background preloader

Turn Your Home Router Into a Super-Powered Router with DD-WRT

Turn Your Home Router Into a Super-Powered Router with DD-WRT
Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. What Is DD-WRT? Here’s our router. DD-WRT is an open-source alternative firmware for routers. Router Support Turning your home router into an almost professional-level tool is a great project that has one major caveat: support. For our purposes, the important spec to consider is NVROM, or ROM. Preparation The most important thing in any project is research. The friendly forum gave us some useful info for our particular model. The Process

http://www.howtogeek.com/56612/turn-your-home-router-into-a-super-powered-router-with-dd-wrt/

Related:  ComputerComputer Tweaksprajwalr

Download the How-To Geek Photoshop CS5 Cheat Sheet When there’s a shortcut or trick that can help you save time, it’s our mission to pass that help along to you. Our new cheat sheets are a collection of exactly that, ready for your download and great for printing. Here’s the very first one, for Photoshop. 3D computer graphics 3D computer graphics (in contrast to 2D computer graphics) are graphics that use a three-dimensional representation of geometric data (often Cartesian) that is stored in the computer for the purposes of performing calculations and rendering 2D images. Such images may be stored for viewing later or displayed in real-time. 3D computer graphics rely on many of the same algorithms as 2D computer vector graphics in the wire-frame model and 2D computer raster graphics in the final rendered display. In computer graphics software, the distinction between 2D and 3D is occasionally blurred; 2D applications may use 3D techniques to achieve effects such as lighting, and 3D may use 2D rendering techniques. 3D computer graphics are often referred to as 3D models. Apart from the rendered graphic, the model is contained within the graphical data file.

Collection of Beautiful Lakes A lake is the landscape’s most beautiful and expressive feature. It is earth’s eye; looking into which the beholder measures the depth of his own nature. Who doesn’t believe that God has created images of Paradise here in this world? I believe, if one wishes to get the glimpse of the heavenly glory, then they better start discovering the world and they shall see for themselves. There exist such charismatic views, so blissfully divine a look they give.

How to Quiet Your Mechanical Keyboard with Switch Dampeners Mechanical keyboards are known for their distinct sound, but that doesn’t mean that you (or those you share your living space with) are very fond of the loud clatter. Thankfully, it’s incredibly easy and inexpensive to dial down the volume with switch dampeners. Switch Dampeners: Like Shock Absorbers for Your Keys UPDATED - Using Googles Full Capabilities & XBOX, XBOX 360, PS2, PS3,... Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here.

4 Things Computer-illiterate Users Should Know When Running Windows Microsoft Windows is a very easy operating system to use, and the latest versions certainly have taken security seriously. However there are still many people who don’t know enough about their computers to use them properly. Words like “CPU,” “hard drive,” and “RAM” are commonplace for tech-savvy people, but the average person isn’t as familiar with the concepts and easily falls victims to scammy gimmicks and expensive computer repairs. If you’re not so literate with computers, here’s four things you should know that might help you in the long run. In most cases, you’d probably land on a pop-up advertisement promising that your computer will run much faster after you try out their software. I assure you that this is a gimmick intended to make you pay money for software that only takes up space on your hard drive.

Beowulf cluster The Borg, a 52-node Beowulf cluster used by the McGill Universitypulsar group to search for pulsations from binary pulsars A Beowulf cluster is a computer cluster of what are normally identical, commodity-grade computers networked into a small local area network with libraries and programs installed which allow processing to be shared among them. The result is a high-performance parallel computing cluster from inexpensive personal computer hardware. The Top 50 Pictures of the Day for 2011 Every day at 5pm the Sifter posts the Picture of the Day. Below you will find a collection of the Sifter’s Top 50 from 2011. It’s hard to imagine the year is almost over, time seems to fly faster each successive year so it’s fun to take a moment and look back at the year that was.

Firesheep The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

Hack your Workspace with The Epic Compudesk To build your own, custom PC-in-a-desk, follow this all-in-one tutorial for a fantastic workspace mod. The Compudesk is built from scratch and is made of aluminum and glass with green and blue illumination. But the Compudesk is not just a computer built into a desk with pretty lights – there’s some serious hardware (Intel Core i7 980X processor, two 17”, and one 27” monitors) storage (10TB), and all of it is completely water cooled. It is a massive build nearly weighing in at 40 Kg with all the hardware. Nowhere to hide: Advertisers can now stalk you across multiple devices Advertisers want to compile as much information about you as possible. Tracking where you go, what you click, and how you search is literally their business. They use that data to target ads directly to you, and feed relevant data to their partners. With the increasing use of tablets and smartphones in daily life, advertisers have been frustrated by a limited ability to correlate traffic from multiple devices to a single person.

How To Find Product Key Of Any Software » Product Key Finder Tips How to find the product key of any software that you want..?? A product key is a unique identification number or code, used in software like operating systems and games, to prevent counterfeiting and piracy. This is a specific software program. For the most part, a product key operating system is an insignificant number, but when you need to re-install your OS, suddenly the product key becomes the code harder to find. Find Product Key Of Windows 7 A product key Windows 7 is needed to activate the system, format the Windows 7, or in the event of a system crash, re-installing Windows 7 on your computer.

Related:  Hackingtools & usable shitsComputer ProgrammingToolsTechy StuffRandom ShitHacks & TweaksTechtricksTools