background preloader

Online IDE

Get the Free Version - Free, open-source software to help you save money. Gmail Tips - The Complete Collection Gmail Beta: First Impressions The other day, I received an "invitation" to beta test Google's new "Gmail" email service. After having tried and used literally dozens of web-based email services over the years, I decided to see what the buzz was all about, so I followed the Invitation instructions, and within a couple minutes, I had a new Google Gmail account. First off, please note that this article is based on the pre-release beta of Gmail, so presumably, the public release will have additions, changes, and improvements. Webmail While Web-based email is nothing new, Gmail introduces some new and unique concepts. But why use Webmail when I have a good client in Outlook? I'm going to first walk you through some of the "features" that make up Gmail. Advertising Let's start off with the "tough" issue first: Advertising. Gmail does not "read" your email. Google has been extremely open and forthcoming about its privacy policy and process. OK, I'll step down off of my soapbox now. Logging In 1.

Types of Skills Everyone Should Know – Video – Top 100 Important Skills 3. Split Firewood Seasoned splitters use a maul, not an ax, to prep firewood. (With its slim taper, an ax head often gets stuck in the end grain.) Michael Lewis Have you ever wanted to create your own font from your handwriting? | Ask The Admin This is a cool little 10-15 minute activity that will keep on giving back to you for years to come. That’s right add that final customizing touch to your Windows, Linux or Mac machine – Your handwriting as a font! With some free time a visit to a website called YourFonts.com, a scanner and a printer you can create a font for use in any application on your computer. To me this sounded way too cool to pass up. I went and downloaded the printable template from here and carefully followed the steps. The template looks like this: You print it out and add your letters to each corresponding box. So if you just wanted to have a font contain numbers, letters or characters just fill in those. I was pretty excited, I grabbed a sharpie and went to work on my page. Now I messed around with the scanning properties and decided to use the grey scale you see above at 200dpi. Most scanning programs can save as for you. I filled in the fields uploaded and then waited about a minute to be show this:

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

99 ways to make your computer blazingly fast Over the last several years working in IT for various companies as a Systems Administrator, a Network Administrator, and a Help Desk professional, I’ve written and learned about many ways to increase the performance of not only my PC, but also of the many PCs on my networks ranging from Windows 98 to Windows 10. In this article, I hope to compile a huge list of all the different methods and tricks that I’ve used to get the last bit of juice out of a slow PC. Whether you are using an old PC or the latest and greatest in hardware, you can still use some of these tips to make your PC run faster. Note that since I write two blogs, Help Desk Geek and Online Tech Tips, I have previously written about many performance tips already which I will link back to throughout. There are probably a lot of great tweaks and performance hacks that I’ve missed here, so feel free to chime in with comments! 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28.

Check If Someone Is Using Your Wi-Fi - TechSpot Guides There are many reasons why you'd want to check if an unauthorized party is using your wireless network. It may be that you're experiencing a slower than normal Internet connection or you simply don't want anyone getting a free ride while you pay the bill. Of course, there are also security implications if this person can somehow access files on your network, and even legal implications if he uses your connection for piracy or other illicit activities. Whatever the case it's better to stay on the safe side. Many of you may have already taken some basic precautions when setting up your wireless network and know your way around troubleshooting these issues. Check the devices associated with your router The first thing you need to do is login to your router's administrative console by typing its IP address directly into the browser address bar -- typically 192.168.0.1 or 192.168.1.1 depending on which router you have. DHCP client list examples on D-Link and Linksys routers. Taking action

Downloadable Computer Repair CDs | Technibble One of our Technibble forum members, PcTek9, and a handful of other Technibble members have compiled a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs and Special Purpose CDs. Some of these are free to download, some are not. Be sure to read the EULA for the CD’s you download and the applications you use to make sure you are allowed to use them in the manner you plan to use them in. Many of the CDs contain a variety of different programs and some of the applications are free to use as you please, but some of them disallow commercial use. Also, some of these CD’s may set off an antivirus false positive due to their virus removal, password cracking, system file changing nature. Some CDs have been purposely left out of this list as they contain illegal software. Creating Multiboot CDs

Related: