background preloader

Complete Hacking Algorithm

Here is all you need to know. void main() { for(i = 0 knowledge; i < infinite knowledge; i++) while(you don't know how something works) { Read(Your Brain, i); Experiment(Your Brain, i); Learn(Your Brain, i); } } Being a hacker is so easy.. It is all a mindset. It is so simple that almost everyone misses it. Being a hacker is about thinking. It is not about being a criminal. Copyright 1997, Jeff Thompson

http://www.acm.uiuc.edu/workshops/security/hackalgo.html

Related:  Computer Tweaks

Turn Your Home Router Into a Super-Powered Router with DD-WRT Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. Stay tuned, as we’ll go into more depth in a couple more days on all the great things you can do with it, but even if you don’t use the additional features, DD-WRT is worth installing to make your router work better. What Is DD-WRT? Here’s our router.

Dot: 360º video capture for the iPhone 4 Hey Kickstarter-onians, Thanks for checking out our project! We call it Dot. It’s a stylish, durable and downright pocketable 360º (panoramic) lens attachment and app for the iPhone 4. What does it do? Dot lets your iPhone capture immersive, fully navigable, panoramic video in real-time - and share with friends on your phone, as well as on Facebook and Twitter, or streamed online using our awesome panoramic video web platform and player.

Chia Breakfast Pudding - 40 Easy Recipes Under 400 Calories Serves: 8 Ingredients:1 cup raw cashews, soaked for 2 hours and rinsed3 cups water3 tablespoons Grade B maple syrup or raw honey1 tablespoon vanilla extractPinch salt1/2 cup chia seedsOptional toppings: blueberries, strawberries, raspberries, almonds, cashews, sunflower seeds Directions:1. Blend all ingredients except chia seeds in a blender until smooth.

32 Best Linux Desktop Customization #4 Voici la quatrième édition des meilleures personnalisations de bureaux Linux. Six mois se sont écoulés depuis la dernière présentation, les tendances n'ont pas beaucoup évolué, sauf peut-être que l'on voit de plus en plus de customizations à base de KDE (cf. 6 derniers screenshots). Je vous laisse les découvrir sans plus attendre. Gaia10 Linux by Gabriela2400 GTK & Metacity: SproutPidgin iconset by Gabriela2400Covergloobus by Gabriela2400Conky: 5 individual configs made by Gabriela2400Wallpaper: See The WorldAWN: Skin by Gabriela2400Dock icons: Gaia IconsSource

The 10 Most Destructive Hacker Attacks In The Past 25 Years From a computer virus named for a stripper to swarming botnet attacks on the Pentagon and Microsoft, The Daily Beast lists the 10 most infamous hacks, worms, and DDoS takedowns in the last 25 years. The unending cyber assault executed last week by a group of anonymous “hacktivists” instilled fear and loathing in the hearts of network administrators at some of the world’s most powerful governments and corporations. It was unprecedented in its scope—attracting thousands of amateur users willing to do battle in the name of free speech on the web. But amongst the real hackers out there is a feeling of indifference.

3D computer graphics 3D computer graphics (in contrast to 2D computer graphics) are graphics that use a three-dimensional representation of geometric data (often Cartesian) that is stored in the computer for the purposes of performing calculations and rendering 2D images. Such images may be stored for viewing later or displayed in real-time. 3D computer graphics rely on many of the same algorithms as 2D computer vector graphics in the wire-frame model and 2D computer raster graphics in the final rendered display. The Creepiest Place on the Planet On a creepy island in a creepy swamp south of Mexico City there’s a place that looks like the stuff of nightmares and horror movies. Here, among the scraggily branches and dead trees hang hundreds of old, mangled dolls. The story goes like this: It was around 50 years ago that a little girl drowned off a small island hidden deep amongst the canals of Xochimico.

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. how to survive in vi and emacs some basic vi commands. :set nu show line numbers. :set ic ignore case differences when searching. :set ai set automatic indent. :set sm show matching ( or { with ) or } in insert mode. down-arrow up-arrow move down/up 1 line. right-arrow left-arrow move right/left 1 character column. 0 $ go to 1st/last column of current line. return go down to 1st printable character of next line. nw nb move right/left n words (1 word if n omitted). ng go to line n (end of file if n omitted). ctrl-f ctrl-b page forward/backward 1 screen. ctrl-d ctrl-u page forward/backward half a screen. [[ ]] go to beginning of current/next c function.

Beowulf cluster The Borg, a 52-node Beowulf cluster used by the McGill Universitypulsar group to search for pulsations from binary pulsars A Beowulf cluster is a computer cluster of what are normally identical, commodity-grade computers networked into a small local area network with libraries and programs installed which allow processing to be shared among them. The result is a high-performance parallel computing cluster from inexpensive personal computer hardware. As of 2014[update] Beowulf systems operate worldwide, chiefly in support of scientific computing.

Top 20 Earth Pictures found on Stumble Upon Everybody knows that Stumbleupon is an great source for beautiful photography, nature, pets, arts and much more. They have millions of users and they are probably the most wide used source for finding quality content. Today, we collected 20 popular photographs from Stumbleupon. Most of them have been seen for more than million times each. We hope you’ll enjoy… Photo Source 30 Life-Enhancing Things You Can Do in 30 Minutes or Less Many of us attempt to measure our happiness based on the duration of certain favorable experiences in our lives. The longer a favorable experience lasts, the happier we think we’ll be. But the truth is, life is simply a string of small, independent moments that are always changing. Thus, a few minutes well spent here and there can make a big difference in what we get out of life in the long-term.

Change the Windows 7 Login Screen Background Image When you login to your Windows 7 computer (assuming you haven’t used something like this tutorial to turn on automatic login), you’ll generally see a login window with a background looking something like this. It’s fine; there’s nothing wrong with it. But sometimes a change is good so in this article we’ll show you how to change the background image behind the login screen to anything you want. The first step is to open up the Start Menu by clicking the orb in the lower left corner of the screen. Now, in the Start Menu search box, type regedit, to open up the Registry Editor. When the Registry Editor appears in the Start Menu, click the Enter key to launch it. Nowhere to hide: Advertisers can now stalk you across multiple devices Advertisers want to compile as much information about you as possible. Tracking where you go, what you click, and how you search is literally their business. They use that data to target ads directly to you, and feed relevant data to their partners. With the increasing use of tablets and smartphones in daily life, advertisers have been frustrated by a limited ability to correlate traffic from multiple devices to a single person. Well, there is some good news for advertisers, but bad news for privacy advocates.

Related:  Awsometenmaavikirtikatve