background preloader

[]~

[]~

Geek Cakes: For Geeky Wedding or Geeky Birthday | Geek 24: Gadgets, Technology and Geek If you are geek, why would you have a regular cake for your wedding or birthday? Right? Okay, if the only reason you don't have one is because you are running out of ideas, here are some cakes we spotted over the web that have geek written all over them, which you can use for inspiration. Some can be great for a geek wedding, others for a geek birthday or a geek groom's cake. The Penguin Wedding Cake for a Linux Geek's Wedding All programmers shall eat this cake. The Laptop Cake (you can eat the laptops too BTW) The Super Mario Cake The iCake for a Mac Geek's Birthday XML Birthday Cake Star Trek Enterprise Cake Another Coding Cake Star Wars (R2-D2) Cake This one seems inspired from our Geek Quotes collection. Another Super Mario Cake. When two geeks decide to get married this is what their cake looks like. Another wedding cake at a gaming geek girl's wedding Most of the pictures came from Flickr and some were from our tippers.

15 Essential Windows Explorer Addons Copy files faster: Total Copy is an improved version of Windows’ copy-function which copies slightly faster than Windows. With this app you can pause the copy-processes, and continue later. The best part of this app is that you can resume the copy process when you restart your pc. This is really helpful especially in case of power-loss or system-crash.How to use? Piky Basket: Piky Basket is a small utility which works as a replacement for the Windows file copy/paste operation. What you can do with Piky Basket: Select files which have to be copied and drop them in the Piky basket. InfoTag Magic: InfoTag Magic displays extra data stored in the tag fields of MP3, WMA, APE and Ogg Vorbis files in a tooltip window when mouse pointer is hovered over a file in Windows Explorer. Download InfoTag Magic Folder Size: Windows Explorer doesn’t show the folder size when you select the ‘details’ explorer view. Follow the below instructions to install it: 1. Download QTTabBar Download Visual Task Tips

UK Crop Circle Review 2007 by Graham Tucker From mid-July onwards the season was in full swing with strikingly beautiful designs appearing almost daily. This magnificent five-fold fractal that arrived at Chute Causeway revealed some remarkable complexities within its floor lay. For instance appearing in many of the “spread-eagle” arms of the stars were some intriguing raised sculptures that were simply formed by wrapping bunches of wheat together. Each and every one of the small outer nests were so individually crafted that each and every one of them deserved a look-see. You couldn’t afford to pass one by…for they were knotted and twisted in such a unique variety of ways. It appears “The Circlemakers” were acknowledging the old Roman causeway which lies at around 800ft above sea level. As the season drew to a close, “The Circlemakers” chose to place before us some astonishing formations. Sometimes though it’s the most simplest of formations that really try to capture our imagination. Graham Tucker © 2007 End notes 1. 2.

Torrent2exe turns any torrent file into a single-source BitTorrent client - Download Squad Torrent2exe is a web-based utility that does for BitTorrent files what Audio/Video to Exe does for audio and video files. That is, both utilities let you take a file that's typically useless without companion software and make it usable on its own. While Audio/Video to Exe makes audio and video files playable without a media player, Torrent2exe makes files distributed via BitTorrent downloadable without a separate BitTorrent client. Here's how it works. The site also allows you to enter the URL of a torrent instead of uploading a file from your desktop. If you want to convince your less tech-savvy friends or relatives to download a Linux distribution or Creative Commons licensed movie, Torrent2exe could come in handy. [via Instant Fundas] Tags: bittorrent, torrent2exe

Stupid Ubuntu tricks: 5 Steps for resetting a forgotten password - Download Squad It happens to everyone. You have so many usernames and passwords that you can't remember them all. Fortunately, Facebook, Gmail, and about a billion other online services have a "forgot password" link. Just click it and the web service will either email your password to you or allow you to reset it and enter a new one. But what happens when you forget the password for your operating system. Not that this has ever happened to us, but hypothetically let's say we were trying to perform a fresh install of Ubuntu on a laptop this afternoon. While you might think the easiest thing to do is reinstall Ubuntu, (after all, this is a clean install so it's not like we'd be losing any data on our hypothetical system), you can save yourself 15-30 minutes by changing the password. Turn on your computer, and as soon as you the Press Esc to enter grub message, press the escape key.

The Top 75 Open Source Security Apps About a year ago, we took a look at the growing trend toward open-source security and highlighted 10 of the best apps available. Since then, the area has continued to mature, and now we're back highlighting 75 of the most frequently downloaded open-source security applications. Anti-Virus/Anti-Malware 1. ClamWin Free Antivirus This Windows-only app uses the incredibly popular ClamAV engine to detect viruses and spyware. 2. Numerous commercial and open-source products are based on the Clam Antivirus engine. 3. Moon Secure is currently based on ClamAV, but the developers are working on an antivirus engine of their own that will enable real-time scanning. 4. As you might expect from its name, Rootkit Hunter searches your system for rootkits and other unwanted tools. 5. Short for "A Mail Virus Scanner," AMaVis acts as a go between for your anti-virus software and your mail transport agent so that incoming e-mails can be scanned for viruses. 6. 7. 8. Anti-Spyware 9. xpy 10. 11. 12. 13. 14. 15.

Serendipity Filesystem Basics - Linuxconfig.org This article explains basic commands for navigation within Linux file system. The diagram below represents (part of) a Linux file system know as Filesystem Hierarchy Standard. A line from one node to a node on its right indicates containment. 1. student@linuxgym:$ pwd /usr/local/bin student@linuxgym:$ cd student@linuxgym:$ pwd /home/student student@linuxgym:$ 2. student@linuxgym:$ pwd/usr/local/binstudent@linuxgym:$ cdstudent@linuxgym:$ pwd/home/studentstudent@linuxgym:$ 3. student@linuxgym:/etc$ cd /home/studentstudent@linuxgym:$ pwd/home/studentstudent@linuxgym:$ 4. student@linuxgym:$ pwd/usrstudent@linuxgym:$ cd binstudent@linuxgym:$ pwd/usr/binstudent@linuxgym:$ and you go to /usr/bin rather than /usr/local/bin or /bin. 5. student@linuxgym:$ pwd/usr/binstudent@linuxgym:$ cd ..student@linuxgym:$ pwd/usrstudent@linuxgym:$ 6. student@linuxgym:$ pwd/usr/binstudent@linuxgym:$ cd . student@linuxgym:$ pwd/usr/binstudent@linuxgym:$ does not change the current working directory.

End of the World. A flash animation (Submit to StumbleUpon and Twitter) Ho kay here's the Earth, just chilling...Damn that is a sweet earth you might say. Wrong! Ho kay, basically we've got China, France, India, Israel, Pakistan, Russia, the UK, and us with nukes. Anyway one day we decide that those Chinese sons of a bitches are going down...so we launch a nuke at China. Want to know what the rest of the End of World animation lyrics are? Want to share The End of the World with others? Simply copy and paste the code below onto your blog or website Code will create this clickable thumbnail which will link back to The End of the World animation.

Network Latency Calculator | Subnet Calculator| NetQoS Network Estimation Tools Browse by Role Application Developer or Architect CIO or IT Executive Customer Experience & Support IT Operations Line of Business Executive Mainframe Portfolio or Project Manager Security & Compliance Sustainability Register MyCA Contact United States - English Search Facebook Twitter LinkedIn Google-plus YouTube solutions Business Service Innovation Accelerate Drive innovation by leveraging new technologies and harnessing the power of the cloud to meet business needs. Agile Cloud Delivery Service and Portfolio Management Service Virtualization Transform Return focus to service quality by reducing infrastructure complexity and freeing-up resources. Energy & Sustainability Infrastructure Management Mainframe Modernization and Optimization Service Assurance Secure Reduce risk and secure the way you do business. Control Privileged Users and Data in the Datacenter Govern Employee and Partner Access to the Extended Enterprise Securely Connect Customers to Business Applications Solutions by Business Large Enterprise products

11 signs youre no longer a hard-core gamer You used to play videogames all night. Your Quake prowess was unmatched; your skills at Command & Conquer unparalleled. You have a gaming history that stretches back beyond the PlayStation generation to the SNES, Megadrive, Amiga and ZX Spectrum. Tick-tock... You prefer playing against the computer Online gaming against real people has become depressing – it exposes your faded, spoon-sharp reflexes and you abhor the trash-talk from 12-year old fanboys. You only play when your girlfriend is out Because you only have one high-def TV and to play videogames on it while she's at home is 'selfish' and not something the two of you can do 'together'. You believe that winning isn't everything It's the taking part that counts. It's been days, not hours since you last switched on your console You’re the oldest person trading in games at GameStation So you lie about why you’re there. You like your Xbox 360 and your PS3 equally You fondly remember a ‘golden age’ of gaming Wednesday's just fine.

Related: