background preloader

Telehack

Telehack

Download Hiren’s BootCD 15.1 Changes From Version 15.1 to 15.2 New Added Softwares, Updated Functions: Updated Softwares: Troubleshoot If you are getting a virus warning from the downloaded files, please check FAQ page “Why am I getting a virus warning for a file downloaded from your website” section. If you are getting redirected to the download page or homepage while you are trying to download the file, please disable the softwares or settings can be blocking referer headers of your browser, connect directly if you are using a proxy, close your browser, clean browser cache and try again. Please check FAQ page for any other frequently asked questions. Filename: Hirens.BootCD.15.2.zipFilesize: 592.5 MB (621283886 bytes)ISO MD5: 7EFC81ADBBD551D56F6021C439C6837CZIP MD5: D342BBD6BF7554ABA24A376E41675DBF Antivirus Tools Backup Tools BIOS / CMOS Tools Award DMI Configuration Utility 2.43: DMI Configuration utility for modifying/viewing the MIDF contents (Dos Freeware).! Browsers / File Managers Cleaners Device Driver Tools Optimizers

TetraBox Light by Ed Chew Liquid to Light Designer Ed Chew takes a green step in the right direction with the TetraBox lamp, a light object made from discarded drink packets that would have otherwise ended up in landfills already packed to the brim. The design is achieved by unfolding the packets and refolding them into hexagonal and pentagonal sections that are then pieced together to form a geodesic sphere or any other desired shape. Here, the Epcot-like ball makes an attractive overhead light and casts an impressive web of shadows and shapes on the surrounding space. Designer: Ed Chew TDSS. TDL-4 We recently published an analysis of the TDSS rootkit, and just as we expected, TDSS continues to evolve. A new variant of the rootkit, TDL-4, which can infect both 32-bit and 64-bit operating systems, appeared sometime between July and August, 2010. In this article, we describe a new loading method used by the rootkit and examine how the rootkit bypasses PatchGuard and the Windows code integrity mechanism, the protection system built into 64-bit Windows operating systems. Components Importantly, TDL-4 has a different set of components to TDL-3. bckfg.tmp cfg.ini cmd.dll cmd64.dll drv32 drv64 ldr16 ldr32 ldr64 mbr Like the previous variant, the rootkit uses its own file system that is encrypted using the RC4 algorithm. Structures of the rootkit’s file system after decryption As with previous versions, the rootkit makes use of a configuration file. Sample data in a TDL-4 configuration file It can be seen from the list of components above that file names include the numbers 32 and 64.

How to build your own USB Keylogger Cause I've searched a lot for a project like this, and I haven't find anything around the Web, I would share my experience of my personal USB Keylogger. It's not really a pure "USB" Keylogger (cause USB HID protocol is much more difficult than PS/2 protocol), but it adapt an USB Keyboard to PS/2 port, while (of course) recording the keys pressed. In this way, even if it's discovered by anybody, it should be confused with a normal PS/2 Adapter. That's the final result: It need just a few component (SOIC PIC and EEPROM can be freely ordered as a sample from ): -PIC 12F1822 (SOIC Version) -EEPROM 24XX1025 (Any 1Mb version will be ok) (SOIC Version) -2 * 4k7 Resistor 1/8 W (Or any resistor of the same value as small as you can solder in the adaptor) -Pickit 2 / 3 (For programming the pic and reading the eeprom) -An USB to PS/2 Adapter that can be opened. And, very important: -A GOOD solder and VERY GOOD soldering abilities. Let's Start. Regards, Jamby

Anonymous Incredible Concept Bike Folds Down to Size of One Wheel If you’ve ever had to lug a bike with you onto the train or bus, or up a steep flight of stairs, you can probably understand the appeal of lightweight folding bikes. But most of them are too light-weight to handle the demands of serious riders. Dominic Hargreaves was having the same struggles with folding bikes, and after failing to find one that he liked, he decided to make one for himself. The result was The Contortionist, a folding bike that twists around to fold itself entirely into the wheels’ 26-inch circumference. Besides being able to fold down to a previously-unattained size, the bike can go from fully extended to fully folded in just 20 seconds. We expect it would take a bit of practice to get it down to 20 seconds, but it’s still possible.

corneyflorex/TaskBoard - GitHub Removing an object on a photo with GIMP Tutorial to remove objects (or people) and restore the portion of the background they hide in a photo with the Resynthesizer plugin. An impressive video has been posted on Youtube to show how, with Photoshop, it is possible to delete objects in an image automatically, without any design work. The same can be done with The Gimp in fact and for longer (it is not impossible that the same algorithm has been reused). This plugin "re-synthesizes" the background" and rebuilds it from same elements on the photo. It can thus reconstruct the sky, lawn, or even more complex views, from a sample taken from the image. First, see the Resynthesizer tutorial to know the purpose of controls. We will put in practice the commands using the same pictures that the Photoshop demonstration video. Using Resynthesizer in Script-Fu 1. 2. We want to remove the tree on the top left. 3. This windows is opened. 4.Here is the final image Using the Map -> Resynthesize filter 1. 2. 3. 4. This window is opened: 5. More

Tutto Giappone si ferma a tre mesi dallo tsunami - Mondo di Antonio Fatiguso L'allarme fissione e' l'ultimo spettro generato dalla disastrata centrale di Fukushima. L'annuncio del gestore Tepco sulla presenza nel reattore n.2 di tracce di xenon, gas solitamente sprigionato dalla reazione dell'uranio, ha proiettato in mattinata scenari inquietanti via via migliorati con l'analisi e la lettura dei dati raccolti, fino a quando il ministro per l'Emergenza nucleare Goshi Hosono ha gettato in serata acqua sul fuoco. L'utility, che ha chiesto alla Japan Atomic Energy Agency (Jaea, l'istituto di ricerca nucleare) di effettuare analisi indipendenti sullo xenon, ha lanciato le procedure d'allerta a seguito della rilevazione nel vaso di contenimento primario di tracce (giudicate poi come 'residuali') di xenon: gli isotopi 133 e 135, con tempi di decadimento rispettivamente di 5 giorni e nove ore, hanno rafforzato l'idea del rilascio ''recente''.

Fluid Simulator Check out my blog! E-mail: kotsoft@gmail.com Fluid Instructions: You can drag the fluid around with your mouse and adjust the sliders at the top to change the properties of the fluid in real-time. Please check out this video if you're having trouble figuring out what the sliders do. It requires Java to run. Check out my newest app: Grantophone! More cool demos! Please enable JavaScript to view the <a href=" About This is my implementation of the Material Point Method. For interpolation, I use the quadratic B-spline presented here: Analysis and Reduction of Quadrature Errors in the Material Point Method. Instead of integrating the density over time (which is what most of the MPM papers do), I do a density summation every frame. Material Parameters Some of these parameters are hard to explain in one or two sentences (and a couple I made up) so I'll also link you to their corresponding Wikipedia pages. Density - Target density for the particles. ©2011 Grant Kot

Related: