background preloader

Transferring your iTunes Library

Transferring your iTunes Library
For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library. Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive. However, as you add new content over time, particularly with the additional video content now supported by iTunes, you may soon find that your library threatens to take over your computer. Another common scenario many users find themselves in is what to do when they upgrade to a new computer. How iTunes Manages Media Content

Jailbreak basics: Everything you need to know for iPhone and iPad | TiPb We see quite a few questions in our Jailbreak Forums about jailbreak basics. So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). We've included common jailbreak lingo, popular jailbreak apps and tools, and videos highlighting some awesome jailbreak utilities! Common ways to Jailbreak There are usually several ways to Jailbreak depending exactly when a new version of iOS is released, when a new exploit is found, and when new Jailbreaks are released. If you're not sure, here's how to find out which iOS software and iPhone modem firmware you're running. iOS 5.0 & 5.0.1 (GSM/CDMA) Jailbreak (untethered) iOS 5 & 5.0.1 (GSM/CDMA) Jailbreak (tethered) iOS 5 & 5.0.1 (GSM) Unlock How to unlock iOS 5 & 5.0.1 via ultrasn0w iOS 4.3.3 (AT&T/GSM) Jailbreak (untethered) Jailbreak

Tic tac toe... … three in a row! Apple released iOS 4.3.3 on Wednesday, and once again the untethered jailbreak exploit that @i0n1c created for 4.3.1 still works. That makes it an unprecedented three firmwares where the same userland exploit works. We’re not exactly sure why Apple hasn’t fixed the hole yet, but we’re not complaining! Today’s PwnageTool and redsn0w incorporate @i0n1c’s port to 4.3.3 (it’s ironic that such a long-lasting untether doesn’t even have an official name!). iPhone3GSiPhone4 (GSM) iPhone4 (CDMA) (4.2.8 - See update #3)iPod touch 3GiPod touch 4GiPad1AppleTV2G (v4.3 8F202…see update #2 below for the v4.3 8F305 bundle) Some things to note: ultrasn0w unlockers must stay away from redsn0w! As always, please feel free to ask for help or advice in our comment section, with our friendly moderators Confucious, sherif_hashim, dhlizard, Frank55, and subarurider (and many other very knowledgable commenters too!) Thanks once again, @i0n1c! redsn0w 0.9.6rc19: Unofficial Mirrors

Cydia Search | Comprehensive Package Database Although packages are easily navigated from any jailbroken iOS device through the Cydia application itself, Cydia Search is a browser-based search engine offering a quick and reliable alternative for finding packages currently available in Cydia. Cydia Search checks all included repositories for new and updated packages once per hour. Additional information on how this system handles package data as well as asnwers to many frequently asked questions can be found on the FAQs page. Cydia is a full-featured graphical front end to APT and the dpkg package management system for the iOS developed by Jay Freeman (saurik). Cydia provides access to the latest software packages (including applications, themes, ringtones, and other modifications) exclusive to the jailbroken iPhone, iPod Touch, or iPad. Cydia is typically installed on iOS devices during the jailbreaking process and includes a handful of default repositories known as community sources. Default Repositories Other Repositories

OpenSSH Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers fuzzers

Airsnarf - A rogue AP setup utility Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus | Film School... - StumbleUpon Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.

Password crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 7 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (1 year ago). sniffers traffic-monitors

Kismet The GNU Netcat -- Official homepage Google hacking From Wikipedia, the free encyclopedia Hacker technique Basics Devices connected to the Internet can be found. A search string such as inurl:"ViewerFrame?Mode=" will find public web cameras. History The list of Google Dorks grew into a large dictionary of queries, which were eventually organized into the original Google Hacking Database (GHDB) in 2004.[5][6] Google Dorking has been involved in some notorious cybercrime cases, such as the Bowman Avenue Dam hack[11] and the CIA breach where around 70% of its worldwide networks were compromised.[12] Star Kashman, a legal scholar, has been one of the first to study the legality of this technique.[13] Kashman argues that while Google Dorking is technically legal, it has often been used to carry out cybercrime and frequently leads to violations of the Computer Fraud and Abuse Act.[14] Her research has highlighted the legal and ethical implications of this technique, emphasizing the need for greater attention and regulation to be applied to its use.

Google Dorks cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. For instance, [cache:www.google.com] will show Google’s cache of the Google homepage. link: The query [link:] will list webpages that have links to the specified webpage. related: The query [related:] will list web pages that are “similar” to a specified web page. info: The query [info:] will present some information that Google has about that web page. define: The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. stocks: site: If you include [site:] in your query, Google will restrict the results to those websites in the given domain.

Related: