background preloader

Geek Stuff

Facebook Twitter

LEARN KLINGON! Qapla' batlh je - KAHPLAH BATL JEH - SUCCESS AND HONOR HIja' - HIHJAH' - YES, TRUE (answer to yes/no question) HISlaH - HISHLAHH - YES,TRUE (answer to yes/no question) luq - LUKE - YES, OK, I WILL lu' - LU' - YES, OK.

LEARN KLINGON!

Amazon.

ThinkGeek

Top 6 Underground Search Engines You Never Knew About. Advertisement I love Google, Bing and Yahoo just as much as the next Internet user, but sometimes you really want to dig down into a particular subject.

Top 6 Underground Search Engines You Never Knew About

In order to do that, you really need access to those underground search engines that may not be quite as well known, but they dig much more deeply into specialized areas of the Internet than the general search engines are capable of. In many cases, these search engines are tapped into what is currently termed the “invisible web,” which is the information available on the Internet that standard search engines don’t have access to, because they are buried behind query forms or directory requests.

The following 6 underground search engines that I chose are not porn sites, illegal piracy sites or anything else that could get you in trouble with the law, or with your significant other. Instead, I term the following as “underground search engines” for two reasons. Here is a search for “classical music,” with over 300 results. List of constructed languages. This list of notable constructed languages is in alphabetical order, and divided into auxiliary, engineered, and artistic (including fictional) languages, and their respective subgenres.

List of constructed languages

Auxiliary languages[edit] International auxiliary languages are languages constructed to provide communication among all human beings, or a significant portion, without necessarily replacing native languages. Controlled languages[edit] Controlled languages are natural languages that have in some way been altered to make them simpler, easier to use, or more acceptable in certain circumstances, such as when a person does not speak the original language well.

The following six projects are example of controlled English: Visual languages[edit] Visual languages use symbols or movements in place of the spoken word. Engineered languages[edit] Hot Wire Your Car. From Wired How-To Wiki Nine times out of ten, the term "hot-wire" summons images of car theft.

Hot Wire Your Car

Of course, anyone who's been stranded in a hostile environment without their car keys knows better. Here's the trick to getting your vehicle moving again. This article is a wiki. Got extra advice? What you'll need Proof of ownership of the vehicle Slotted screwdriver Wire stripper Insulated gloves Try the screwdriver It's not pretty, but a screwdriver can save you some trouble.

Network Monitoring Tools. Les Cottrell, SLAC.

Network Monitoring Tools

Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on.

Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. . * A compatible wireless adapter—This is the biggest requirement. . * A BackTrack 3 Live CD. . * A nearby WEP-enabled Wi-Fi network. . * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. How to hide files in JPEG pictures. If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes.

How to hide files in JPEG pictures

However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! How to Find Someone's IP Address by AIM Chat. How to Crack the Account Password on Any Operating System – Joe Tech.

This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories.

How to Crack the Account Password on Any Operating System – Joe Tech

Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password. Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin).

The computer will restart and Ophcrack will be loaded. How to defeat most keyloggers on public computers. Keyloggers can generally be classified as either software or hardware keyloggers.

How to defeat most keyloggers on public computers

Software keyloggers are running as a background task on the system while hardware keyloggers are little devices that are most of the time connected between pc and keyboard recording every keystroke to their own memory. The simple keylogger records every keystroke while more advanced ones make screenshots and record mouse movements as well. The idea for this article was born while reading the excellent Technospot article about keyloggers. Default Password List - Submit.