background preloader

5 Fun things To Do on School Computers - Pahgawks Animations - StumbleUpon

5 Fun things To Do on School Computers - Pahgawks Animations - StumbleUpon
November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy. This week will be about something I've wanted to write about for a while: School computers! They're just too easy to hack and do fun stuff with, especially because teachers are just so incompetent with technology sometimes. 1. There's all kinds of really annoying things you can do with Javascript, and all you need in order to do some of these things is a text editor and a web browser. So what do you do with this code? So, what does this code do? 2. Yep, it's actually quite easy to do. Or if it's actionscript 3 write the following: Press Control-Enter when you're ready to crash your computer. 3. Want to be an administrator? Although, you have to replace USERNAME with whatever your username is. Note: This may or may not work if they have disabled the command prompt. 4. It's usually useless... Start > Run. It's bluescreeneriffic! 5. Open notepad. Warning On that light note, see you all next week!

A history of hacking A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls. Early 1980s Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud. 2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

How Secure Is My Password? - StumbleUpon The Open Organisation Of Lockpickers :: Meetings - StumbleUpon This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. Lock Basics and Mechanical Operation How pin tumblers are arranged and how locks operate (or fail to) with conventional keys Introduction to Lockpicking Overview of why lock picking is possible and the use of basic pick tools Manipulation-Resistant Locks Spool pins, mushroom pins, and other ways of increasing security Diagrams of Bumping Attacks Animations showing how snapping guns and bump keys work Key Impressioning Many detailed, step-by-step diagrams and animations detailing the process of key impressioning Master Diagrams

50 Incredible Photos Of Animals From 2011 - StumbleUpon Top 5 Websites To Learn How To Hack Like A Pro - StumbleUpon You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman. There’s a caveat that I have to share before diving into these sites. #1 – Hacking Tutorial: Tech Tips and Hacking Tricks

Hands-On UNIX System Administration — Spring 2011 Announcements (3/16) Kevin Mullally, manager of the EECS Instructional Support Group, and other INST staff will be holding a discussion with the OCF on system administration practices tomorrow, 17 March, at 1:30PM in 102 Barrows. Topics will include mail and web servers (e.g., anti-spam and CGI), as well as how the OCF is run. All are invited to attend! (3/14) Final project proposals are due in hard copy at the start of next class, 28 March (after spring break). Essentials The Spring 2011 Sysadmin DeCal meets on Mondays from 6-8PM in 273 Soda and is facilitated by Jordan Salter (jordan.salter at berkeley.edu), with the assistance of Eugene Baumstein. We'll cover the setup and administration of a production-quality UNIX server, suitable for web/mail hosting, shared shell hosting à la the EECS Instructional servers, and the like. Schedule, slides, and labs Resources Contacting the staff If you need help, send us an email! Connecting from home valid xhtml 1.0 strict, css 2.1

MTS2:Creator Guidelines/Sims 3 Body Shop This page was last modified 19:49, 21st March 2010. Uploading sim content? This guide will walk you through every step of what we require on MTS. Please make sure you read these guidelines carefully, as our standards have changed over the years, and there may be some items you weren't aware of before. At the end of the guidelines after full explanations of each item is a checklist, so you can make sure you've done everything you need to. If you've uploaded TS2 Bodyshop content, then many of these standards are the same; however please pay particular attention to requirements regarding recolourable channels. Quality The first thing moderators look for when moderating uploads is quality - simply, is the item good or not? Time and Effort This is probably the hardest one to quantify, but it's something that is obvious whenever upload moderators look at an upload: have you really expended some serious time and effort on a creation? Logos Not Too Bright Black and White Crisp/Unpixellated Screenshots

Awesome idea to scare the sh*t out of your roommates | Lulz Truck - StumbleUpon Awesome idea to scare the sh*t out of your roommates Share10.9K Tweet122 You might like: Saw this today. Getting real tired of your sh!t, Casio ThatsNotChocolate.jpg - Lulz Truck - Lulz Truck ThemostsearchedthingonBing.jpg - Lulz Truck Recommended by Disclaimer | Privacy Policy | Terms & Conditions | Contact us | Copyright and DMCA © LulzTruck 2012- Powered with Love and Presslabs - EPIC Hosting

Ultra-Luxurious Concept Yacht Comes with a Custom Supercar (Photos) : Discovery Channel If you can find a way to not spend any money and live to the age of 150, you stand a decent chance of one day being able to afford the Strand Craft 122, the incredibly luxurious and mouth-watering concept yacht that comes with a custom supercar. But if not, chances are you’ll enjoy these renderings anyway, especially since they’re slated to become reality: Designer Eduard Gray has announced that the 122 will be built in the near future. SLIDESHOW: Futuristic Airbus Plane Has Transparent Cabin and More The 122, to be built by the Ned Ship Group, measures 38 meters (125 feet) from bow to stern, features a Rolls-Royce engine, pumps out 14,000hp and hits a top speed of 55 knots (about 63mph). Of course, the Strand Craft 122 would fall short of the ultimate luxury standard if it didn’t come with a custom-made supercar. READ MORE: 8 Surprisingly Fuel-Efficient Luxury Cars SLIDESHOW: Top 5 Things People Buy Online READ MORE: Top Classic Sports Cars of all Time

How To Remove Vocals From Music Tracks Using Audacity - How-To Geek - StumbleUpon Ever get a sudden, inexplicably irresistible desire for karaoke? Maybe you like the music of a song but can’t stand the lead singer? Here’s how to use remove the vocals from most music tracks in a few simple steps. How It Works Vocals are normally placed in the “center channel.” On the whole, however this process works really well if you start with good quality audio. Removing the Center Channel Fire up Audacity and load your song of choice. The first thing we need to do is break the song’s two channels into two separate tracks. Next, pick a channel (it doesn’t matter which) and double click to select the entire track. Go to Effect > Invert. If you hit play, you’ll notice the song sounds a little funny. That’s it! Yatri Trivedi is a monk-like geek.

Hacking the Xbox How To Become A Hacker - StumbleUpon Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

Related: