Computer stuff

Facebook Twitter
10 Useful Google Spreadsheet Formulas You Must Know
FillAnyPDF FillAnyPDF is a fairly simple web app which allows you to upload a PDF file, then easily write on it wherever you want. This allows you to easily fill out any form, even if they’re not in an editable PDF form. You can also share your blank form with others, so you can collect forms from a group easily. FillAnyPDF also supports electronic signatures and has a repository of free forms.

30 Useful (and Unknown) Web Apps You Need to Bookmark - Page 2

30 Useful (and Unknown) Web Apps You Need to Bookmark - Page 2

Programmer 101: Teach Yourself How to Code

SExpand You've always wanted to learn how to build software yourself—or just whip up an occasional script—but never knew where to start. Luckily, the web is full of free resources that can turn you into a programmer in no time. Since the invention of the internet, programmers have been using it to discuss software development techniques, publish tutorials, and share code samples for others to learn from and use online. If you're curious about how to become a programmer, you can get off to a running start using tons of great free web-based tutorials and resources. Programmer 101: Teach Yourself How to Code
cyber xtreme Resources and Information. This website is for sale!

Virtual private network

Virtual private network VPN connectivity overview A virtual private network connection across the Internet is similar to a wide area network (WAN) link between sites. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network.[2] VPNs allow employees to securely access their company's intranet while traveling outside the office.
At a Cafe? I Can Hack Your Facebook, Twitter, Etc...With a Firefox Extension Whenever you connect to an unsecured WiFi network, you're taking a chance, but now it's easier than ever for someone to gain access to all of your social network login information. A new Firefox extension called Firesheep makes it simple for anyone to see that you're connected to the network, grab your login information for any number of social networks, and take over your online identity. Without this, hacking your account over an unsecured wireless network may not be rocket science, but it surely isn't the one-click magic made possible by Firesheep. Firesheep takes advantage of unsecured wireless networks and unencrypted cookies to "sidejack", or gain access to sites by way of accessing these cookies. Developed by Eric Butler, a freelance web application and software developer in Seattle, Washington, Firesheep was created and released at Toorcon 12 to demonstrate the security risk inherent in storing unencrypted login data in cookies. At a Cafe? I Can Hack Your Facebook, Twitter, Etc...With a Firefox Extension
How to install Android on your Netbook/PC | Tech Spikes
Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! Enjoy!

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding.
I have compiled a list of the most useful websites, across a wide variety of topics.. that you may find helpful, 157 of the Most Useful Websites on the Internet

157 of the Most Useful Websites on the Internet

E mail

Programing & Software

Top 50 Programming Quotes of All Time

I hope you have enjoyed our collection of funny computer quotes, Linux quotes, and all those quotes that we have shared with you so far. For today, I've decided to gather a good number of my all-time favorite programming-related quotes. Most of the programming quotes I've collected are made by some of the famous names in the industry, while others came from not-so-famous people. Nevertheless, they are all witty so I hope you will find them fascinating and enlightening. Top 50 Programming Quotes of All Time
LAST 5 Movie Comments/Ratings (Downloads are free, but to rate or leave comments you must sign up) LAUREL AND HARDY PREVIOUSLY POSTED HERE WERE MISIDENTIFIED I am told they are not in the public domain and they have therefore been removed from this site.TRINITY AND SARTANA PREVIOUSLY POSTED HERE WAS MISIDENTIFIED I am told it is not in the public domain and it has therefore been removed from this site. PDA SMARTPHONE PPC Sony PSP and Apple IPOD VERSIONS! see the PDA FAQ Ways to HELP support this site!

Public Domain Movie Torrents with PDA iPod Divx PSP versions

Public Domain Movie Torrents with PDA iPod Divx PSP versions
Are your search engine queries being hijacked? Who doesn't trust their search engine? When we need to find something, we all turn to Google, Bing, or Yahoo. We shouldn't be so trusting through. On Bing, cyber-crooks are now placing ads to ensnare people who want to switch to the Chrome Web-browser. Now, we find that some U.S. Are your search engine queries being hijacked?
Web tool's

Web Design & Tools

World’s First Computer Rebuilt, Rebooted After 2,000 Years | Gadget Lab World’s First Computer Rebuilt, Rebooted After 2,000 Years | Gadget Lab A British museum curator has built a working replica of a 2,000-year-old Greek machine that has been called the world’s first computer. A dictionary-size assemblage of 37 interlocking dials crafted with the precision and complexity of a 19th-century Swiss clock, the Antikythera mechanism was used for modeling and predicting the movements of the heavenly bodies as well as the dates and locations of upcoming Olympic games. The original 81 shards of the Antikythera were recovered from under the sea (near the Greek island of Antikythera) in 1902, rusted and clumped together in a nearly indecipherable mass. Scientists dated it to 150 B.C. Such craftsmanship wouldn’t be seen for another 1,000 years — but its purpose was a mystery for decades.
The MMPC came across an interesting piece of social engineering today that embeds a malicious script, which has been observed circulating on 4chan message boards. On further investigation, it became apparent that this is the next stage in the evolution of a threat known as 4chan.js that has been around since 2008. This scenario relies on a user's trust of image file formats and an unfamiliarity of the .HTA format (by the way, HTA stands for HTML Application). The user is sent a .PNG file that looks similar to the following screenshots: The .PNG file stores the data in a compressed format that is quite innocuous. Did you notice the fuzz at the bottom of the images shown above? Painting by Numbers - Microsoft Malware Protection Center
We all know of the huge social networking sites like Twitter and Facebook. They’re great for large scale connections and discussion. But, as entrepreneurs and small business owners sometimes it’s nice to connect with other like minded individuals in a smaller, more focused setting.

The Ultimate List: 40 Social Networking Sites Specifically for Small Business, Entrepreneurs, and Startups

Your Polldaddy Contents |
DownloadableYoutube will help you to download youtube videos directly to your computer, which is one of the fastest youtube video downloading tool on the web How to download Youtube Videos? All you have to do is to copy the Youtube URL of the video you want and paste it on this youtube video downloader

Download Youtube Videos | Youtube Video Downloader

Microsoft Surface 2 imminent: more than a big iPad with legs Interacting with Microsoft Surface version 2, built by Samsung. Photo: Bloomberg The Australian launch of Microsoft's new intelligent touch-screen table is imminent, sources say - the company's second attempt after its first Surface product bombed. A source close to the launch of the product, who spoke on condition of anonymity, said the announcement of Australian pricing and availability is scheduled for this month.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question.

70 Things Every Computer Geek Should Know. | Arrow Webzine

What Are Websites Made Of? (Infographic)