Google hacking master list
This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff.
The glider: an Appropriate Hacker Emblem
The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life. About half the hackers this idea was alpha-tested on instantaneously said "Wow!
Software - Regular Expressions
One class of objects that some object oriented programming languages support is called Regular Expressions. These are basically patterns that can be used for string manipulation. The typical syntax for a regular expression involves placing the pattern code between slashes with optional characters after the trailing slash. A trailing i indicates that case should be ignored when processing the pattern and g indicates that the pattern should be processed global instead of stopping at the first occurrence, gi would indicate that the pattern should be processed globally ignoring case. The supported methods will depend on the programming language but a regular expression class will probably support the following methods and possibly many more: The most complex part of using regular expressions is in determining how to code the patterns (the part between the slashes).
Software architect Kristof Kovacs
Just a list of 20 (now 28) tools for the command line. Some are little-known, some are just too useful to miss, some are pure obscure -- I hope you find something useful that you weren't aware of yet! Use your operating system's package manager to install most of them. (Thanks for the tips, everybody!) dstat & sar
20 essential PC shortcuts
I've always liked that Windows gives me multiple ways to perform popular tasks. Say you want to print something. You could go to the File menu and select the Print command, or you can press the Ctrl button and the letter P. Ctrl+P is just one example of a keyboard shortcut. Shortcuts combine two or more keys to do something special that neither key does alone.
Heartbleed bug: Check which sites have been patched
The Heartbleed bug is serious. Disclosed less than two days ago, the Heartbleed bug has sent sites and services across the Internet into patch mode. For an in-depth explanation of what exactly Heartbleed is, and what it does, read this post by our own Stephen Shankland. In essence, the bug potentially exposed your username and password on sites like Facebook, Google, Pinterest, and more. Using Alexa.com, we've been going through the list of the top 100 sites in the US, plus a few extras, and asking "Have you patched the Heartbleed bug yet?" Once we have an answer, we will fill in the chart below with the response.
18 Useful Web Based Code Editors for Developers
PowerShell Tutorial for beginners. Windows PowerShell instruction thought-out for those new to PowerShell. In the next few weeks I will be posting a series of PowerShell basics that will provide a good start for a solid foundation. Here is what I have slated: The Windows PowerShell Console – Configuration and Customization.PowerShell Basics - Cmdlets, Parameters, Command Types, Command Information, etc…Output using the PowerShell Format command.Engaging the Windows File System.WMI and .NET primer (real basic)Variables in PowerShellTaking what you have learned and applying it. The initial lessons are concentrated around PowerShell as a Command Shell.
Five free network monitoring tools
Among the wide array of network and system monitors, you'll find several that do what the pricier tools do -- for free. If you're a system or network administrator, you need monitoring tools. You have to know, at all times, the status of your systems so you can optimize performance and head off potential problems. Thankfully, plenty of tools are available to help you stay in the know about your systems.
17 Portable Apps to Help Troubleshoot PC's
Are you the one that your friends and family call every time they have a problem with their computer? Put these tools on your USB thumb drive and troubleshooting will be that much easier. Please feel free – encouraged even – to suggest other helpful, portable troubleshooting apps. Just leave a comment and I’ll check out the app then update the list accordingly. AutoRuns (startup monitor) The most comprehensive tool for info on auto-starting locations of any startup monitor/utility.
A Google bomb on March 31st, 2013. Despite Google's intervention, some of the first search results still refer to Bush. The terms Google bomb and Googlewashing refer to the practice of causing a web page to rank highly in search engine results for unrelated or off-topic search terms by linking heavily. In contrast, search engine optimization (SEO) is the practice of improving the search engine listings of web pages for relevant search terms. It is done for either business, political, or comedic purposes (or some combination thereof). Google's search-rank algorithm ranks pages higher for a particular search phrase if enough other pages linked to it use similar anchor text (linking text such as "miserable failure"). By January 2007, however, Google tweaked its search algorithm to counter popular Google bombs such as "miserable failure" leading to George W.
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.