background preloader

BackBox Linux

BackBox Linux

ActiveTcl is Tcl for Windows, Mac, Linux, AIX, HP-UX & Solaris ActiveTcl Business and Enterprise Editions include our precompiled, supported, quality-assured Tcl distribution used by millions of developers around the world for easy Tcl installation and quality-assured code. When you're using Tcl on production servers or mission-critical applications, ActiveTcl Business Edition and Enterprise Editions offer significant time savings over open source Tcl for installing, removing, upgrading, and managing common Tcl modules. Not sure which edition is right for you? Check out our Compare Editions chart. Tested, Timely and Compatible Save time in your development cycles by starting with a precompiled Tcl distribution for out-of-the-box installation and standardization across the operating systems you rely on, including Windows, Linux, Mac OS X, Solaris, AIX, and HP-UX. ActiveTcl Business and Enterprise Editions includes: Business Edition licensing is for each production or external-facing server, including virtual servers. Support Options Free Email support**

Fréquence cardiaque en course sur 10 km semi marathon | Rubriques course à pied Voir ausi le chapitre sur la fréquence cardiaque Les coureurs expérimentes, se connaissant parfaitement, peuvent gérer leur allure de course en fonction de leurs sensations. Pour les autres coureurs surveiller sa fréquence cardiaque (FC) en course à l’aide d’un cardiofréquencemètre peut être utile pour éviter un surrégime. La fréquence cardiaque sur un 10 km Le coureur peut maintenir en théorie 85-90% de sa VMA sur un 10kms. Le coureur peut soutenir 95% de sa FCM (fréquence cardiaque maximale) en respectant le principe suivant : 90% FCM durant les 6 premières minutes de course, puis sans changement d’allure, les pulsations montent progressivement jusqu'à 95% FCM. Les pourcentages de FCM varient très légèrement selon les facultés d’endurance et de résistance du coureur. La fréquence cardiaque sur un semi marathon Le coureur peut maintenir en théorie 80-85% de sa VMA sur un semi-marathon. La fréquence cardiaque sur un marathon Quelques repères utiles

Essential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. Finding Wireless Networks Locating a wireless network is the first step in trying to exploit it. Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. (NetStumbler Screenshot) Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. (Kismet Screenshot) Attaching to the Found Wireless Network Once you’ve found a wireless network, the next step is to try to connect to it. Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. (Screenshot of Airsnort in Action) (coWPAtty Options Screenshot) (ASLeap Options Screenshot)

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. 6. ettercap Ettercap is a comprehensive suite for man in the middle attacks. 7. The Nexpose Community Edition is a free, single-user vulnerability management solution. 8. 9. 10. w3af w3af is a Web Application Attack and Audit Framework. 11. hping 13.

BlackArch Linux Entering Unicode characters in LaTeX Free Password Crackers A password cracker program, often called a password recovery tool or a password unlocker/reset tool, is a software program used to "crack" a password, either by discovering the password outright, bypassing the encryption by removing the password, or bypassing the need for a password by changing the way the program or file works. If you've lost your password to something like Windows or an encrypted file, and the normal means to change the password won't work, a password cracker program might be able to help. Fully functional, completely free password crackers do exist alongside the many premium password crackers that you might find doing a quick search. Important: Password crackers and other kinds of password recovery and finder tools are legitimate programs to help discover or reset lost passwords.

Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux - Vimperator Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer. The Portspoof program primary goal is to enhance OS security through a set of techniques that will slow down and keep your attackers out from staying low profile during their reconnaissance against your system(s). Art of Active (Offensive) Defense Features 1.

TeX - Wikipedia TeX (/ˈtɛx/ tekh as in Greek, but often pronounced /ˈtɛk/ tek in English) is a typesetting system designed and mostly written by Donald Knuth[1] and released in 1978. Within the typesetting system, its name is formatted as TeX. Together with the Metafont language for font description and the Computer Modern family of typefaces, TeX was designed with two main goals in mind: to allow anybody to produce high-quality books using a reasonably minimal amount of effort, and to provide a system that would give exactly the same results on all computers, now and in the future.[2] TeX is a popular means by which to typeset complex mathematical formulae; it has been noted as one of the most sophisticated digital typographical systems in the world.[3] TeX is popular in academia, especially in mathematics, computer science, economics, engineering, physics, statistics, and quantitative psychology. The widely used MIME type for TeX is application/x-tex. History[edit] Typesetting system[edit] .

Play And Convert Any Multimedia File In this post I will list some problems many people have with multimedia formats and one solution. But let's start with the problems: * I have a video file and I want to extract the audio part.* I have an AVI video and I want to put it on my web page in a format optimized for the web.* How can I transfer videos from my PC to my mobile phone that supports only 3gp format?* I have an AVI/MOV/ MP4/WMV file and I want to convert it to AVI/MOV/ MP4/WMV.* How can I save on my disk MMS and RTSP streams?* Ok, I downloaded a file from YouTube as a flv file, but how can I encode it in a format that can be viewed in any player? There's only one answer to these frustrations and many others: SUPER. SUPER is a free program that lets you view and convert almost any multimedia format you've ever heard. Let's see how easy is to save a YouTube video as an AVI file. Step 1. Although SUPER has a very basic interface, it's very powerful. Update.

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples - Vimperator Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. Let’s start with one of the most basic and default scan, the one without using any parameters. This is a basic scan of the local IP address 192.168.1.34, we use sudo to gain administrator privileges, and then we give the target to Nmap. Note there is a space between each complete ip address, in above example we have used 4 target ip addresses to do the scan at once Discovery Before scanning a target port, Nmap will attempt to send ICMP echo request to see if the remote host is “alive”. Port scanning options Performing Fast scan: Scan Ports by name

Fold In functional programming, fold (or reduce) is a family of higher order functions that process a data structure in some order and build a return value. This is as opposed to the family of unfold functions which take a starting value and apply it to a function to generate a data structure. 1 Overview fold (+) [1,2,3,4,5] which would result in 1 + 2 + 3 + 4 + 5, which is 15. However, in the general case, functions of two parameters are not associative, so the order in which one carries out the combination of the elements matters. -- if the list is empty, the result is the initial value z; else-- apply f to the first element and the result of folding the restfoldr f z [] = z foldr f z (x:xs) = f x (foldr f z xs) -- if the list is empty, the result is the initial value; else-- we recurse immediately, making the new initial value the result-- of combining the old initial value with the first element.foldl f z [] = z foldl f z (x:xs) = foldl f (f z x) xs 2 Special folds for nonempty lists

OpenLDAP This section provides a quick overview for installing and configuring an OpenLDAP directory. For more details, refer to the following URLs: 24.6.1. Editing /etc/openldap/slapd.conf To use the slapd LDAP server, modify its configuration file, /etc/openldap/slapd.conf, to specify the correct domain and server. The suffix line names the domain for which the LDAP server provides information and should be changed from: suffix "dc=your-domain,dc=com" Edit it accordingly so that it reflects a fully qualified domain name. suffix "dc=example,dc=com" The rootdn entry is the Distinguished Name (DN) for a user who is unrestricted by access controls or administrative limit parameters set for operations on the LDAP directory. rootdn "cn=root,dc=example,dc=com" When populating an LDAP directory over a network, change the rootpw line — replacing the default value with an encrypted password string. slappasswd When prompted, type and then re-type a password. rootpw {SSHA}vv2y+i6V6esazrIv70xSSnNAJE18bb2u Warning

LaTeX:Symbols From AoPSWiki This article will provide a short list of commonly used LaTeX symbols. Operators Relations Negations of many of these relations can be formed by just putting \not before the symbol, or by slipping an n between the \ and the word. To use other relations not listed here, such as =, >, and <, in LaTeX, you may just use the symbols on your keyboard. Greek Letters Headline text Arrows (For those of you who hate typing long strings of letters, \iff and \implies can be used in place of \Longleftrightarrow and \Longrightarrow respectively.) Dots (The '2's after \ldots and \cdots are only present to make the distinction between the two clear.) Accents When applying accents to i and j, you can use \imath and \jmath to keep the dots from interfering with the accents: \tilde and \hat have wide versions that allow you to accent an expression: Others Command Symbols Some symbols are used in commands so they need to be treated in a special way. (Warning: Using \$ for will result in . Bracketing Symbols

Related: