background preloader

DSL information

DSL information

SystemRescueCd 18 Creative & Useful Ways To Use NFC Tags With Your Android Phone Editor’s note: This post was originally published in October 2013 and has been completely updated and for accuracy and with more uses. NFC (Near Field Communication) has been getting more attention by the media after becoming a technology for mobile payments and creative marketing. Most of the recent mobile devices support NFC, but most people don’t really know about or use it. NFC has a very uncertain future. Whether or not NFC becomes a widely adopted technology, it also needs to lose its image. Most people still think that NFC is only used for mobile payments and data transfer. There is more fun and practical stuff you can do with NFC: using NFC tags! NFC tags can be small stickers, which contain a small unpowered NFC chip. For the ones who haven’t programmed NFC tags before, we created a short video tutorial: And if you are planning to get some for yourself, check out this decent starter kit. At home Stick an NFC tag near your entrance door and let it do things, such as enabling your

BeRTOS — Scopri BeRTOS is continuously developed and new architectures are supported at every new release. At the same time it features many example projects for the most widespread development boards to ease the learning curve by presenting real world use cases. Thanks to the functionalities provided by the new configuration Wizard, such as auto-selection of modules based on dependencies, integration between IDE and toolchains, direct debug support on the target, project management will be much more simple and rapid for all embedded developers that choose BeRTOS as an embedded operating system. Thanks to the Wizard many other features are available: Common Board Templates: the Wizard can generate ready-to-use project templates for all development boards supported by BeRTOS; Project Examples: you can automatically generate some sample projects fully configured for a specific board. Wizard Tutorial Discover how to auto-configure your projects with BeRTOS Wizard!

Main Page - Linux Mint How to Use Your Cat to Hack Your Neighbor's Wi-Fi Coco, modeling the WarKitteh collar. Gene Bransfield Late last month, a Siamese cat named Coco went wandering in his suburban Washington, DC neighborhood. Unbeknownst to Coco, he’d been fitted with a collar created by Nancy’s granddaughter’s husband, security researcher Gene Bransfield. In the 1980s, hackers used a technique called “wardialing,” cycling through numbers with their modems to find unprotected computers far across the internet. Skitzy the cat. Despite the title of his DefCon talk—“How To Weaponize Your Pets”–Bransfield admits WarKitteh doesn’t represent a substantial security threat. In his DefCon talk, Bransfield plans to explain how anyone can replicate the WarKitteh collar to create their own Wifi-spying cat, a feat that’s only become easier in the past months as the collar’s Spark Core chip has become easier to program. His first experiment involved hiding an HTC Wildfire smartphone in the pocket of a dog jacket worn by his coworker’s tabby, Skitzy.

Rimuovere totalmente Unity da Ubuntu 12.04 Precise Questa guida è per tutti quelli che come me, apprezzano molto Ubuntu ma proprio non riescono a digerire la nuova interfaccia targata Canonical, Unity; per tutti quelli che non si accontentano solo di installare un altro DE e selezionarlo al login, ma vogliono anche estirpare dal sistema ogni minimo pacchetto, traccia e dipendenza di Unity. Non me ne vogliano i fans appassionati di Unity, abbiate pazienza, sono bastardo (e pignolo). Dunque: Procediamo a installare Gnome Shell, il suo Login Manager (che andrà a sostituire LightDM), il buon vecchio Synaptic come gestore dei pacchetti ed una utility che ci permetterà di pulire a fondo, in questo caso, ogni "residuo" di Unity. Apriamo il terminale e digitiamo: sudo apt-get install gdm gnome-shell synaptic deborphan Durante l'installazione ci verrà chiesto di impostare il Login Manager predefinito, selezioniamo "Gdm" e continuiamo. sudo apt-get autoremove sudo apt-get purge `deborphan` sudo dpkg --purge `dpkg -l | egrep "^rc" | cut -d' ' -f3`

UNetbootin - Homepage and Downloads Coco the cat can hack your WiFi network with his WarKitteh collar Your cat probably does some pretty awesome, YouTube-worthy tricks. Chances are, however, that your cat isn’t quite the geeky little feline that Coco is. Coco, you see, can hack WiFi networks. Not on his own, mind you. He spent hours upon hours creating WarKitteh, a fur-wrapped collar that’s wired for WiFi reconnaissance. While Bransfield has all the electronic and coding skills required to whip up WarKitteh himself, he needed a bit of help from a kindly neighbor lady to finish the collar off. His first feline operative, Skitzy, turned out to be a little too laid back to be of much use. Bransfield is hopeful that his project will increase awareness and convince people that it’s time to pay more attention to the security of their home networks. Images courtesy Gene Bransfield

Zinstall XP7 — Zinstall Zinstall XP7 enables your legacy incompatible XP programs to continue working on your new Windows 7 or Windows 8 computer. XP7 migrates the old XP system using visualization. All legacy XP applications, which are inherently incompatible, are still kept working within Windows 8 or 7 - exactly as they worked before. This software uses the state-of-the-art Zinstall technology, and takes your programs, settings and files from your old system to the new one, with no re-installs. And if you have any trouble or need assistance - our support team can resolve even the most problematic cases. Here is how it works: Note: XP7 works for Windows 8, Windows 7 and Vista.The video shows just one possible example. Security and stability: With Zinstall, your new system is completely protected from any viruses and malware. 100% confidence: You get an exact copy of your old Windows XP on your new computer, and you can continue working exactly as before, with all your XP programs, settings and files. Feel at home: – A lighweight distribution for children and kids How safe is your network? – Kali Tutorial Security is something that everyone needs to be aware of and something that everyone needs to deal with. While you can go out and collect a number of tools and utilities to help you out, there is an easier path. There are several Linux distributions out there that provide an entire suite of tools to fit your security needs. In this tutorial, we’ll use Kali Linux to go through one possible set of steps to analyse and test your local security. Resources Kali LinuxMetasploit Step by Step Step 01 Download and install The first step is to get a copy of Kali Linux to work with. Step 02 Hardware detection One cool extra that Kali Linux provides is the ability to take a look at your hardware before booting up. Step 03 Netdiscover One of the first things to do is to find out who, or what, is on your network. Step 04 Tcpflow Once you have a list of hosts, then you will probably want to look at what kind of communication is happening. Step 05 Intrace Step 06 Zenmap Step 07 Sqlninja Step 08 Acccheck Step 09 Step 10