background preloader

Index of /

Related:  Hacks/Tools

Rudy's Delphi Corner - Console unit Download I write a lot of console programs to test simple concepts, containing a few test routines and a few Writeln commands. To me, this is much more convenient than having to write a VCL program where the output goes to a ListBox or a Memo. The problem with the console windows in Delphi is, that they close immediately after they are finished. To be able to wait for any key, I wrote a simple unit with a ReadKey command, like in the old Turbo Pascal Crt unit. I tested the unit in Delphi 5 up to Delphi 2006. UPDATE: I removed from the implementation section. Installation Copy the contents of the zip file to a directory of your choice, and open the .dpr file in Delphi. The program itself demonstrates a few of the capabilities of the unit. Constants and variables The unit contains the following constants and variables. Functions and procedures The unit implements the following functions and procedures. Notes Window Sound, Delay, NoSound now. TextMode Legalese I hope this code is useful to you.

Constrictor knot History[edit] First called "constrictor knot" in Clifford Ashley's 1944 work The Ashley Book of Knots, this knot likely dates back much further.[5] Although Ashley seemed to imply that he had invented the constrictor knot over 25 years before publishing The Ashley Book of Knots,[1] research indicates that he was not its originator.[6] Ashley's publication of the knot did bring it to wider attention.[7] Although the description is not entirely without ambiguity, the constrictor knot is thought to have appeared under the name "gunner's knot" in the 1866 work The Book of Knots,[8][9] written under the pseudonym Tom Bowling.[10] in relation to the clove hitch, which he illustrated and called the "builder's knot". He wrote, "The Gunner's knot (of which we do not give a diagram) only differs from the builder's knot, by the ends of the cords being simply knotted before being brought from under the loop which crosses them Tying[edit] The method shown below is the most basic way to tie the knot.

How To Find Product Key Of Any Software » Product Key Finder Tips How to find the product key of any software that you want..?? A product key is a unique identification number or code, used in software like operating systems and games, to prevent counterfeiting and piracy. This is a specific software program. For the most part, a product key operating system is an insignificant number, but when you need to re-install your OS, suddenly the product key becomes the code harder to find. Find Product Key Of Windows 7 A product key Windows 7 is needed to activate the system, format the Windows 7, or in the event of a system crash, re-installing Windows 7 on your computer. How to find the product key of Windows 7 The product key number for Windows 7 is a alphanumeric pattern of 25 characters, divided into 5 groups of 5 characters each. * The product key used to activate the 32-bit or 64-bit editions of Windows 7 * Product keys are also unique to the version of Windows 7 (Ultimate, Premium, Basic, 32 or 64 bits). Ways to Find Windows 7 Product Key Number Software

Secure Role Based Access Control - AppGate Security Server A new module is available for the AppGate Security Server that provides a fully integrated one-time password (OTP) solution. AppGate has always supported a wide range of authentication methods and two-factor authentication. This new module enables customers to deploy a robust OTP solution without the need for additional hardware or servers. One-time passwords are generated on users’ mobile phones, avoiding the need to distribute and maintain physical tokens, and provisioning and initialisation is handled automatically. Clustering The AppGate Security Server supports clustering, which enables the use of multiple servers for redundancy or scalability. Nordic Edge OTP Server The Nordic Edge One Time Password (OTP) server is an optional module that can be installed on the AppGate security server. When the user authenticates using the correct password, an SMS message will be automatically sent to their mobile phone containing a OTP. Business Continuity License ICE License Device Firewall

Survival Gear Review How to Sniff Passwords Using USB Drive As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit: MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo! IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser.

darkjumper Never Talk to the Police | Quick Hitts By Dave Hitt on Mar 31, 2010 in Featured, Police State What’s the best response when a cop asks you something? Silence, or a short, polite non-answer. Shut up. Just. Shut. You should be polite and calm whenever dealing with any armed person. These videos made the rounds about a year ago. In the first part of the first video a fast talking law professor gives you detailed reasons why you should never talk to the police. This is part two, where a former police officer fills in the details. Here are some practical examples of how to legally preserve your rights in an encounter with police: Ok, after all that heavy duty stuff, we need a breather.

Related: