10 Ways to Break Into and Out of Almost Anything.

Programing

Ninite - Install or Update Multiple Apps at Once. How To Crack A Wi-Fi Network's WPA Password With Reaver. Life hacks. How to Crack the Account Password on Any Operating System. How Secure Is My Password? Encryption. Web-site hacks.