background preloader

Default Password List

http://www.phenoelit.org/dpl/dpl.html

3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. It’s not a bug. It’s part of the cache feature. 22 Effective Baking Soda Uses 11. Polish the fine stuff – Use it to gently cleanse porcelain, enamel, tile, fiberglass and stainless steel surfaces. Safely scour away crayon or marker doodles on walls and floors. Nine Reasons You Should Boycott Apple Apple's intransigence shows that it cares little of what its customers and the public think. In the social media era that is a stance which can cost a company dearly in lost profits. Few companies today manage to inspire passion the way Apple does.

10 Minute Mail By clicking on the link below, you will be given a temporary e-mail address. Any e-mails sent to that address will show up automatically on the web page. You can read them, click on links, and even reply to them. The e-mail address will expire after 10 minutes. Why would you use this? Cracking Wep Keys With BackTrack Article at HellBound Hackers This is my first tutorial.... I hope this helps all of you that just don\'t know where to start or don\'t know how to crack wep... What you will need

Top 5 Websites To Learn How To Hack Like A Pro You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing.

Finding a Vimeo replacement service to host my company videos I just went through a very stressful experience that I thought I’d share for the benefit of others that will surely run into the same issues. I made the mistake of signing up for Vimeo and started using the service for my business’ marketing needs, and then was made aware after the fact by a friend that the Vimeo service is strictly for non-commercial purposes and that I was running the risk of being shut-off at any moment by the vimeo team. (they do indicate this on the sign up page, but it was below the fold so to speak, and I did not see it while i was reading their materials–when i saw a for $fee$ “pro” package, i just assumed that was for someone like me, who was willing to pay a fee to host videos on the web–a wrong assumption in this case).

Downloadable Computer Repair CDs One of our Technibble forum members, PcTek9, and a handful of other Technibble members have compiled a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs and Special Purpose CDs. Some of these are free to download, some are not. Be sure to read the EULA for the CD’s you download and the applications you use to make sure you are allowed to use them in the manner you plan to use them in.

Features on iPhone Features on iPhone Browse with a swipe Dolphin Android Gesture simplifies the way you navigate the mobile web. aircrack-ng Description Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program. Aircrack-ng can recover the WEP key once enough encrypted packets have been captured with airodump-ng. This part of the aircrack-ng suite determines the WEP key using two fundamental methods. The first method is via the PTW approach (Pyshkin, Tews, Weinmann). Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String.

Alpha: Making the World's Knowledge Computable Goals Wolfram|Alpha's long-term goal is to make all systematic knowledge immediately computable and accessible to everyone. We aim to collect and curate all objective data; implement every known model, method, and algorithm; and make it possible to compute whatever can be computed about anything. Our goal is to build on the achievements of science and other systematizations of knowledge to provide a single source that can be relied on by everyone for definitive answers to factual queries. Wolfram|Alpha aims to bring expert-level knowledge and capabilities to the broadest possible range of people—spanning all professions and education levels. Our goal is to accept completely free-form input, and to serve as a knowledge engine that generates powerful results and presents them with maximum clarity.

» Overclock Your Reading Speed This is a guest post from Kim Roach of The Optimized Life. In today’s Information Age, reading is now a prerequisite for success in life. In fact, many presidents, including Kennedy, have required their staff to take speed reading lessons. Brian Tracy, a best-selling author, points out that just 1 hour per day of reading will make you an international expert in your chosen field within 7 years. How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1.

Related:  Internet-ComputermotzhoeldHackTricksIT