
Anonymizer - E-mail anonyme Comme dans la vie courante, il est possible d'envoyer un message sans y inclure une adresse de réponse, ni aucune autre information sur votre identité (nom du serveur de votre fournisseur d'accès ayant servi à l'expédition, etc.). Cela vous permet de parler plus librement, sans craindre que vos propos, même un brin polémiques, n'aient de conséquences pour votre personne. Attention! L'envoi d'un e-mail anonyme n'est pas un bon moyen pour communiquer, puisque la personne qui recevra votre message ne pourra pas vous répondre. Merci de respecter nos conditions d'utilisation : que ceux qui abuseront Anonymizer ne s'attendent pas à rester anonymes. Attention!
Access Any Website Or Forum Without Registering Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. crawl-66-249-66-1.googlebot.com and in user agent field type: Googlebot/2.1 (+ as shown in the screenshot below. Select Google Bot as your User Script by going to Tools > User Agent Switcher. Now browse any website or forum without registering. Advertisement
Old Spice Voicemail Message Generator How To Do A WiFi Antenna Hack (Connecting Your Computer) Why pay $30 for an extender antenna for your router or PC card when you can make the same thing for about a nickel? Watch the video and see for yourself. It works! Step 1: The Thinking Behind It I wanted to see for myself the difference between a standard wireless antenna and one of those thirty dollar add on extender antennas by prying the rubber tips off each with a small screw driver. Step 2: The Preparation Now here's how you can easily turn a regular wireless antenna into a super extender antenna with twice the range and twice the power. Step 3: Create The Coil Measure off two and three quarters inches of the wire and make a small bend. Step 4: Create The New Antenna Form Measure off another three quarters of an inch and clip the wire. Step 5: Create The Base You can buy these larger diameter drinking straws at a grocery store, or simply get one at a fast food restaurant. Step 6: The Finished Product
www.iana.org/assignments/port-numbers Last Updated Expert(s) TCP/UDP: Joe Touch; Eliot Lear, Allison Mankin, Markku Kojo, Kumiko Ono, Martin Stiemerling, Lars Eggert, Alexey Melnikov, Wes Eddy, Alexander Zimmermann, Brian Trammell, and Jana Iyengar SCTP: Allison Mankin and Michael Tuexen DCCP: Eddie Kohler and Yoshifumi Nishida Reference Note Service names and port numbers are used to distinguish between different services that run over transport protocols such as TCP, UDP, DCCP, and SCTP. Available Formats Plain text How to make a Sawed-off USB Key Holy crap– somebody just went and TORE MY FREAKING USB CABLE IN HALF while it was still attached to my laptop!!! No– wait– sorry. That’s just my USB drive. My bad. Never mind. It’s no secret that there are a lot of strange USB devices out there, particularly flash drives. Despite all that, the picture above is a little surprising– because yes, it’s a working USB flash drive. This is a KingMax 1 GB USB flash drive, one of the smaller varieties out there. The plastic cover is attached only weakly, by a bit of silicone adhesive, and peels off fairly easily to expose the bare printed circuit board of the flash drive. Next we need a victim USB cable. Cut deeply enough that you actually cut through to the metal shell underneath the rubber, at which point you can start to peel back the rubber parts. The metal shell underneath the rubber overmolding consists of two of pieces of thin steel that are stamped and folded into place. Last step: Cut the cable as desired.
Pinguy OS Web Hosting High - Best Web Hosting - Web Hosting Ratings, Reviews & Guides 9 Things You Need To Do/Install After Installing Ubuntu 9.04 After you have downloaded and installed Ubuntu 9.04, what is next thing you should do? Getting Ubuntu onto your hard disk is only the first step. It is still in the raw and unpolished state. To get the best out of it, you really need to configure and customize it to suit your needs. 1) Enable the repositories Every time I do a fresh install of Ubuntu, the first thing that I do is to enable the universe, multiverse, backport and Canonical’s ‘partner’ repositories. Go to System -> Administration -> Synaptic Package Manager. Click on Settings -> Repositories. Checked all the boxes. Go to the Third-Party Software tab. Close the window and press the Reload button at the top left corner to update the repositories. 2) Modifying GRUB menu The GRUB menu is the black screen that you see when you boot up your computer. Before you modify your GRUB menu, it is best to back it up. 3) Configure Firewall UFW is installed by default, but if you need a graphical interface, install GUFW. 4) Wine 6) Ubuntu Tweak
Scorpion Technology: Purchase Computers: Computer Hardware & Software Systems in Australia from Scorpion Technology - Scorpion Technology 10 Cool Nmap Tricks and Techniques « UrFix's Blog Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open
Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware. Please note that this document is quite dated (last updated in 2008). Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!), malware and other questionable code. You can use the Windows Update and Office Update sites to keep your system up-to-date. 3. Note that security holes may be discovered in these programs as well (though probably less frequently), so it's a good idea to check for updates regularly. You'll be able to import your IE Favorites to most of these browser alternatives. 4. Never open email attachments from someone you don't know Never open email attachments forwarded to you even if they're from someone you know Never open unsolicited or unexpected e-mail attachments until you've confirmed the sender actually meant to send them. 5. Warning - Microsoft RTF Security Bulletin - May 22, 2001