background preloader

The Hacker Crackdown

The Hacker Crackdown

http://www.mit.edu/hacker/hacker.html

Related:  shaundonnelly

“Password” Remains Top Password, “Jesus” Cracks the Top 25 People: What are you doing? This is just getting sad now. Remember all of those password leak stories you’ve seen in the last few months? How many? One? LDraw All-In-One-Installer Quick installation Download the following file Mirror: Peeron.comLDraw_AIOI_2013-02_setup_32bit_v2.zipNOTE: The file is protected by a Captcha image. Please type in the letters you see in the picture.Mirror: 1000Steine.comLDraw_AIOI_2013-02_setup_32bit_v2.zip Mirror: Lugnet.bizLDraw_AIOI_2013-02_setup_32bit_v2.zip Unzip the content NOTE: Use 7-Zip (recommended), Winzip or Winrar if the explorer of your Windows OS has no inbuild decompression of .zip files. 100 Websites You Should Know and Use Entertainment Meet David Peterson, who developed Dothraki for Game of Thrones There are seven different words in Dothraki for striking another person with a sword. Among them: “hlizifikh,” a wild but powerful strike; “hrakkarikh,”a quick and accurate strike; and “gezrikh,” a fake-out or decoy strike.

free tutorials Have you ever read through a chapter in one of those Learn Such and Such in 21 Seconds books and realized that somewhere along the way you had started daydreaming about how you would spend a trillion dollars if you were Bill Gates? Well, it happens to me all the time. Computer books are boring. In fact, most technical writing out there bites the big one and there's no sign that the situation is going to get any better in the near future. The really unfortunate thing about this predicament is that now, more than any other period in the history of computing, is when we really need good, clear writing out there. Whether the established priesthood of computer science likes it or not, the web has opened the flood gates and computer science is being secularized post haste.

Cheap GPUs are rendering strong passwords useless Think that your eight-character password consisting of lowercase characters, uppercase characters and a sprinkling of numbers is strong enough to protect you from a brute force attack? Think again! Jon Honeyball writing for PC Pro has a sobering piece on how the modern GPU can be leveraged as a powerful tool against passwords once considered safe from bruteforce attack. Pack for Mac: Our List of the Best Free Mac Apps Finding excellent free software for your Mac is increasingly tough. In our fourth annual Lifehacker Pack for Mac, we're highlighting the best free downloads for better productivity, communication, media management, and more. The Lifehacker Pack is a yearly snapshot of our favorite, must-have applications for each of our favorite platforms. If you're curious to see how things have changed this year, here's last year's Lifehacker Pack for Mac. For our always-updating directory of all the best apps, be sure to bookmark our Mac App Directory.

Table of keyboard shortcuts In computing, a keyboard shortcut is a sequence or combination of keystrokes on a computer keyboard which invokes commands in software. Some keyboard shortcuts require the user to press a single key or a sequence of keys one after the other. Other keyboard shortcuts require pressing and holding several keys simultaneously (indicated in the tables below by this sign: +). 99 Speed Tips For A Fast Performing Mac Hey This post is going to list 99 different speed tips for speeding up your Mac. I have done a couple of these posts before, but those were more discussions. This post is designed to tell you what to do in each section. Each item is going to be quick, simple and easy to complete. Over the past couple of weeks I have been collecting these and using them.

Free Excel Downloads. Excel Functions and VBA (Visual Basic for Applications) AdvancedFilter.zip This is a zipped Excel Workbook that has six working examples using Excels Advanced Filter. It has three that use no formulas and three that do use formulas.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

5 FREE Programs to make your computer (slightly) easier to use and look cool(ish) This is a neat little gizmo that sits on any side of the screen. In its original format, I found it slightly obtrusive (it covered up the tool bars). I used these solutions.

Related: