background preloader

FormSite - Online Form Builder. Create HTML forms and surveys.

FormSite - Online Form Builder. Create HTML forms and surveys.

Roxer - The easiest way to make a webpage A Text Visualization Tool By: Jeff Clark Date: Thu, 22 Mar 2007 The idea of an interactive tool to explore the structure of a text document has always intrigued me. Visually highlighting key terms from a document and the relationships between them might be an effective way to gain new insights. I have been playing around for a while creating such a tool and have decided it's interesting enough to show here. There are quite a few things I don't like about it but I'm going to set it aside for a bit. I don't like to embed java applications directly in my feed so the real application can be found farther down this post - the part that you have to read directly on my site. (image only - the interactive application is farther down) The top left set of connected circles represents a partial view of a graph showing inter-relationships between words. The top right shows a collection of bar graphs giving the distribution of the primary words across the entire document. Give it a try !

Rapidshare Files Search and Megaupload Links Download. GRUB tips and tricks The GRand Unified Boot loader, or GRUB, has all but replaced the default boot loader on many GNU/Linux distributions. It includes some conveniences over LILO, the LInux LOader. One advantage is not having to remember to run /sbin/lilo every time you make a configuration change. It also can function as a boot loader for removable media such as floppies, CD-R/W and USB flash memory keys. It is short-sighted to view GRUB only as a boot loader to be installed on a hard drive of a GNU/Linux system. Combined with a few other utilities, GRUB can be a powerful and good-looking tool for your home, organization or workplace. First, what exactly is GRUB? Figure 1: you can run GRUB on a USB flash memory key! I got the inspiration for this article after trying DSLinux (or DSL), which is a fully graphical Linux distribution weighing in around 50 MB. Figure 2: this is the file structure on my USB Memory Key Sidebar 1: Contents of menu.lst default=0 timeout=10 root=(hd0,0) initrd=/boot/images/dsl-minirt24.gz

Print Friendly & PDF Damn Small Linux, The Debian packages Index - Applications - Packages - Download - NotesOff Site - Milestones - FAQ - Wiki - Forums - Blogs - Mini-ITX Store - Income Guide - Donate To make room I had to delete the entire /var/lib/dpkg/ from the iso to make room. It is available as a separate download (dpkg.tar.gz). Also, keep in mind that Damn Small is not pure Debian based. there are applications in DSL that are not on this list. Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed |/ Err?

IE9 vs. Firefox 4 Let's compare IE9 to Firefox 4 HTML5 test Firefox 4: 255 Firefox 3.5 (two years ago): 142 source In 2011, IE9 now supports Canvas, Video, Geolocation and SVG. Platform supported IE9: Windows Vista/7. Firefox 4: Windows Vista/7, Windows XP, GNU/Linux, Mac OS, Android. HTML5 compatibility Firefox 4: 88% source CSS3 compatibility Firefox 4: 87% source JS API compatibility Firefox 4: 90% source All Web Standards Compatibility Firefox 3.6 (one year ago): 65% source Hardware Acceleration Firefox 4 = IE9 On Windows Vista/7, Firefox 4 supports Full Hardware Acceleration, as much as IE9. Firefox 4 also supports Hardware Acceleration on Mac and Windows XP (Compositing Acceleration) and Linux (Content Acceleration). on compatible hardware source What's missing in IE9? compared to Firefox 4 What's missing in Firefox4? compared to IE9 Text-overflow

Changing Threats To Privacy From TIA to Google (Blackhat 2010) Tutorial This is the video of the presentation titled " Changing Threats To Privacy From TIA to Google " given by Moxie Marlinspike at Blackhat Europe 2010 . We won the war for strong cryptography, anonymous darknets exist in the wild today, and decentralized communication networks have emerged to become reality. These strategies for communicating online were conceived of in anticipation of a dystopian future, but somehow these original efforts have fallen short of delivering us from the most pernicious threats to privacy that we're now facing. Rather than a centralized state-based database of all our communication and movements, modern threats to privacy have become something much more subtle, and perhaps all the more sinister. Thanks go out to Netinfiniy, the creator of Ubuntu PE for referring this video to us. Original Source: None fun ,

Rosetta Stone for Unix Footnotes 1. In System V-based Unixes, run level relates to booting, shutdown, and single-user mode. 2. 3. 4. ioscan -funC disk may be helpful here to determine device path. 5. Universal Command Guide is a large book which covers several of the OSs in this table. UnixGuide.net has a similar table covering fewer Unix versions and a somewhat different set of tasks. Colin Barschel's Unix Toolbox cb.vu/unixtoolbox.xhtml is a wonderfully detailed handbook sorted by task area and giving both commands and config file excerpts for Linux and BSD. coolcommands is a search engine giving one-line command examples: www.coolcommands.com/index.php? Solaris / HP-UX / FreeBSD / Linux / AIX: www.unixporting.com/quickguide.html Solaris / HP-UX: soldc.sun.com/migration/hpux/migissues/. AIX / Linux: rick.jasperfamily.org/linux/quickstart.html AIX 4.3.3 / Solaris 8: www.redbooks.ibm.com/redpapers/pdfs/redp0104.pdfAIX 5.1.0 / Solaris 8: www.ibm.com/servers/aix/products/aixos/whitepapers/aixmapping.html

Computer Architecture This document is a collection of web pages on computer architecture. The first part is an introduction to digital circuits. We recommend you read the pages in this order: Gates. An analysis of EPUB3 (and, uh, a bit more) [I swear when I’m frustrated. That makes this post obscene even by Chris Rock’s standards. Proceed with caution. Also, this was (and is) supposed to be about EPUB3, but as I kept writing it, it kept growing. The IDPF published the current draft of the new EPUB3 spec a few days ago. I’ve read all the sub-specs of EPUB3, and my general feeling about them is one of… “meh”. Assume I agree with everything in the specs I don’t explicitly disagree with here[2]. All hail the mighty iPad I’ll start this section by saying how I have absolutely nothing against JavaScript on the web. But we’re talking about books here. In EPUB3, JS support is now optional. Scripting consequently should be used only when essential to the User experience, as it greatly increases the likelihood that content will not be portable across all Reading Systems and creates barriers to accessibility and content reusability. Sadly, no one will listen to this. This is what will happen: EPUB3 brings "optional" JS support. No.

Gems of Python - Die in a Fire - Eric Florenzano&s Blog I've been using Python for a few years now, and continue to love it. But the language is large enough that it seems every project that I look at uses a different subset of the language's features. The nice thing is that by reading different people's code, you can find out about some real gems in the Python programming language. filter This is one of Python's built-in functions, which allows you to remove unwanted items from a list. >>> lst = [ '1' , '2' , '3' , '4' , 'asdf' , '5' ] >>> def is_int_string (i): ... try : ... int (i) ... return True ... except ValueError : ... return False ... >>> int_string_list = filter (is_int_string, lst) >>> int_string_list ['1', '2', '3', '4', '5'] But there is a really neat filter shortcut, too. >>> lst = [ 0 , 2 , '' , 'asdf' , None , [], (), 'fdsa' ] >>> filter ( None , lst) [2, 'asdf', 'fdsa'] This is really great for filtering out unwanted values in a list. setdefault Do you find yourself writing this type of try..except KeyError pattern often?

Password Sniffing over a Network (Part 3) Tutorial Description: In this video series, Sickness runs you through different password sniffing techniques. In this third video, Sickness shows how to use Sslstrip and Ettercap in combination to sniff passwords in the network traffic. You can visit Sickness' website for more info. Thanks goes out to Sickness for referring this video to us! Tags: tools , Disclaimer: We are a infosec video aggregator and this video is linked from an external website. Comments:

Related: