background preloader

Openwall - bringing security into open computing environments

Openwall - bringing security into open computing environments

Why were the '90s so cynical? People say the '90s were the decade of cynicism--Why so?I mean the '00s even with the tragedies of that decade weren't that cynical, and the '80s seem to have been the decade of optimism despite the nation just suffering through Vietnam and it's after effects, Watergate, Jimmy Carter's Malaise, the rebirth of the Cold War under Carter/Reagan, and the economic dispartiy caused by Reagan's "Trickle-Down" economics. You'd think the '90s would've been a period of optimism--The Cold War was finally over and thus the threat of nuclear war seemed pretty much finished, a new generation was in power, there was economic prosperity...So why the cynicism? What the hamster said. "I saw the decade end, when it seemed the world could change in the blink of an eye And if anything, then there's your sign -- of the times." - Jesus Jones, Right Here, Right Now: singing about the fall of the Berlin Wall, and not anticipating how ironic that line would sound in Post-9/11 America.

A Guide to Efficiently Using Irssi and Screen | Irssi is a text-only IRC client. It does not get in your way and its commands are intuitive and useful. Non-standard features are implemented with perl scripts, rather than in the core. Irssi can range from a functional, no-frills client to a highly-customized and automated client. Irssi is not the only focus of this guide. Getting Connected The first step is to start irssi. irssi You should now see Irssi in its default state–disconnected, with some blue bars at the top and bottom. In Irssi, there are three important connection-related commands: /server, /connect, and /disconnect. For example, typing /connect will open a new network connection and connect to (05:23:10) (ms[+abilorsuwxyz]) (1:NullIRC (change with ^X)) In this example, NullIRC is the active network. At this point you should have a just-opened instance of Irssi, with no connections to any server. /connect If everything connected fine, join a channel by typing: /join #test Switching Windows

New Google Privacy Policy | How To Change Your Settings How to clear your Google history Learn how to clear your Google data history with this demonstration by Tablet editor Stephen Hutcheon. P Opinion: Australia absent in Google privacy feud Today is your last chance to adjust your Google privacy settings before a major change to the way Google collects and collates data about you, its users. From March 1, the company will begin to aggregate all the information it acquires about its users who are logged in to Google services into a single, unified pool of data. How your web history page should look after you've clicked "remove". This collectable information is what Columbia Law School professor and privacy advocate Eben Moglan refers to as the “data dandruff of life”. Advertisement In the past, data collected in the course of a web search would be kept separate from, for instance, your YouTube viewing activity, your Gmail usage or your Map queries.

Clonezilla Welcome, Symantec Ghost goodbye Clonezilla is a partition or disk clone tool similar to Norton Ghost®. It saves and restores only used blocks in hard drive.. Two types of Clonezilla are available, Clonezilla live : It is suitable for single machine backup and restore. Clonezilla SE (server edition). : It can clone many computers simultaneously, it was used to clone 41 computers simultaneously and It took only about 10 minutes to clone a 5.6 GBytes system image to all 41 computers via multicasting! Clonezilla support most of the filesystem liek: ext2, ext3, ext4, reiserfs, xfs, jfs of GNU/Linux, FAT, NTFS of MS Windows, and HFS+ of Mac OS. Now we will see how it works, to do that first download Clonezilla : Download Clonezilla Now burn the image ISo in a cd and restart your computer. ( click on screenshots bellow to see full-size image) Clonezilla is a partition or disk clone tool similar to Norton Ghost®. Choose you language : 2- Choose to start Clonezilla 5- Choose which mode beginner or advanced mode Links :

Wardriving A free public Wi-Fi access point Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA). Etymology[edit] Wardriving originated from wardialing, a method popularized by a character played by Matthew Broderick in the film WarGames, and named after that film. Warbiking is similar to wardriving, but is done from a moving bicycle or motorcycle. Warwalking, or warjogging, is similar to wardriving, but is done on foot rather than from a moving vehicle. Warrailing, or Wartraining, is similar to wardriving, but is done on a train/tram/other rail-based vehicle rather than from a slower more controllable vehicle. Warkitting is a combination of wardriving and rootkitting.[4] In a warkitting attack, a hacker replaces the firmware of an attacked router. Mapping[edit] A map of Seattle's Wi-Fi nodes, generated from information logged by wardriving students in 2004. Antennas[edit] Software[edit]

Bash Shell Scripting Directory For Linux / UNIX Lurkmore Eyecandy for your GNOME-Desktop - GNOME Grammar nazi - Lurkmore Материал из Lurkmore Писать безграмотно — значит посягать на время людей, к которым мы адресуемся, а потому совершенно недопустимо в правильно организованном обществе. — Лев Владимирович Щерба Кончились аргументы? Доебись до опечатки собеседника, сделать больше ты ничего не сможешь — Правила демагога Грамматика – система силков, предусмотрительно расставленных для человека, выбившегося из низов, на его пути к успеху. — Амброз Бирс, «Словарь Сатаны» Граммар-фюрер Дитмар Эльяшевич Розенталь. ( , , , , , бояр. ) — агрессивный грамотей с врождённой [1] грамотностью и обострённым чувством прекрасного. Грамматический холокост Мне казалось смешным переживать из-за того, правильно ли ты написал что-то или нет, потому что английское правописание — это не более чем человеческая условность, которая никак не связана с чем-то , с чем-то, что относится к природе. — Ричард Фейнман , «Какое дело до того, что думают другие?» Grammar Nazi IRL Грамматические нацисты встречаются и в официальных изданиях: Україна Д.

Interesting linux facts | Linux Articles - Linux Ubuntu Enquête 2014 sur Mozilla Firefox - Mercredi, 09 Avril 2014 Question : 1 sur 4 De quel sexe êtes-vous ? Question : 2 sur 4 À partir d'où utilisez-vous Mozilla Firefox ? Question : 3 sur 4 Combien de fois utilisez-vous Mozilla Firefox ? Question : 4 sur 4 Naviguez-vous sur Mozilla Firefox sur ​​votre téléphone mobile ? Envoi de réponses ... ©2014 All Rights Reserved. Your privacy is important to us. Blog - Why Linux servers are more secure than Windows The Linux/Windows debate is an oldie but a goodie, and there have been many long threads on most computer related forums discussing their relative merits. Linux is free, open-source and community based. Windows is expensive, professionally developed and has effectively held a monopoly over the software industry for the past couple of decades. Whatever other reasons there may be to choose one of these Operating Systems over the other, I wanted to find out which one was more secure and why. Image credit: Flickr After a little bit of Googling, it became apparent that Linux is generally considered more secure than Windows, not because of any inbuilt security feature but because of the structure of the OS as a whole. The kernel of the Linux OS is better protected than Windows', fewer users and programmes have permission to access it and each other. (N.B Since both Linux and Mac are based on Unix architecture, a lot of this will apply equally to Mac's Server OS known as Rhapsody.)