background preloader

Free Portable Software USB Flash Drive Applications

Free Portable Software USB Flash Drive Applications

Detecting IE Versions in JavaScript without User Agent Sniffing or Feature Detection - Patrick O’Neill - Web Developer, Web Designer I'm now using James Padolsey's solution to this problem typically instead of the following. Browser sniffing is generally frown upon, but there's a massive gorilla in the room: Internet Explorer. While needing JavaScript workarounds specifically for IE are far rarer than CSS, I still find myself needing to use different code for IE - when animating PNG-24s, for instance. Most of us (at least, those of us using jQuery) have grown accustomed to using jQuery.browser for this purpose - even if we know it's not the best practice. When browser capabilities or implementations differ, feature detection is vastly preferred to user agent detection. However, as Nicholas Zakas points out, feature detection is not browser detection and like him I am reluctant to say there's never a use-case for browser sniffing. So, without beating around the bush, here's the little tiny script: Following this, you will then be able to do something like the following: And all without sniffing the user agent string.

BleachBit - Clean Disk Space, Maintain Privacy software >> sslsniff Some History This tool was originally written to demonstrate and exploit IE's vulnerabilityto a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes. It is designed to MITM all SSL connections on a LAN, and dynamically generates certs for the domains that are being accessed on the fly. The New Scoop Version 0.6 has been significantly updated to additionally support the null-prefix attacks that I demonstrated at BlackHat 09 and Defcon 17. sslsniff has also been updated to support the OCSP attacks that I published at Blackhat 09 and Defcon 17, thus making the revocation of null-prefix certificates very difficult. sslsniff is useful for deploying other vulnerabilities as well. For more information on these attacks, see the video from Defcon 17. The three steps to get this running are: Installing sslsniff Running sslsniff

Parents Are Wrong to Drag Kids to Church Throughout the United States, a familiar scene takes place every Easter in which well-meaning Christian parents dragged their atheist son or daughter to church with them. The stated explanations for this behavior ranged from the believable (e.g., "Because it is important to me") to the nonsensical (e.g., "Because it is Easter"). But the outcome was the same. I remember this scenario playing out in my childhood home many times. I left church behind long ago. Your parents are wrong to do this to you.

cinchrb/cinch - GitHub Repurposing the PS3 Move 2011/02/26 02:32 Filed in: gyroscope The 2-axis gryoscope (likely an STM LPR425AL, see the update below) is an analog sensor measuring rotation along the x- and y-axes. It uses a 1.4V reference signal that it seems to generate internally from an external 3.2V source. This 1.4V source is available on pin R138. Between two different Moves, the gyroscopes seem not to have consistent markings. iFixIt’s is marked 067S8. There are extra capacitor pads C85, C103 and C104, C106-- x- and y-axis, respectively-- which I think could be used for changing the filtering frequency of the analog outputs. Update: It would seem that the brass casing is likely for electromagnetic shielding, as EETimes Asia identifies it as the LPR425AL, which is likely from STM: “None of the sensors can be found in their exact form on either vendor's websites but part markings are consistent with the full part numbers shown, and suggestive of custom parts for Sony.”

Hping2 Basics Scanning Security Tool | Electronics & Technology News You can test the security of your network in a number of ways. One is to hire your own hacker and see if he can get in. Another (and maybe more practical) way is to install hping. As the name suggests, hping is based on the ping utility, but the two applications are used in different ways. Hping differs from ping in that as well as sending ICMP packets, it can also send UDP (User Datagram Protocol) and IP (Internet Protocol) packets. Hardware Intel-based system * Software hping2, available at Linux-based OS 2.2 Kernel, or a later version Challenge Procedure The following are the steps that you will perform for this exercise: Download and install hping2. 2. Verify that you have an IP address bound to your NIC. 3. Use hping2 to determine if a host is active. Use hping2 to determine if a service is active. Perform a stealth scan on your system with hping2. Challenge Procedure Step-by-Step cd /usr/local mkdir sans cp hping2.0.0-rc1.tar.gz /usr/local/tools wq! .

iPhone tracking software Posted on 06 May 2011. Footprints is an iOS geolocation application that enables you to share locations with your friends and family anytime, privately. With Footprints, you can track locations in the background and share them with others. It all happens automatically, whether your phone is in your hand or in your pocket. The software shares locations automatically – in real time, all the time. And it does it privately. Solid State Storage First Step: SSD As Cache - storage Blog Though it's reliable and can boost performance, storage managers still struggle to properly apply solid state technology for maximum benefit without the need to rearchitect storage infrastructure. Storage managers are becoming increasingly confident that solid state storage (SSS) is reliable and will provide a performance boost to their environment when applied correctly. The challenge is how to properly apply solid state technology so that applications can benefit without having to rearchitect your current application and storage infrastructure. The historical use case for SSS, and still the most common, is to speed performance of database applications. In most cases, it is specific elements within that application that are moved to the solid state disk tier. There are applications and environments that can be enhanced by SSS that may not have the clear ROI that revenue generating databases do. The first and potentially most simple step is using SSS as a cache.

Gpg4win encrypts files and folders Home - Free email archiving and email backup software More than 35,000 companies of all sizes and from all sectors rely on MailStore Server. Countless public and educational institutions also depend upon MailStore Server. Advantages for Your Company Legal safeguard for email compliance Extremely fast full-text searching for emails and attachments Total protection against data loss Reduce the workload of mail servers Save up to 70% storage space Simplify backup and restore Independence of cumbersome PST files See all advantages Why MailStore? Trusted by 35,000 organizations in 100 countries Supports almost all email systems and archiving methods Integrated and highly scalable storage technology Minimal system requirements and easy to set up Extremely low-maintenance One-off payment, starting at US$ 190 The Standard in Email Archiving MailStore Server Email Archiving for Businesses MailStore SPE MailStore Service Provider Edition MailStore Home Free email archiving software for home users What Customers Are Saying PGA of Australia Indianapolis Airport

Bin Laden relied on thumb drive couriers to evade email detection Osama bin Laden used a simple but clever way to send lots of emails without being detected by the U.S., the Associated Press reports. Citing interviews with counter-terrorism sources in the U.S. government, the AP said that bin Laden used thumb drives, the flash memory sticks that can hold a considerable number of email messages, to send his emails. Bin Laden had no phone, and his own computer wasn’t connected to the internet. But he evidently wrote thousands of emails. That pretty much guaranteed that bin Laden couldn’t be located by hunting down the origins of his email address or his internet connection. The Navy SEAL team reportedly hauled away 100 flash memory drives after they killed bin Laden.

Cool Tools Gar's Tips & Tools - Issue #154 Gar’s Tips, Tools, and Shop Tales is published by Cool Tools Lab. To receive the newsletter a week early, sign up here. I was thrilled to discover this shout-out from Kevin Kelly in a recent Recomendo. Maker tips: I continue to be impressed by Gar’s Tips & Tools, a newsletter that we co-publish with Gareth Branwyn. I got a big bump in subscribers after this. For years, I saw other people, like my pal Kent Barnes, recommending alignment dots for mindlessly mating a jack to a plug without having to align the exact location or figure out the plug orientation. One of the most-requested projects I get asked about are DIY rolly cabinets for storing portable parts organizer cases, popular among makers. Several weeks ago, I got a message from a subscriber saying that they couldn’t believe I hadn’t written about Tim Hunkin’s latest series, The Secret Life of Components. In this thorough video and written guide, Erin St. Reader Chuck writes:

Related: