Airsnarf - A rogue AP setup utility How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce
70 Things Every Computer Geek Should Know. | Arrow Webzine The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7.
OpenSSH Free online voice recorder - SpeakPipe 1. Adjust your microphone volume 2. Click Allow to enable your microphone Click Allow on the panel above Here is an example: Google Chrome requires an additional permission to access the microphone. Free online voice recorder Is your microphone ready? Start recording 1 Record - 2 Listen - 3 Save SpeakPipe voice recorder allows you to create an audio recording directly from a browser by using your microphone. Works on iPhone, iPad, iPod, and Android devices. Speak now Recording: 00:17 Max recording duration: 5 minutes Stop Reset Processing the audio... Please wait while it's being processed. Reset recording Are you sure you want to start a new recording? Save recording on server Save Replay Storage duration: Recording is stored on the server for three months since the last playback. Processing Please wait while your recording is being processed. Processing error Error occured during processing your request. To record an audio from a mobile device, you need the SpeakPipe app. I have the app I don't have it Cancel
How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. filetype:xls inurl:”email.xls” 3. “? 4.
Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process. It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems). Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist. Countermeasures HTTPS
Phone evidence remotely wiped in police stations Expert recommends putting phones in a microwave to prevent RF signals from activating ‘kill switch’ function. Tablet and smartphone remote wipe functions have been used by criminals to wipe mobile devices that were seized by officers and secured in police stations. BBC News has reported that Cambridgeshire, Derbyshire, Nottingham and Durham police have all found that data on stored handsets had been remotely ‘wiped’ before being accessed as part of criminal investigations. Dorset police have also said six of the devices they had seized within one year from suspects held in custody had been cleaned of data while held in storage. The technology, which was intended to combat mobile crime, was designed to allow owners to remove sensitive data from their phones if they are stolen. “If we can’t get to the scene within an hour, we tell the client to pop it in a microwave oven. “The microwave is reasonably effective as a shield against mobile or tablet signals – just don’t turn it on.” Apple iPhone
Short Film of the Day: Stuxnet: Anatomy of a Computer Virus | Film School... - StumbleUpon Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.
How to Hide Files in JPEG Pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! Hide File in Picture Create a folder on your hard drive, i.e. Now here’s the fun part! And that’s it! That’s it!
Transferring your iTunes Library For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library. Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive. However, as you add new content over time, particularly with the additional video content now supported by iTunes, you may soon find that your library threatens to take over your computer. Another common scenario many users find themselves in is what to do when they upgrade to a new computer. How iTunes Manages Media Content
Parsley Compound kills 86% of Lung Cancer Cells | Healthy News and Information by PAUL FASSA Worldwide, lung cancer is a devastating and exceedingly common form of cancer. It ranks as the number one cause of cancer deaths for adults in the United States. According to the American Lung Cancer Association, back in 1987 it replaced breast cancer as the leading cause of cancer deaths in women. “Lung cancer causes more deaths than the next three most common cancers combined (colon, breast and pancreatic). Seventy-five to eighty percent of lung cancer cases stem from a type of cancer called, non-small-cell lung cancer (NSCLC). Parsley Compound Kills Lung Cancer Cells and Acts as a Cancer Preventive A 2013 study published in PubMed reported that a compound found in parsley killed up to 86% of lung cancer cells in vitro (petri dish). The cancer cell killing substance is a naturally occurring, plant derived flavonoid called apigenin. -Onions -Oranges -Chamomile tea -Oregano -Thyme -Coriander -Artichokes -Red wine. Historical Human Parsley Health Applications According to Dr. From Dr.