background preloader

Have I been pwned? Check if your email has been compromised in a data breach

Related:  mrmckinlayOther Web / TechTech for TeachersUseful sites & linksComputer Security

Download — Python 3.6.1rc1 documentation Last updated on: Mar 19, 2017. To download an archive containing all the documents for this version of Python in one of various formats, follow one of links in this table. The numbers in the table are the size of the download files in megabytes. These archives contain all the content in the documentation. Sound browser What types of sounds can be found on the Web using FindSounds? Below is a partial list. Click on any link below to perform a search, or enter one or more words in the search box above and then click on the Search button. Animals alligator, baboon, bat, bear, bobcat, buffalo, bullfrog, camel, cat, cheetah, chimpanzee, chinchilla, chipmunk, cougar, cow, coyote, crocodile, deer, dinosaur, dog, dolphin, donkey, elephant, elk, ferret, fox, frog, gibbon, goat, gorilla, grizzly bear, guinea pig, hippo, horse, hyena, jaguar, kitten, lamb, lemur, leopard, lion, llama, marmot, monkey, moose, mouse, orca, panda, panther, pig, polar bear, prairie dog, puppy, rabbit, raccoon, rat, rattlesnake, rhinoceros, rodent, sea lion, seal, sheep, snake, squirrel, sugar glider, tiger, toad, whale, wolf, zebra

Small Business Innovation Research SBIR Success Stories: Mindset Works Product Description: The Mindset Works® SchoolKit is a web-based multimedia intervention to strengthen student success through teaching a growth mindset—the understanding that ability develops with effort and learning. The SchoolKit includes Brainology®, a blended-learning program with animations and classroom activities to teach students in grades 5 to 9 about the malleable brain and effective study skills. BIOS Setup Information and Menu Options This document contains information on what the BIOS is, how to enter it, and how to use it. Specific default BIOS settings are not addressed here, as there are too many variations between computer models to include in a short document. It is good practice to keep a record of your BIOS settings for future reference. Default settings can be reloaded easily.

Exploit writing tutorial part 3 : SEH Based Exploits In the first 2 parts of the exploit writing tutorial series, I have discussed how a classic stack buffer overflow works and how you can build a reliable exploit by using various techniques to jump to the shellcode. The example we have used allowed us to directly overwrite EIP and we had a pretty large buffer space to host our shellcode. On top of that, we had the ability to use multiple jump techniques to reach our goal. But not all overflows are that easy. Today, we’ll look at another technique to go from vulnerability to exploit, by using exception handlers.

Penguin Watch: Public asked to aid Antarctic research British scientists who have set up a network of penguin-monitoring cameras in Antarctica are asking the public to help them carry out their research. The Oxford University team is launching a new version of their ambitious project, PenguinWatch, on Thursday. This is now the largest Antarctic citizen science venture in the world. In "PenguinWatch 2.0", people will be able to see the results of their online efforts to monitor and conserve Antarctica's penguins colonies. Lead researcher Dr Tom Hart is also encouraging school groups to adopt their own colony - following and monitoring its progress and "learning about Antarctica along the way."

Content Curation Tools: The Ultimate List For content marketers, content curation is integral to online strategy. Effective curation helps position you as a thought leader in your space, and is an economical way to maintain a consistent publishing schedule of quality content. But manually trying to find the most relevant content in a given industry and then publishing it across multiple channels can be time-consuming. The Teacher's Quick Guide To Digital Scavenger Hunts If you’ve got a smartphone or a tablet in your classroom, you’re ready for the adventure to begin! By adventure I mean, of course, the world of active learning through digital scavenger hunts. In this hunt, students are tasked with finding a particular physical object, person, or place and have to use technology to track it down.

Looking for the absolute easiest way to root your Android? Check out ‘Framaroot’ After holding off for a long time, I recently decided to root my Android (a Galaxy Note I). Having had experience in jailbreaking my iPhone in the past I expected the rooting process to be somewhat complicated and annoying, involving a whole lot of careful reading of instructions, finding and downloading exactly the correct version and variation of ROM to suit my particular device, booting the device into special modes in order to flash the ROM(s), etc. But then I stumbled on what may be the simplest and easiest way to do it: a simple, FREE app that can root your device in seconds.

XSS Filter Evasion Cheat Sheet Last revision (mm/dd/yy): 06/1/2016 This cheat sheet is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion. Please note that most of these cross site scripting vectors have been tested in the browsers listed at the bottom of the scripts. XSS Locator Inject this string, and in most cases where a script is vulnerable with no special XSS vector requirements the word "XSS" will pop up.

Delivery of prizes contest FCI Programming Competition 2014 Administration announces youth care delivery for awards contest FCI Programming Competition 2014 at Faculty of Computers and Information at Assiut University This Seminar Hall first floor building labs and on Tuesday 14/10/2014 the start of the one hour and a half at noon If you are a paid TotalFark subscriber, you must have cookies enabled in your browser. by aun_fci Oct 20

Related:  Security & NetworkMiscelanea