background preloader

Smithdavee

Facebook Twitter

Dave

50 Free Apps We're Most Thankful For. An Overview of Cryptography. As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation.

Similar — but different — is the Japanese Government Cryptography Research and Evaluation Committees (CRYPTREC) efforts to evaluate algorithms submitted for government and industry applications. CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. 3.3. Top 35 Mitigation Strategies: DSD Defence Signals Directorate. SkyDogCon 2011 Videos  Tip: My Top 10 Tips for Passing the CISSP Exam. My Top 10 Tips for Passing the CISSP Exam How exactly should you go about tackling this monster six-hour exam? CISSP James Michael Stewart offers his suggestions. by James Michael Stewart 9/25/2002 -- The highly respected Certified Information Systems Security Professional (CISSP) title is achieved by passing one very broad 250-question, six-hour exam.

While I didn't find the exam extremely difficult in terms of content (I consider it a mid-level security exam), it is a challenging test to take. Unlike other security certifications that test your ability to implement and maintain a security infrastructure, the CISSP certifies your knowledge and understanding of security-related issues, such as physical security, business management practices, technological security controls, cryptography and cyber crime laws. There's not much within the CISSP exam objectives that can be learned from hands-on computer/networking experience. You'll also see a lot of discussion about the CIA triad.

Mozilla Firefox. Canvas by James Wilson Morrice, Port de Venise, 36 in X 24 in. Ships same day. Ready to hang. 30 Windows 7 Hotkeys: Ultimate Guide. Apart from so many new features in Windows 7, Microsoft has also added new hotkeys to give individuals better control over their operating system.

We have covered 30 hotkeys for Windows 7 which we believe everyone should know about. Master them all to increase your daily productivity. Windows + Up Arrow It is used to maximize the current window which is in focus, whether it is a windows explorer, a web browser, or any other application. Windows + Left Arrow Adjusts the current window to the left side and hence the window will cover almost half of the desktop space. Windows + Right Arrow It will adjust the current window to the right and thus it will cover half of the desktop space on the right. Windows + Down Arrow Minimizes the windows to the Task bar. Windows + Space All windows become transparent so you are able to see your desktop. Windows + T Shows the thumbnail preview of the running applications.

Windows + P Windows + (+ / -) (Add/Minus) Shift + Click a Taskbar item Windows + F Windows + X. Auto Repair Advice, Car Reviews & Values - DriverSide. 10 Cool Google Maps Mashups: The SPF Setup Wizard. Form based record testers E-mail based record testers We provide an e-mail based record tester. Send an e-mail to spf-test@openspf.net. Your message will be rejected (this is by design) and you will get the SPF result either in your MTA mail logs or via however your MTA reports errors to message senders (e.g. a bounce message). This is done to avoid the risk of backscatter from the tester.

This test tests both MAIL FROM and HELO and provides results for both.It uses the Python SPF (pySPF) library, which is fully compliant with the SPF specification. Form based TXT record viewer For implementors Test Suite - not a tool like others on this page, but maybe what you are looking for. The retired SPF record wizard For a long time we had a wizard utility (at to assist domain owners with creating SPF records for their domains. For this reason the wizard has been taken down. Paste the text you want to speed read. How To Train Yourself To Be In The Mood You Want.

Dec 27, 2010 When you have major changes going on in your life, or you’re just frustrated about where you are, it’s easy to get trapped in a cycle of depression, bad moods and frustration. I know, I’ve been there … and when I’m not careful, I still get there more than I want to. But when I’ve had a particularly hard time, I hit these moments where I’m in a foul mood, or I’m just feeling paralyzed, and I’m just stuck. Sometimes I just stew in that and stay there, but sometimes I actually get intelligent and pull my way out of it. I’m going to outline the framework that I’ve been using successfully to really get myself resourceful and motivated (and in a better mood) when I’m feeling stuck.

First Up: Using A Framework to Escape From Paralyzing Emotions When we feel bad, it’s hard to “feel good” again. The reason for this is that steps take the emotion out of our situation and give us direction to simply act. A: AGREE With Yourself That You Don’t Want To Be In This Mood Right Now. Dave. Computer Science | Video Courses on Academic Earth. In its purest form, computer science is the research and development of technology that solves specific problems. Computer science has brought the world smart phones, GPS systems, the gaming industry and tablet computing, along with technological developments that assist government, industry and medicine.

In addition to creating new technology, computer scientists also make improvements to existing technology and study the ways computers can make our lives easier. As with any branch of science, computer scientists perform research that establishes new information. This research begins with known mathematical algorithms and computer theory, and strives to constantly redefine what technology can do for us. Exploring fundamental questions about computation is the first step toward designing the hardware, software and complex network systems that we rely upon.

Sample Courses During the first two years of a standard 4-year program, students focus on the basics: Possible Specializations Master’s. Run Your Own Free Proxy Through the Google App Engine. Theta Wave Brain Synchronization. This is a replication of a Theta wave entrainment rhythm first created by scientists in the 1960s to lull patients into a deep, colorful, creative dream state. Listen to it for 10 minutes, longer if you can. The longer it plays, the deeper you’ll go. So go. How It Works The human brain produces different levels of electrical activity depending on the amount of information it is processing. During a detailed task, it lights up with electrical charges as it sends and receives messages at a high concentration, its neurons firing in quick succession. While in a relaxed state of sleep, it glows dimmer, its neurons firing less often. Throughout the day, the brain lingers between four different types of brainwave patterns: Theta waves (at around 4 to 7 Hz) are the sweet spot for many brain functions.

New cool list of Linux must-have programs. Update: A new, up-to-date collection is available. Please take a look! It's been approximately two years since I've written the first article, A (cool) list of Linux tools. The article proved quite popular with my audience, as it allowed Linux users, new converts in particular, a quick taste of some of the more useful programs available for Linux platforms, across a range of categories. Since, a lot has changed. Two years is a long time. I have decided to write a new article, from scratch, cataloging an up-to-date collection of must-have programs. Changes from the last time Like the last time, the programs will be sorted by categories. Games I will not be listing games here. Users' recommendations Likewise, there's a users' recommendation sub-section, so you can send me your suggestions and ideas. Table of Contents: Backup software File backup software Unison Unison is a simple, lightweight backup program.

TimeVault Imaging software CloneZilla Mondo & Mindi PartImage Remastersys remaster-on-the-fly. Visual Cryptography. What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. In the table on the right we can see that a pixel, divided into four parts, can have six different states.If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1.

We can now create the two layers. Additional information. Programmer 101: Teach Yourself How to Code. Future proof » Tim’s laptop service manuals. Have you come to this webpage looking for Toshiba laptop service manuals? Please read this. Introduction In the same vein as in my driver guide, I’ve started finding laptop service manuals and hosting them on my site. These are the professional, official documents published by the various laptop makers, either for their own technicians or for the use of the general public. They generally detail the exact list of parts in each model of laptop – often down to individual screws, if you happen to have lost some and need to know the exact size for a replacement – and describe the procedure for disassembling and reassembling the entire machine, including panels, RAM, wireless cards, keyboards and touchpads and LCD screens, all the way down to the motherboard itself.

They’re difficult to find – you have to know where to look in their support site, or come up with the right Google search string, or beg and steal from someone you know in the industry. Practical stuff Organisation Feedback Acer Apple. Synergy - Docs - Synergy. BackTrack Linux – Penetration Testing Distribution. 10 Cool Ways to Use Nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings.

-sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open. Twelve Awesome Afternoon Projects for the Extra Day of Your Long Weekend. Mozilla Firefox Cheat Sheet. HP OfficeJet Pro 8500A Plus Review - PCWorld. 99 ways to make your computer blazingly fast. Over the last several years working in IT for various companies as a Systems Administrator, Network Administrator, and Help Desk professional, I’ve written and learned about many ways to increase the performance of not only my PC, but also of the many PCs on my networks ranging from Windows 98 to Windows Vista.

In this article, I hope to compile a complete list of all the different methods and tricks that I’ve used to get the last bit of juice out of a slow PC. Whether you are using an old PC or the latest and greatest in hardware, you can still use some of these to make your PC run faster. Note that since I write two blogs, Help Desk Geek and Online Tech Tips, I have previously written about many performance tips already which I will link back to throughout. If I have not written about it, I’ve throw in a link to a relevant article from some of my other favorite sites. This list is in no particular order, just written in the order that I could think of them. 1. 2. 3. 4. 5. 6. 7. 8. 9. Getting Out of Debt. Photo: lemonjenny Last week, we announced a five-week long giveaway of Hot (broke) Messes, a financial how-to book for young adults written by Nancy Trejos, the personal finance columnist at the Washington Post. To enter the giveaway, we asked you — our readers — to share your own “getting out of debt” stories.

Each week, five of you will win a copy of the book and we will publish some of the best stories on MintLife. Here is what some of you told us this week. Deferred Student Loans to Focus on Credit Card Debt Emily Holden of Brighton, Mass., wrote: I’m pretty lucky: I don’t have too much debt for a 25-year old. Recently, I joined Mint.com to help keep my budget in check. I have sworn off buying clothes for the remainder of the month, but when I do, I try to stick to inexpensive, thrift-store clothes. I never let my checking account get below $1,000 and I check my balances every day.

The key is: always know where your money is going. Pamela A., Atlanta, GA: Cathi C., Chattanooga, TN. Corporate Wars-Alternative News Links. Big Questions Essay Series | The John Templeton Foundation. Three locks for your SSH door. Introduction If you require remote access to your computer and you enable Secure Shell (SSH) connections, you must accept that you will automatically attract hackers who will try to break your defenses and take command of your machine. Although there's no guarantee that your machine won't be "0wn3d" by a "h4x0r," a few simple solutions can help reinforce your SSH door and make life a bit more difficult for anybody trying to break in.

This article considers three such techniques: Changing SSH's standard port to an unusual value and reinforcing SSH configuration so that simple-minded attacks just bounce back. Defining a restricted list of users who are allowed to log in.Completely hiding the fact that you even allow SSH access and requiring a special "knock" sequence to be recognized as a possible user. To apply these techniques, you need to access the root account. Back to top Reinforcing the door Everybody knows that the standard port for SSH connections is 22.

Ssh -p 22960 your.machine.url. UNIX tips: Learn 10 good UNIX usage habits. Break bad UNIX usage patterns Michael StutzPublished on December 12, 2006 When you use a system often, you tend to fall into set usage patterns. Sometimes, you do not start the habit of doing things in the best possible way. Sometimes, you even pick up bad practices that lead to clutter and clumsiness. One of the best ways to correct such inadequacies is to conscientiously pick up good habits that counteract them. This article suggests 10 UNIX command-line habits worth picking up -- good habits that help you break many common usage foibles and make you more productive at the command line in the process. Adopt 10 good habits Ten good habits to adopt are: Make directory trees in a single swipe Listing 1 illustrates one of the most common bad UNIX habits around: defining directory trees one at a time. Listing 1. It is so much quicker to use the -p option to mkdir and make all parent directories along with their children in a single command.

Listing 2. Listing 3. Listing 4. Listing 5. Pack for Linux: Our List of the Best Linux Downloads. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist. Decrypt a Cisco VPN Password | corey gilmore's blog. How Far We've Come Since Netstumbler. Corporate Espionage for Dummies: HP Scanners. 25 Questions to Ask During an Information Security Interview. Cisco Tools - BradReese.Com. Do As One. 10 Environmental Games That Teach Kids About Earth, Ecology & Conservation.

10 Websites To See What HTML5 Is All About. Where to Get the Best Free Education Online. No Time to Clean? What to Do. How to Really Browse Without Leaving a Trace. 5154_1108951535802_1587243634_246759_825011_n.jpg (JPEG Image, 604x453 pixels) 25 Stunning Pictures Of Bora Bora – Most Beautiful Island on the Planet.

.: Sumo Paint 2.0 :. Remote Access for Vendors. Buddhist Geeks : Discover the Emerging Face of Buddhism - Download free podcast episodes by Personal Life Media on iTunes. SophosLabs Insights Blog | Dark Reading | Security | Protect The Business – Enable Access. The Egg. JAP -- ANONYMITY & PRIVACY. Wireless LAN Security / Wardriving / WiFi Security / 802.11. Talisker Computer Network Defence Operational Picture. Sandboxie - Sandbox software for application isolation and secure Web browsing.

Mental Math Tricks to Impress Your Friends. How To Become A Hacker. HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports. Friday afternoon « Funny Emails. 100+ Google Tricks That Will Save You Time in School – Eternal Code. Science News: Nanoguitar. Crack/Keygen Sites That Are Safe To Use. How to Hack Your Nintendo DS for Easy Backups and Single-Cartridge Playback. Probably the Best Free Security List in the World. Digital Designer : Get Started. Einztein - Find free online courses.

Pearltrees videos

DMVPN Explained | CCIE Blog. Prod_brochure0900aecd80582078.pdf (application/pdf Object)