Get flash to fully experience Pearltrees
My husband was my inspiration for this post. He wanted to share his contact information on Twitter and was 2 seconds away from posting a tweet with his actual email address , until I stopped him.
The United States Navy has been quietly coaching sailors, personnel, and their families on proper use of social media.
Keep this cheatsheet handy — it contains the most common HTML tags and their proper syntax.
-: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt.
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.
If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.
Tom Dunigan's UTK/CS security course Security pointers
Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security.
The Guide to Mostly Harmless Hacking The Guide to Mostly Harmless Hacking is an incredible resource for computing. I encourage anyone even the slightest bit interested in "hacking" to check it out.