background preloader

Programming and hacking

Programming and hacking
Click to enlarge Your Home Bicycle Workshop by Jim Langley Everything you need to know to build a great home bicycle workshop! Click pictures to learn more My truing stand More truing stands & wheel tools Eldi emergency spoke tool Eldi Emergency Spoke Bicycle Tool A Spoke Recycler The great thing about this bicycle spoke cutter and bender is that it allows a mechanic equipped with a handful of long spokes to fix bicycle wheels of any size. A Ride Mechanic’s Treasure This spoke shaper is the perfect tool when you’re wrenching for a ride or race. A Ridesaver Bicycle spokes with this S bend are known by tourists as emergency spokes because the special bend simplifies installation. A Keeper I’ve searched for this tool without luck so I don’t believe it’s available any longer. Update on finding a tool that can create the bend: a reader named Chung wrote saying that there’s a model airplane tool that puts Z bends in steel rods that might work. Shimano Pro-Set HG chain cutter Almost Too Nice to Use Related:  security and hackingsecurity

PRIVACY - How We Protect You The only search engine that does not record your IP address. Every time you use a regular search engine, your search data is recorded. Major search engines capture your IP address and use tracking cookies to make a record of your search terms, the time of your visit, and the links you choose - then they store that information in a giant database. Those searches reveal a shocking amount of personal information about you, such as your interests, family circumstances, political leanings, medical conditions, and more. This information is modern-day gold for marketers, government officials, black-hat hackers and criminals - all of whom would love to get their hands on your private search data. Major search engines have quietly amassed the largest database of personal information on individuals ever collected. That database is still searchable. Shocked? When we search, we share our most private thoughts with our computers. Ixquick web search awarded the first

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack

Waxed Bicycle Chains - It turns out that hot wax is not only useful for removing unshaven hairs from leggy females, cyclists and triathletes (at least those not named Felix). Apparently, it is good for lubicating bicycle chains as well. Back in late April, while doing some basic bike maintenance and fingers covered with black, grimy grease, I decided to do an experiment. While I’ve been relatively happy with the Pro-Link bicycle chain lube I’ve been using for years, I wanted to see how the traditional “chain lubed with melted paraffin” method measured up. These are the basic steps I followed: Remove the chain from the bike. Melting chunks of candle wax. While the wax is melting, clean the chain thoroughly with degreaser and a brush. Soaking the chain in the hot wax. Turn down the heat on the stove; the wax should stay melted even if the water is no longer boiling. More importantly, you will (almost) never need to clean the chain again! Still clean after 287 miles!

Spelling mistake prevented hackers taking $1bn in bank heist | Business A spelling mistake in an online bank transfer instruction helped prevent a nearly $1bn heist last month involving the Bangladesh central bank and the New York Fed, banking officials said. Unknown hackers still managed to get away with about $80m, one of the largest known bank thefts in history. The hackers breached Bangladesh Bank’s systems and stole its credentials for payment transfers, two senior officials at the bank said. They then bombarded the Federal Reserve Bank of New York with nearly three dozen requests to move money from the Bangladesh Bank’s account there to entities in the Philippines and Sri Lanka, the officials said. Four requests to transfer a total of about $81m to the Philippines went through, but a fifth, for $20m, to a Sri Lankan non-profit organisation was held up because the hackers misspelled the name of the NGO, Shalika Foundation. There is no NGO under the name of Shalika Foundation in the list of registered Sri Lankan non-profits.

Top 15 Open Source/Free Security/Hacking Tools | Security & Hacking Blog 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13. 14. sqlmap

Free advice on how to fix your bicycle: HOW TO REPAIR BICYCLE ARTICLES Bicycle repair and maintenance for the regular bike rider. No frills here but the basic stuff everybody needs to know that can help you save money and have fun. So from where ever you are on this planet, read on,fix it, get on your bike and ride! Sunday, February 22, 2009 Here's a comprehensive list of the better how-to articles in this blog. More will be added as time goes by. Murphy's Law and Bicycle Repair How to paint a bike the quick and easy wayHow to install a bicycle cargo rackBicycle buildsBMX rebuild 1 BMX rebuild 2 Vintage CCM muscle bike 1950 ladie's CCM Homebuilt Recumbent 1Homebuilt Recumbent 2Homebuilt Recumbent 3Homebuilt Recumbent 4 (note, this last project ended up being a failure, but it is still listed since you might find some valuable information within the articles written about it and the origin of the failure was the actual layout, not the work itself.)Special projectsDIY Big TrailerDIY Smal TrailerDIY Hard Saddle bag for almost nothing Gerry :) 4 comments:

How to Cite Sources & Not Steal People's Content on the Internet The best content marketers aren't afraid to share. Share content. Share links. Share ideas. The thing is, sometimes marketers get a little protective of their stuff because there are less-than-scrupulous people out there who take content and then try to pass it off as their own. But sometimes it isn't a matter of people being jerks -- they might just not know how the internet "works." Bonus: Download our collection of royalty-free stock photos here -- no attribution required. So to clear up any confusion and ensure you (and anyone you do business with) is following generally accepted internet sharing etiquette, this post will outline how to cite internet sources. How to Cite Sources in Blog Posts & Long-Form Content Assets Blogs are hotbeds of source attribution issues, probably just due to the sheer volume of content the format offers. Citation Scenario #1: Let's say you're quoting another blogger in your post -- hey, sometimes you literally couldn't have said it better yourself.

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data. This acoustic cryptanalysis, carried out by Daniel Genkin, Adi Shamir (who co-invented RSA), and Eran Tromer, uses what’s known as a side channel attack. This might sound crazy, but with the right hardware it’s actually not that hard. Here you can see the frequency spectrogram of various CPU instructions (down the right hand side) The researchers successfully extracted decryption keys over a distance of four meters (13 feet) with a high-quality parabolic microphone.