background preloader

#3038363

#3038363

http://pastie.org/3038363

Related:  Other Web / Techpeer2peer 3handyHacksdoulos

Brad Templeton's Home Page Welcome to my web home page -- a collection of my various essays on technology topics, comedy, my software, my popular amateur photography sub-site, and of course, an exercise in net.narcissism. Also found here are sites for some of my famous family members, with two books and a comic series. I also have a Blog called Brad Ideas. How to Crack the Account Password on Any Operating System This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer?

Free Software Everyone Should Download – Johnny Lists by Johnny Webber 1. F.lux – F.lux makes your computer’s display change based on the time of day to prevent eye strain. 2. Photorec – Recover lost files, including videos and documents, from your hard drive. 3.

Hack Any Password Protected Wi-Fi Network Unlimited Free Internet Free Download Hack Any Password Protected Wi-Fi Network Full Hello Friends here i am sharing a tutorial for wifi cracking via Commview and aircrack so lets start it. Tools Needed : 1) Commview for Wifi 2) Aircrack-ng Instructions Of Hack Any Password Protected Wi-Fi Network Full: 1) Download, Install and open Commview for wifi. 2) Click on the “Blue play button” and the screen shown below will appear. Portable Antivirus – Ultimate List of Best USB Anti Virus This post is part of our "Largest List of Best Free Security Software". Check the rest of them. Why You May Need Portable Antivirus Applications: Present day antivirus and security software operate on post-event basis. First a virus or malware is discovered, then the antivirus database is updated to include its signature, then it is expected that the user will download the antivirus update and after that only, the user is secured against that virus.

100 Search Engines For Academic Research Back in 2010, we shared with you 100 awesome search engines and research resources in our post: 100 Time-Saving Search Engines for Serious Scholars. It’s been an incredible resource, but now, it’s time for an update. Some services have moved on, others have been created, and we’ve found some new discoveries, too. How To Crack A Wi-Fi Network's WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks.

16 best youtube tricks everyone must try Youtube is the third most popular website on internet after google and facebook. It has 800 million unique users a month.In every minute 300 hours of new videos were uploaded to the site. If you want to watch a movie or if you want to watch funny videos or past news we would always prefer to use youtube. Most of the people who uses internet watch youtube videos almost everyday. But most of them don’t know many features that youtube provides.

64 Things Every Geek Should Know If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

Beginning Perl (free) - www.perl.org What does this book cover? Installing Perl on Windows and UNIX Making use of online Perl resources like CPAN First principles in programming and the Perl syntax Working with files and databases Writing web pages in Perl Using Perl as an object-oriented language Book overview Perl is a well-established programming language that has been developed through the time and effort of countless free software programmers into an immensely powerful tool that can be used on pratically every operating system in the world. Perl started out as the "Swiss army knife" of computer languages and was used primarily by system administrators, but over time it's grown into an immensely robust language used by web-developers and programmers worldwide. It's also a great way to learn programming techniques and develop your own style of coding.

yfrog - FAQ What is yfrog? yfrog lets you share photos and videos on Twitter, view all your conversations, and connect with your family and friends. Is there a walk through or a tour of the new yfrog features? Yes, click here to see the new yfrog features. What's different about yfrog? www.howtogeek If you’re planning on doing a reinstall of Windows but can’t find your product key, you’re in luck because it’s stored in the Windows Registry… it’s just not easy to find, and it’s impossible to read without some help. Luckily, we’re here to help. As you can see in the screenshot above, the product ID is stored in the registry but is in a binary format that can’t be read by humans unless you are some sort of Cylon. You aren’t, are you? We’re not really sure why Microsoft went to great lengths to make it difficult to see the product keys for their software, especially since they are stored right in there in the registry and can be read by software, if not by humans.

How to Hide Files in JPEG Pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one!

You're Gonna Miss Me- Lulu and the Lampshades (Cover) Video Log in Dame You're Gonna Miss Me- Lulu and the Lampshades (Cover)

Related:  alvarofragainteresting findsHackersecurityUseful stufflatooorhectorosorioHackinguseful websitesNerd Stuffcool factsCodeProgHacklowking64Hacking & HacktivismupenInteresantecompCool Internet StuffsHackz0rTechnoz nd Programming tutorialsWebComputinguseful websitesFun Stuffweapons/survivalcoolNet