background preloader

Port Forwarding Guides Listed by Manufacturer and Model

Port Forwarding Guides Listed by Manufacturer and Model
Related:  part-time-nerd

Khan Academy Youtube.com Each day, youtube.com generates 516,231,485 pageviews from 103,246,297 visitors. The website receives an average of 3,200,635,207 visits and 16,003,176,035 pageviews per month. It is given a rating of A, due to its excellent performance. Rank Reach Bounce Youtube.com has a Google Pagerank of 9 out of 10 and an Alexa Rank of 3. It is given a rating of A, due to its excellent performance. Youtube.com earns $309,739 USD a day in advertising revenue. Youtube.com (and another website) resolves to the IP address 173.194.41.169, which is located in ATLANTA, .

Open Port Check Tool - Do your own website hosting or run an IP Camera etc! Welcome » The Document Foundation Essential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. Finding Wireless Networks Locating a wireless network is the first step in trying to exploit it. Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. (NetStumbler Screenshot) Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. (Kismet Screenshot) Attaching to the Found Wireless Network Once you’ve found a wireless network, the next step is to try to connect to it. Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. (Screenshot of Airsnort in Action) (coWPAtty Options Screenshot) (ASLeap Options Screenshot)

for Mac on Apple TV Apple TV 1 (silver) is no longer available from Apple, but can be purchased from alternative sources (eBay, kijiji, craigslist, etc.). It is highly recommended that you replace the WiFi card with a Broadcom Crystal HD to enable playback of HD videos. 1 Before installing a replacement OS Warning Before installing a Linux-based OS, you will want to make sure that your ATV1 has been updated to the original ATV OS 3.0.2 at least once in order to flash the HDMI controller firmware. You also want to change the original ATV OS settings to "RGB High" in the AV settings. 2 OpenELEC See also: OpenELEC OpenELEC is a fully-featured but highly optimized Linux OS created solely to run XBMC on the mk1 AppleTV and other HTPC systems. OpenELEC has an excellent guide for installing on mk1 Apple TV's here: Installing OpenELEC on AppleTV 3 Crystalbuntu See also: Crystalbuntu Crystalbuntu is an easy to use XBMC and linux-based OS distribution for Apple TV 1 (silver) created and maintained by Sam Nazarko.

Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine Cómo verificar su configuración del seguimiento web - Ayuda de Analytics Una vez instalado el código de seguimiento, todos los datos pueden tardar 24 horas en aparecer en la cuenta de Google Analytics. Mientras tanto, puede comprobar que ha configurado correctamente el código de seguimiento de este modo: Debería ver su número de cuenta en lugar de xxxx-x en el ejemplo anterior. LXer: Linux News NetStumbler.com atvusb-creator - USB flash drive creator for the AppleTV The uber USB flash drive creator for the AppleTV. Creates USB flash drive based installers that include patchstick, factory restore and various LInux distributions. Brought to you by the creators of atv-bootloader and many others. The Intel/PPC OSX version of atvusb-creator. The Windows XP/Vista interim solution atv-win Note that the current version is atvusb-creator-1.0.b13 and atv-win-3.0.zip This version is comes with ssh, bin tools, and two plugins (XBMC/Boxee Installer/Launcher and SoftwareMenu). Remember that some USB flash drives just will not format correctly and if you have problems try another brand. The contents of the patchstick will look like the following, if yours does not look similar or is empty, then the creation failed and you need to create again either by pre-formating two hfsplus partitions using disk utility or trying a different brand flash drive. The other two platform (Linux and Windows) will be released later. XBMC Launcher-0.8 has been released. Quick Help main

Flightradar24.com - Live flight tracker! RootkitRevealer v1.71 Por Bryce Cogswell y Mark Russinovich Publicado: noviembre 1, 2006 Introducción RootkitRevealer es una utilidad avanzada de detección de rootkits. Se ejecuta en Windows NT 4 y versiones posteriores y su salida incluye una lista de discrepancias entre el Registro y la API del sistema de archivos que puede indicar la presencia de un rootkit de modo de usuario o de modo núcleo. RootkitRevealer detecta correctamente todos los rootkits persistentes publicados en www.rootkit.com, que incluyen AFX, Vence y HackerDefender (Nota: RootkitRevealer no está destinado a detectar rootkits como Fu que no intentan ocultar sus archivos ni sus claves del registro). La razón por la cual ya no existe una versión de línea de comandos es que los autores de código malintencionado comenzaron a centrarse en el análisis de RootkitRevealer mediante su nombre de archivo ejecutable. ¿Qué es un rootkit? Rootkits de modo de usuario Existen muchos métodos por los cuales los rootkits intentan evadir la detección. -a -c -m -r

Kerberos/Troubleshooting - Joomla! Authentication Tools (JAuthTools) From Authentication Tools for Joomla! (JAuthTools) This page documents some solutions for common Kerberos issues. It isn't comprehensive but should give you a guide what to look for when resolving the issues. kinit(v5): KRB5 error code 68 while getting initial credentials Wrong Kerberos domain, check that the Linux box is configured to use the right domain. kinit(v5): Permission denied while getting initial credentials Check the permission on your keytab file to ensure that the process can get access to it appropriately. Client not found in Kerberos database kinit(v5): Client not found in Kerberos database while getting initial credentials krb5_get_init_creds_password() failed: Client not found in Kerberos database Make sure that you're typing in the right name and the server has the right name (double check the account tab of the user, especially the realm) kinit(v5): Preauthentication failed while getting initial credentials Wrong password - use the right password. Issues with mapuser

Related:  TestinggeekNETWORKComputervarious stuff 2Tech