background preloader

64 Things Every Geek Should Know - laptoplogic.com

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know. 1. USB – Universal Serial Bus GPU – Graphics Processing Unit 2. 3.

http://laptoplogic.com/resources/64-things-every-geek-should-know

Related:  Cool Stuffshaundonnelly

Cast Thermite So you made it through the intro? Good. There's something that must be said before we go any further. 7 Tools to keep your Mac Healthy For the four years I’ve been using a Mac, I haven’t used a maintenance tool. All I’ve ever done was verify disk permissions, and maybe use Drive Genius to perform some optimisation. But even that was just something ‘extra’ and not necessary according to me. The real question is, can maintenance tools really help in getting your system speedy, healthy, and less prone to crashes? The answer is a subjective yes. As a unix system, Mac OS X runs certain maintenance scripts of its own, without the user being aware of them.

64 Things Every Geek Should Know « Caintech.co.uk If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

Invent Your Own Computer Games with Python - Chapters Chapter 1 Read online: Chapter 1 - Installing Python Videos: The Geek’s Guide to Getting Almost Anything for Free Does it pay to be Internet savvy? Yes. In more ways than many people imagine. Sure, the Internet is a great way to research just about anything you could ever want to know about; and it’s an outstanding communication, marketing, and entertainment tool. But the Internet can also save you a boatload of money. And we’re not just talking 10 cents off here and there. Things My Father Didn’t Teach Me ABOUT ARCHIVE FOLLOW Facebook Twitter Instagram Google+ Ads Via The Deck Things My Father Didn’t Teach Me share it happyfathersday 4,393 notes

Dan Rodney's List of Mac OS X Keyboard Shortcuts & Keystrokes For years I’ve collected these keystrokes. I hope they help you become the power user that lies within. I have tested them on Mac OS X El Capitan, but most should work on older versions of Mac OS (such as Yosemite, Mavericks, Mountain Lion). After macOS Sierra comes out I will update as needed! Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage.

Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. 1. Introduction. 2 2.

"The egg" - Page 11 You were on your way home when you died. It was a car accident. Nothing particularly remarkable, but fatal nonetheless. You left behind a wife and two children. It was a painless death. The EMTs tried their best to save you, but to no avail. Are There Any Demonoid Alternatives? Demonoid is gone, at least for now. The servers in the Ukraine were pulled offline and an investigation into the site’s alleged owners is ongoing in Mexico. At the time of writing the Demonoid domain once again redirects to random ads… For former Demonoid members there’s no other option than to find a replacement. However, do these even exist? How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is.

Related:  night surfInformatiqueinterwebminidragonhoohauseful stuffHacking and Computer stuff"How too" siteshackstricksScience/Technologymacinternet toolsaugustgerroInfojesstate