background preloader

LEARN KLINGON!

LEARN KLINGON!
Qapla' batlh je - KAHPLAH BATL JEH - SUCCESS AND HONOR HIja' - HIHJAH' - YES, TRUE (answer to yes/no question) HISlaH - HISHLAHH - YES,TRUE (answer to yes/no question) luq - LUKE - YES, OK, I WILL lu' - LU' - YES, OK ghobe' - GHHOBEH' - NO (answer to a question) Qo - KO - NO SuH - SUUHH - READY, standing by Su' - SUU' - READY, standing by 'eH - 'EHH - ready pItlh - PITLH - done toH - TOHH - so, well wejpuH - WEJPUUHH - CHARMING (used only ironically, sarcasm) maj - MAHJ - good (expressing satisfaction) majQa' - MAHJKAH' - well done, very good Hoch 'ebmey tIjon - HOECH 'EBMAY TIH JONE - CAPTURE ALL OPPORTUNITIES - literally, 'all opportunities you - all capture' maj ram - MAJ RAHM - GOOD NIGHT mupwI' yI'uchtaH! PRONUNCIATION - "oic" gets them to pronounce the "glottal stops" at the beginning and end of the word 'oy' well enough (think of every apostrophe in a Klingon word as a directive to suddenly hold your breath for half a second.) Below is a listing of the Klingon alphabet :

Top 6 Underground Search Engines You Never Knew About Advertisement I love Google, Bing and Yahoo just as much as the next Internet user, but sometimes you really want to dig down into a particular subject. In order to do that, you really need access to those underground search engines that may not be quite as well known, but they dig much more deeply into specialized areas of the Internet than the general search engines are capable of. In many cases, these search engines are tapped into what is currently termed the “invisible web,” which is the information available on the Internet that standard search engines don’t have access to, because they are buried behind query forms or directory requests. The following 6 underground search engines that I chose are not porn sites, illegal piracy sites or anything else that could get you in trouble with the law, or with your significant other. Instead, I term the following as “underground search engines” for two reasons. Here is a search for “classical music,” with over 300 results.

List of constructed languages This list of notable constructed languages is in alphabetical order, and divided into auxiliary, engineered, and artistic (including fictional) languages, and their respective subgenres. Auxiliary languages[edit] International auxiliary languages are languages constructed to provide communication among all human beings, or a significant portion, without necessarily replacing native languages. Controlled languages[edit] Controlled languages are natural languages that have in some way been altered to make them simpler, easier to use, or more acceptable in certain circumstances, such as when a person does not speak the original language well. Visual languages[edit] Visual languages use symbols or movements in place of the spoken word. Engineered languages[edit] Human-usable[edit] Knowledge representation[edit] Artistic/fictional languages[edit] Languages used in fiction[edit] J. (see also Languages constructed by J. Other literature[edit] Comic books[edit] Film and television[edit] Music[edit] Furbish

Hot Wire Your Car From Wired How-To Wiki Nine times out of ten, the term "hot-wire" summons images of car theft. Of course, anyone who's been stranded in a hostile environment without their car keys knows better. Here's the trick to getting your vehicle moving again. This article is a wiki. What you'll need Proof of ownership of the vehicle Slotted screwdriver Wire stripper Insulated gloves Try the screwdriver It's not pretty, but a screwdriver can save you some trouble. If you're considering hot-wiring your car, chances are you're already in dire straits. No such luck? Remove the ignition cover Be careful not to do permanent damage when removing the cover. Before continuing, be sure to exercise extreme caution. The first step is to gain access to the wiring. Identify the battery and starter wires Consult your vehicle's manual to get the correct wire color code. You'll typically see three pairs of wires running into the back of the cylinder. Here's where it gets tricky. Strip and connect the power wires

Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. Introduction [Contents] We welcome corrections such as identifying broken links (especially if you can provide an alternate/update), since over the years companies are absorbed by others, disappear, split up, change their web site etc. Suggesting Additions/Corrections etc. This is a volunteer, unfunded effort. Commercial Monitoring Tools, not integrated with an NMP [Contents] Public Domain or Free Network Monitoring Tools [Contents]

How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down </i>*} 3.

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Hide File in Picture In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. Create a folder on your hard drive, i.e. Now here’s the fun part! And that’s it!

How to Crack the Account Password on Any Operating System – Joe Tech This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Are you curious how easy it is for someone to gain access to your computer? Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. Mac The second most popular operating system, OS X is no safer when it comes to password cracking then Windows. The easiest method would be to use Ophcrack on this, also, as it works with Mac and Linux in addition to Windows. If the Mac runs OS X 10.4, then you only need the installation CD. fsck -fy dscl .

How to defeat most keyloggers on public computers Keyloggers can generally be classified as either software or hardware keyloggers. Software keyloggers are running as a background task on the system while hardware keyloggers are little devices that are most of the time connected between pc and keyboard recording every keystroke to their own memory. The simple keylogger records every keystroke while more advanced ones make screenshots and record mouse movements as well. You sometimes do not have a choice though which leads to the next most secure way to defeat them: Live CDs. Next in line is a method detailed by Technospot which suggests that you should do the following when entering usernames and passwords: Let us assume you want to type in ghacks and fear that a keylogger would record the string. This is a great method to defeat software keyloggers that do not take screenshots when moving or clicking the mouse. It it important to do a quick check of the PC hardware to see if a hardware keylogger is connected to it.

Define what an engineer is; because B.Eng is different from an engineer job title.

B.Eng also differs in definition that is dependant on what country you live in: for example B.Eng could be translated to Scientist in some countries--such as USA. by electronics Nov 3

Related: