background preloader

5 Fun things To Do on School Computers - Pahgawks Animations - StumbleUpon

5 Fun things To Do on School Computers - Pahgawks Animations - StumbleUpon
November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy. This week will be about something I've wanted to write about for a while: School computers! They're just too easy to hack and do fun stuff with, especially because teachers are just so incompetent with technology sometimes. 1. There's all kinds of really annoying things you can do with Javascript, and all you need in order to do some of these things is a text editor and a web browser. So what do you do with this code? So, what does this code do? 2. Yep, it's actually quite easy to do. Or if it's actionscript 3 write the following: Press Control-Enter when you're ready to crash your computer. 3. Want to be an administrator? Although, you have to replace USERNAME with whatever your username is. Note: This may or may not work if they have disabled the command prompt. 4. It's usually useless... Start > Run. It's bluescreeneriffic! 5. Open notepad. Warning On that light note, see you all next week! Related:  hacking

How Secure Is My Password? - StumbleUpon The Open Organisation Of Lockpickers :: Meetings - StumbleUpon This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. Lock Basics and Mechanical Operation How pin tumblers are arranged and how locks operate (or fail to) with conventional keys Introduction to Lockpicking Overview of why lock picking is possible and the use of basic pick tools Manipulation-Resistant Locks Spool pins, mushroom pins, and other ways of increasing security Diagrams of Bumping Attacks Animations showing how snapping guns and bump keys work Key Impressioning Many detailed, step-by-step diagrams and animations detailing the process of key impressioning Master Diagrams

Top 5 Websites To Learn How To Hack Like A Pro - StumbleUpon You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman. There’s a caveat that I have to share before diving into these sites. #1 – Hacking Tutorial: Tech Tips and Hacking Tricks

MTS2:Creator Guidelines/Sims 3 Body Shop This page was last modified 19:49, 21st March 2010. Uploading sim content? This guide will walk you through every step of what we require on MTS. Please make sure you read these guidelines carefully, as our standards have changed over the years, and there may be some items you weren't aware of before. At the end of the guidelines after full explanations of each item is a checklist, so you can make sure you've done everything you need to. If you've uploaded TS2 Bodyshop content, then many of these standards are the same; however please pay particular attention to requirements regarding recolourable channels. Quality The first thing moderators look for when moderating uploads is quality - simply, is the item good or not? Time and Effort This is probably the hardest one to quantify, but it's something that is obvious whenever upload moderators look at an upload: have you really expended some serious time and effort on a creation? Logos Not Too Bright Black and White Crisp/Unpixellated Screenshots

Awesome idea to scare the sh*t out of your roommates | Lulz Truck - StumbleUpon Awesome idea to scare the sh*t out of your roommates Share10.9K Tweet122 You might like: Saw this today. Getting real tired of your sh!t, Casio ThatsNotChocolate.jpg - Lulz Truck - Lulz Truck ThemostsearchedthingonBing.jpg - Lulz Truck Recommended by Disclaimer | Privacy Policy | Terms & Conditions | Contact us | Copyright and DMCA © LulzTruck 2012- Powered with Love and Presslabs - EPIC Hosting

How To Remove Vocals From Music Tracks Using Audacity - How-To Geek - StumbleUpon Ever get a sudden, inexplicably irresistible desire for karaoke? Maybe you like the music of a song but can’t stand the lead singer? Here’s how to use remove the vocals from most music tracks in a few simple steps. How It Works Vocals are normally placed in the “center channel.” On the whole, however this process works really well if you start with good quality audio. Removing the Center Channel Fire up Audacity and load your song of choice. The first thing we need to do is break the song’s two channels into two separate tracks. Next, pick a channel (it doesn’t matter which) and double click to select the entire track. Go to Effect > Invert. If you hit play, you’ll notice the song sounds a little funny. That’s it! Yatri Trivedi is a monk-like geek.

How To Become A Hacker - StumbleUpon Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

The Most Frightening Bridge Ever Storseisundet Bridge (Norwegian: Storseisundetbrua) is the longest of the eight bridges that make up the Atlanterhavsveien (“The Atlantic Road”), the road connection from the mainland Romsdal peninsula to the island of Averøya in Møre og Romsdal county, Norway. It is a bridge on one of Norway’s most scenic and popular tourist roads – the Atlantic Ocean Road (Atlanterhavsveien in Norwegian). The bridge named Storseisundet makes a sharp bend as it jumps over a number of small islands and waterways. The approach to the bridge looks scary as the bridge seems to end abruptly and as if any attempt to proceed would result into the vehicle flying out and dropping into the waters below. Storseisundet Bridge is a cantilever bridge that is 260 metres (850 ft) long and with a maximum clearance to the sea of 23 metres (75 ft). 1. Ads by Google

Getting Links from the Top 50 Domains | TheGoogleCache: Search Engine Marke... Isn’t chasing links for links sake a bit outdated? Surely a link on a page not in any way related to your site isn’t worth that much? Maybe I’m wrong – discuss. lol :o) Author Response: While the issue is up for debate, I agree with your first statement and disagree with your second. The Humble Bundle for Android 2 (pay what you want and help charity) Horrible Cards - The Oatmeal - StumbleUpon Horrible Cards are Copyright © 2012 Matthew Inman. Please don't steal. The Oatmeal

Watch Movies with no limits

Related: