background preloader

Use Google To Hack Into A Secrect World - Borntechie

Use Google To Hack Into A Secrect World - Borntechie

Lucid Dreaming By lucid dreaming, you can gain complete control over the one place that no one will ever care about: your imagination. Just The Facts Lucid dreaming is a scientifically proven phenomenon. While some get into lucid dreaming in order to treat chronic nightmares, or to experience all facets of the human experience, approximately 99.8% of people use it as a tool for cheap and interactive 3D porn. A lucid dream is a dream in which the dreamer is aware that he or she is dreaming, and he or she can even choose to control and manipulate his or her dream. How to Take Control of Your Dreams: So, you've doubled your weight over the past five years, you own a record-shattering collection of greasy pizza boxes and broken aspirations, and you're beginning to consider installing a toilet bowl in the place of your computer chair? In order to even begin to get control over your dreams, there are a few preliminary tasks you must complete. The Tasks: 1. "What?" Calm down! 2. Wake Initiated Lucid Dreams:

64 Things Every Geek Should Know - LaptopLogic.com The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. 1. USB – Universal Serial Bus GPU – Graphics Processing Unit CPU – Central Processing Unit SATA – Serial ATA HTML – Hyper-text Markup Language HTTP – Hypertext Transfer Protocol FTP – File Transfer Protocol P2P – Person to Person data sharing 2. 3. Here’s what one looks like: 4.

UPDATED – Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! admin account info” filetype:log ! Code: nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail? “Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum “Warning: mysql_query()” “invalid query” “Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL” “Warning: Supplied argument is not a valid File-Handle resource in” “Warning:” “failed to open stream: HTTP request failed” “on line” “Warning:” “SAFE MODE Restriction in effect.”

100 Websites You Should Know and Use In the spring of 2007, Julius Wiedemann, editor in charge at Taschen GmbH, gave a legendary TED University talk: an ultra-fast-moving ride through the “100 websites you should know and use.” Six years later, it remains one of the most viewed TED blog posts ever. Time for an update? We think so. Below, the 2013 edition of the 100 websites to put on your radar and in your browser. To see the original list, click here. And now, the original list from 2007, created by Julius Wiedemann, editor in charge at Taschen GmbH.

67 Things Every Computer Geek Should Know. | Arrow Webzine The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. One of the best list of default passwords. 1A. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.

67 Cheap Date Ideas for the Recession-Era Romantic by Kyle O'Connor on April 29, 2009 When you’re in the middle of the worst recession since the Great Depression, it’s not always easy to come up with the cash to impress your date. Luckily, there’s still tons of fun and romantic things you can do that take little-to-no money—all that’s required is a little creativity. 1. Dating doesn’t have to be expensive. Tags: dating, love, romance, soul-mates, spiritual-blogs, spiritual-communities, spiritual-networks, spirituality Top 5 Websites To Learn How To Hack Like A Pro You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman. There’s a caveat that I have to share before diving into these sites. #1 – Hacking Tutorial: Tech Tips and Hacking Tricks

5 Ways To Hack Your Brain Into Awesomeness Much of the brain is still mysterious to modern science, possibly because modern science itself is using brains to analyze it. There are probably secrets the brain simply doesn't want us to know. But by no means should that stop us from tinkering around in there, using somewhat questionable and possibly dangerous techniques to make our brains do what we want. We can't vouch for any of these, either their effectiveness or safety. All we can say is that they sound awesome, since apparently you can make your brain... #5. So you just picked up the night shift at your local McDonald's, you have class every morning at 8am and you have no idea how you're going to make it through the day without looking like a guy straight out of Dawn of the Dead, minus the blood... hopefully. "SLEEEEEEEEEP... uh... What if we told you there was a way to sleep for little more than two hours a day, and still feel more refreshed than taking a 12-hour siesta on a bed made entirely out of baby kitten fur? Holy Shit!

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

Related: