100 Websites You Should Know and Use (updated!) Entertainment Meet David Peterson, who developed Dothraki for Game of Thrones There are seven different words in Dothraki for striking another person with a sword. Among them: “hliziﬁkh,” a wild but powerful strike; “hrakkarikh,”a quick and accurate strike; and “gezrikh,” a fake-out or decoy strike. But you won’t find these words in George R.
wall m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format. In m0n0wall 1.8.1, the base system has been switched to FreeBSD 8.4 for better support of recent hardware, and there have been significant improvements, new features and bug fixes in many areas.
Cerowrt CeroWrt is a project built on the OpenWrt firmware to resolve the endemic problems of bufferbloat in home networking today, and to push forward the state of the art of edge networks and routers. Projects include proper IPv6 support, tighter integration with DNSSEC, and most importantly, reducing bufferbloat in both the wired and wireless components of the stack. The CeroWrt 3.10 series of builds include the following features and capabilities:
How to Check If Your Email Account Has Been Hacked The news is full of reports of hackers breaking into online databases and stealing personal information from many thousands of accounts. Many of these compromised accounts have been published on the Internet by hacker groups like LulzSec and Anonymous. One way to check if your email account is among those published is described in the New York Times.
Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. See here if you wish to suggest additions or changes. Bufferbloat I received the following question today from Ralph Droms. I include an edited version of my response to Ralph. On Thu, Jun 20, 2013 at 9:45 AM, Ralph Droms (rdroms) <email@example.com> wrote: Someone suggested to me that bufferbloat might even be worse in switches/bridges than in routers. True fact? If so, can you point me at any published supporting data?
Big data Visualization of daily Wikipedia edits created by IBM. At multiple terabytes in size, the text and images of Wikipedia are an example of big data. Growth of and Digitization of Global Information Storage Capacity Source Craigslist Automation Software Simply install Classifieds Searcher on your computer (it takes less than a minute), log into your account (only if you have the POWER version - the FREE version doesn't require login) and start exploring a whole new world of classified ads. Based on your criteria, our software will robustly deliver results from all the supported sites. Using Classifieds Searcher you can: Search multiple Craigslist cities and categories at the same time. Setup alerts and forward new results by email and/or SMS. Automatic searching!
Common fonts to all versions of Windows & Mac equivalents (Browser safe fonts) - Web design tips & tricks Last updated: 2008/06/03 Return to the main page Introduction Here you can find the list with the standard set of fonts common to all versions of Windows and their Mac substitutes, referred sometimes as "browser safe fonts". This is the reference I use when making web pages and I expect you will find it useful too. If you are new to web design, maybe you are thinking: "Why I have to limit to that small set of fonts?
Access Control and Access Control Operators - Squid User's Guide Access control lists (acls) are often the most difficult part of the configuration of a Squid cache: the layout and concept is not immediately obvious to most people. Hang on to your hat! Unless the Squid Configuration Basics chapter is still fresh in your mind, you may wish to skip back and review the access control section of that chapter before you continue. This chapter assumes that you understood the difference between an acl and an acl-operator. The primary use of the acl system is to implement simple access control: to stop other people using your cache infrastructure. Renosite (code name: CDEOp) Please take the time to read and understand the reasoning behind this product. This site is dedicated to a special project that has been missing in the computer industry.