This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. While Deviant is still proud of the older versions of his images, if you still have copies of legacy material they should all be replaced with the latest versions available here. Each image shown below in thumbnail form can be accessed in high resolution individually, or you can obtain the full set from the zip archive at the bottom of this page. Lock Basics and Mechanical Operation How pin tumblers are arranged and how locks operate (or fail to) with conventional keys Introduction to Lockpicking Manipulation-Resistant Locks
10 Really Easy Ways to Unclog DrainsWise Bread Picks We all know the warning signs. The sink takes a little longer to drain.Vote Now! Top Ten Web Hacking Techniques of 2011Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE]
Batch virus maker tool to create your own virusesBatch virus maker tool is the one which can create batch viruses.The properties and behaviour of the virus can be set by yourself.Batch programs are essentially sequences of DOS commands that 'type themselves' when the batch file is run.Batch files consist of control elements, internal DOS commands and external commands or programs. With a little ingenuity one can duplicate most of the functions of a general purpose language, but doing any kind of math is tricky, there are no arithmetic commands at all. But most of us use Batch codes for creating viruses.One of the important feature of batch viruses are it cant be detected easily by Antivirus systems. 1.
50 Life Secrets and TipsMemorize something everyday.Not only will this leave your brain sharp and your memory functioning, you will also have a huge library of quotes to bust out at any moment. Poetry, sayings and philosophies are your best options.Constantly try to reduce your attachment to possessions.Those who are heavy-set with material desires will have a lot of trouble when their things are taken away from them or lost. Possessions do end up owning you, not the other way around. Become a person of minimal needs and you will be much more content.Develop an endless curiosity about this world.Become an explorer and view the world as your jungle. Stop and observe all of the little things as completely unique events.
The Evil Access Point!In this tutorial we are going to create an evil wifi access point! when someone connects to it and uses some services like “pop3,imap,ftp,smtp,http,https,dns” these services will be tested for all the expoits that maches them in the metasploit framework 3 and tries to exploit each one , when one of them successly exploited a session will be opened for a remote prompt or shell depends on the system being attacked. How to configure that evil access point : * Set your card to monitor mode
Awesome Products that Make You Wish You Thought of Them FirstFeeding the inner geekness… Loading… A Big Make Attack Bed… Two all beef patties, special sauce, lettuce cheese, pickles onions on a sesame seed bed. A Bubble Wrap Calendar… This is one calendar I would consider fun.Shoe Lacing MethodsMathematics tells us that there are more than 2 Trillion ways of feeding a lace through the six pairs of eyelets on an average shoe. This section presents a fairly extensive selection of 50 shoe lacing tutorials. They include traditional and alternative lacing methods that are either widely used, have a particular feature or benefit, or that I just like the look of. 50 Different Ways To Lace ShoesNEW!!!! Destroy someone's Computer! : OFF Topicvampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4.