3 Spam Free Ways to Share Your Contact Information. My husband was my inspiration for this post.
He wanted to share his contact information on Twitter and was 2 seconds away from posting a tweet with his actual email address, until I stopped him. I let him know that he was just asking for trouble (lots of spam) by doing that. I then helped him search for a better alternate: a way of posting his contact information without having to actually post his email address. He decided upon Scrim, but along with that service here are 2 other quick and easy spam free ways to share your contact information on the Web.
Why the Navy Likes Google+ The United States Navy has been quietly coaching sailors, personnel, and their families on proper use of social media.
But that's not all--they also seem to be major fans of Google+. A presentation on how to get started on Google+ was recently made available to Navy personnel; copies have also been published online by the Navy's Chief of Information office. The guide is full of plans for specialized Navy pages to be created once Google allows them for businesses and institutions. How Does Google Work? Top 100 Network Security Tools. HTML Cheatsheet &124; Webmonkey&&124; Wired.com - StumbleUpon.
Chat with Your Friends through ms dos Command Prompt - StumbleUpon. -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....!
@echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 25 Best SSH Commands / Tricks - StumbleUpon. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.
Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Digital Inspiration: A Technology Blog on Software and Web Appli. Network World. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years.
What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. GRM n00bs. 64 Things Every Geek Should Know « Caintech.co.uk. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.
The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. News. Opinion. Advice. Research. Ophcrack. CSM: Computer Science and Mathematics Division. Krebs on Security. Top 100 Network Security Tools. Cryptome. The Anonymous Press. InformIT: The Trusted Technology Source for IT Pros and Developers.
Your Anon News. Schneier on Security. Ross Anderson's Home Page. Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard.
Tom Dunigan's Security page. Tom Dunigan's UTK/CS security course Security pointers NIST computer security and resources/conferences Yahoo Security and Encryption and hacker news security mailing lists and infosec news newgroups: sci.crypt comp.security.unix comp.security.misc comp.risks.
Computer Security - Internet Security - Network Security - Anti Virus Information Portal - Anti Virus Hacking Alerts Bulletins - InfoSysSec. SecurityFocus. Cybersecurity News. History of Computer Security. Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98.
These papers are unpublished, seminal works in computer security. Megapanzer. Switch on the Code.