background preloader

Darknet - The Darkside - Ethical Hacking, Penetration Testing & Computer Security

https://www.darknet.org.uk/

Related:  kitty702

Do We Drink Because We're Monogamous, or Are We Monogamous Because We Drink? - NYTimes.com Our latest Freakonomics Radio podcast is called “Do More Expensive Wines Taste Better?” It features some research presented by the American Association of Wine Economists, whose members include Karl Storchmann, managing editor of the group’s Journal of Wine Economics. Storchmann wrote to us the other day about an interesting working paper the AAWE has just posted: “Women or Wine? Monogamy and Alcohol,” by Mara Squicciarini and Jo Swinnen. From the abstract:

What’s My Pass? » The Top 500 Worst Passwords of All Time From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable humans are, the following is a list of the 500 most common passwords. If you see your password on this list, please change it immediately. Keep in mind that every password listed here has been used by at least hundreds if not thousands of other people.

How to be a Programmer: A Short, Comprehensive, and Personal Summary Debugging is the cornerstone of being a programmer. The first meaning of the verb to debug is to remove errors, but the meaning that really matters is to see into the execution of a program by examining it. A programmer that cannot debug effectively is blind. Copper Moonshine Stills & Moonshine Still Kits Don't want to pay a premium price for a complete still? No problem! We'll ship all of the parts and provide an online video series that shows how to build a 100% copper moonshine still, step by step. Specs: Capable of distilling 1 gallon of mash per run2' tall with a 6" baseGauge - 16 oz. copper The kit includes: How to make flash drive that copy's users files silently and automatically Ok there is no order in the file creation process just that you have all files created and on the flash drive. I will start out with the autorun.inf. This file is used when you insert the flash drive into said computer.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Do You and Your Partner Fight Too Much, or Not Enough? Turns Out There's a "Magic Ratio" Everyone knows couples break up when they fight too much. But what if they don't fight enough? Dr. John M. Gottman, a psychologist who’s studied marital stability and relationships for decades, is known for finding that the “magic ratio” of positive and negative interactions in successful relationships is about 5 to 1. That is, couples who stay together tend to compensate for every negative interaction with five times as many positive ones.

The Usability of Passwords (by @baekdal) #tips Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Cool Gifts for Guys, Best Gift Ideas for Guys login 0 items 888.365.0056 . live chat wish list & registry. check order status Find the best gift ideas for men, women and kids at UncommonGoods. Security Digest Features In a world that seems to be losing the notion of journalism, Liquidmatrix Security Digest remains committed to long form articles that dig into the major issues affecting the industry with Feature articles. Click for Features >>>>>

Related:  CiberativismoCyber Counter CultureMisc-Interesting1BlogsHackingIntelligence Analysis Blogs