background preloader

3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com

There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. It’s not a bug. It’s part of the cache feature. This ‘feature’ is how the pages are cached in a tabbed environment. To improve performance when navigating (studies show that 39% of all page navigations are renavigations to pages visited less than 10 pages ago, usually using the back button), Firefox implements a Back-Forward cache that retains the rendered document for the last five session history entries for each tab. This is a lot of data. Now a lot of us have found the ‘secrets’ on how to manipulate settings in “about:config” to drop the memory usage as long as possible and to increase the speed at which Firefox loads sites. Remember: Firefox (download it here) is the best internet browser available (in my opinion), and these tweaks below will make it even greater and faster. Reduce the amount of RAM Firefox uses for it’s cache feature Here’s how to do it: 1. 1. 2. 3. 1.

http://gnoted.com/3-hacks-for-firefox-double-internet-browsing-speed/

Related:  HacksIT Troubleshooting and ConfigurationTechCulture

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Windows Performance Toolkit - Xperf - Ntdebugging Blog - Site Home - MSDN B I recently came across a very interesting profiling tool that is available in Vista SP1 and Server 08 called the Windows Performance Analyzer. You can use this tool to profile and diagnose different kinds of symptoms that the machine is experiencing. This tool is built on top off the Event Tracing for Windows (ETW) infrastructure. It uses the ETW providers to record kernel events and then display them in a graphical format. Performance Analyzer provides many different graphical views of trace data including: CPU Sampling CPU and Disk utilization by process and thread Interrupt service routine and deferred procedure call Hard faults Disk I/O Detail

70 Fantastic Windows 7 Tips & Tricks For Better Functionality - Gnoted.com Windows 7 is much better than the latest version of Windows Vista and it comes with a lot of new features. Unfortunately, some of them aren’t so easy to figure out, so I created a list of the most important tips and tricks and a step-by-step guide that will help you apply all of these great tips and tricks. 1. PC Safeguard

10 sites developers should have in their bookmarks Mysql Format Date MySQL Format Date helps you to format your dates using the MySQL DATE_FORMAT function. Just select a common date format and then change it to your suit your needs. The MySQL DATE_FORMAT code will be generated at the bottom of the page which you can then copy into your query. Visit site: American Censorship Day November 16 - Join the fight to stop SOPA Despite the fact that SOPA (Stop Online Piracy Act) legislation has not come into force, it is still under debate. The main aim of this bill is rather clear. However the means turned out to be the reason for serious doubts regarding the effectiveness of this law. Here we are going to have a closer look at it.

Top 5 Websites To Learn How To Hack Like A Pro You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman.

Add a fix to improve the logging capabilities of the Storport.sys driver to troubleshoot poor disk I/O performance in Windows Server 2008 R2 On a Windows Server 2008 R2-based computer, it usually takes you lots of time to troubleshoot slow performance or unresponsiveness issues that occur when you perform disk I/O operations. The most common cause of I/O latency issues is faulty or underperforming drivers. These latency issues occur specifically with disk or filter drivers.

6 Things I Bet You Didn't Know You Could Do with Google Some of the tips below are effortless to implement and save you a lot of time and energy when dealing with these issues. Let’s start with the first proof of the awesomeness of Google… 1. Create unlimited disposable email addresses with Gmail If you add dots (.) between the letters of your Gmail username, sending an message to the new username will get forwarded to your original email (which is without or with only 1 dot.) For example:

Optimizing C and C++ Code Embedded software often runs on processors with limited computation power, thus optimizing the code becomes a necessity. In this article we will explore the following optimization techniques for C and C++ code developed for Real-time and Embedded Systems. Many techniques discussed here have roots in the material we covered in the articles dealing with C to Assembly translation. 10 Reasons to Use Encrypted Packet Routing There was a time, not too long ago, when encrypted routing might have been optional for most folks: nice-to-have, but not really crucial. After all, who really had to worry about their ‘net connection, once packets left their computer and headed into the proverbial “internet cloud.” Those times have changed.

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Windows 7: The PerfMon System and Security Test While you may get an erroneous warning message regarding the absence of an antivirus solution, you can adjust PerfMon to report accurately. The Reliability and Performance Monitor (PerfMon) was first introduced in Windows Vista. This was one of the new Microsoft Management Console (MMC) snap-in components that was truly helpful. This snap-in is still present in Windows 7 in a slightly modified version, yet its primary function remains the same. During my time on the Microsoft Answers Forum, there were many posts that dealt with the PerfMon health report generator issue, especially when the report stated that the Security Center had not recorded an antivirus product. In this article, I’ll analyze and explain this issue and help you with a resolution.

5 Reasons Not To Buy A Smartphone Smartphones are slowly but surely taking over the world. So much so that in 2013, smartphones outsold feature phones globally for the first time, with a reported 55 percent of all new phones sold in Q3 of the smart rather than dumb variety. However, despite their entry into the mainstream, smartphones aren’t yet anywhere near being essential tools for life. Those who own one may think they couldn’t live without their iPhone, Android, or Windows Phone handset, but in reality they could, if they were called upon to do so. The danger with this ubiquitousness is that you may feel pressured into buying a smartphone, even though you’re perfectly happy with your (so-called) dumbphone. Don’t be pressured.

Related:  metalworkerComputer Related StuffHacking ArticlesGEEKcomputersComputer stuff