Projects Overview The Tor community of software and services aims to make your Internet experience safer and better. Tor Browser contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Arm is a terminal status monitor for Tor, intended for command-line aficionados and ssh connections. This functions much like top does for system usage, providing real time information on Tor's resource utilization and state. Analytics for the Tor network, including graphs of its available bandwidth and estimated userbase. Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. Pluggable Transports (PT) transform the Tor traffic flow between the client and the bridge. Web-based protocol to learn about currently running Tor relays and bridges. In collaboration with The Guardian Project, we're developing Tor on the Google Android mobile operating system.
How To Become a Software Engineer The time to begin planning for the future is now and if you are interested in becoming a software engineer you can’t afford to wait. There are a lot of opportunities in the computer industry, but all of these software professionals are extremely qualified and experience. This means that you must get a head start and begin planning for your career in software engineering at an early age. This will ensure that you meet all educational requirements and gain the experience that you need to succeed in this field. Do You Have an Interest? How To Become a Software EngineerOnce you have identified that you have an interest for the design of computer software, you can begin getting the education that you will need to become a software engineer*. A software engineer always approaches all design and software issues with engineering in mind. Experience and Contacts Will Help You Move UpMoving up in the world of software engineering is all about gaining experience and meeting new contacts. Resources
Note taking and organization What is KeepNote KeepNote is a note taking application that works on Windows, Linux, and MacOS X. With KeepNote, you can store your class notes, TODO lists, research notes, journal entries, paper outlines, etc in a simple notebook hierarchy with rich-text formatting, images, and more. Using full-text search, you can retrieve any note for later reference. KeepNote is designed to be cross-platform (implemented in Python and PyGTK) and stores your notes in simple and easy to manipulate file formats (HTML and XML). Read more about KeepNote's design philosophy or follow my development ideas on twitter (@mattrasmus). Features Rich-text formatting (e.g. Updates 2012.03.26 - Released KeepNote 0.7.8 I just released KeepNote 0.7.8. 2012.01.01 - Released KeepNote 0.7.7 Happy new year! 2011.11.20 - Released KeepNote 0.7.6 KeepNote 0.7.6 is now released. Download See change log for update details. Download extensions There are a growing number of extensions available for KeepNote. Requirements Notes
Wirelessdefence.org "coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. Project Homepage: also see: Local Mirror: cowpatty-4.6.tgz MD5: b90fd36ad987c99e7cc1d2a05a565cbd Installing coWPAtty coWPAtty Dictionary Attack Precomputing WPA PMK to crack WPA PSK coWPAtty Precomputed WPA Attack coWPAtty Tables NOTE: coWPAtty 4.0 and above also include WPA2 attack capabilities (usage remains the same). Download the latest coWPAtty (currently coWPAtty-4.2) to /tools/wifi tar zxvf cowpatty-4.2.tgz cd cowpatty-4.2 make To perform the coWPAtty dictionary attack we need to supply the tool with a capture file that includes the TKIP four-way handshake, a dictionary file of passphrases to guess with and the SSID for the network. . wpa-test-01.cap is the capture containing the four-way handshake dict is the password file cuckoo is the network SSID . hashfile is our output file
UPDATED - Using Googles Full Capabilities « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! Here is an updated version of the ‘Using Google’s Full Capabilities’. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we’ve compiled it here. Enjoy. Each of these things can be copied and pasted into Google search for some good old fashioned fun! Enjoy! admin account info” filetype:log ! Code: nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail? “Warning: mysql_connect(): Access denied for user: ‘*@*” “on line” -help -forum “Warning: mysql_query()” “invalid query” “Warning: pg_connect(): Unable to connect to PostgreSQL server: FATAL” “Warning: Supplied argument is not a valid File-Handle resource in” “Warning:” “failed to open stream: HTTP request failed” “on line” “Warning:” “SAFE MODE Restriction in effect.”
ViewMarks | Codepad You successfully installed version 1.0.3 of the ViewMarks Add-on. On this page you will find a short documentation about the operation and the configuration of the Add-on. ViewMarks offers an alternative way to organize and use your bookmarks. When you create a bookmark, a preview image is automatically captured and saved. The new version 2 contains the following enhancements over the previous version: Creating and Editing a ViewMark You can create a boomark with preview of the web page by clicking on the dropdown arrow of the ViewMark icon in the Navigation Toolbar (or right clicking on the icon in the Status Bar) and choosing "Add ViewMark". The elements of the dialog are from top to bottom, left to right: Using and managing ViewMarks You can open the web page view of your bookmark folders by clicking on the ViewMark icon in the Navigation Toolbar or the Status Bar. You can also rearrange the web page view of a folder by dragging and dropping individual items around. Using QR codes
Computer Hardware Cheetsheet Computer Hardware Cheetsheet Home › Hardware › Computer Hardware Cheetsheet Computer Hardware Cheetsheet Posted on July 29, 2012 by nertblox inShare1 How to install a Desktop Hard Drive › Posted in Hardware © 2014 Computers Aren't So Bad Responsive Theme powered by WordPress
Clearly Distraction-free reading Create the perfect online reading experience by clearing away everything but the content. Make it your own Choose from several pre-set themes or build one to suit your needs. Save it for later If you don’t have time to finish reading, tap on the Evernote icon to finish reading later. truecrack - Password cracking for truecrypt(c) volume files. WHAT TrueCrack IS? - NEW VERSION 3.5 AVAILABLE TrueCrack is a brute-force password cracker for TrueCrypt (Copyrigth) volumes. PBKDF2 (defined in PKCS5 v2.0) based on key derivation functions: Ripemd160, Sha512 and Whirlpool. The execution time of TrueCrack for a dictionary attack is (average word length 10 characters): Dictionary attack: truecrack -t truecrypt_file -w passwords_file [-k ripemd160 | -k sha512 | -k whirlpool] [-e aes | -e serpent | -e twofish] [-a blocks] [-b] [-H] [-r number] Alphabet attack: truecrack -t truecrypt_file -c alphabet [-s minlength] -m maxlength [-k ripemd160 | -k sha512 | -k whirlpool] [-e aes | -e serpent | -e twofish] [-a blocks] [-b] [-H] [-r number] cd truecrack . . TrueCrack is an Open Source Software under GNU Public License version 3.
I Did Not Know That! Clever Tips To Make Your Life Easier I Did Not Know That! Clever Tips To Make Your Life Easier Welcome to yet another round of “I Did Not Know That!” This is our ongoing quest for clever and simple tips to make your life easier. By the way: should you thirst for more genius ideas, be sure to check our other Life Hacks: -More genius like making a temporary tattoo and studying tricks -Genius ways to hide eyesores in your home: from laundry rooms to cracked flooring -Genius cooking hacks that make you look like a master chef -Brilliant parent hacks from handwriting to temper tantrums -Brilliant girlie life hacks -“Brilliant” parenting hacks from Gamer Dad Be Socialable, Share You Might Also Like Comments
InstallingSoftware Main page: Ubuntu Documentation: Installing applications. Note: The Main page is available in multiple languages. Installing software in Ubuntu is easy, and this guide will show you how to do it. By default, many useful programs are already installed when you put Ubuntu onto your computer. However, you may need a particular piece of software that serves a purpose not served by the default applications. If you'd like to get some background information on what's happening when you install software (which can sometimes be technical), read Packages and Package Management. See also: FreeSoftwareAlternatives This section covers the basic concepts of packages and package management. What is a package? Software is a very broad term, and is generally taken to mean a program which you can run on your computer. Ubuntu uses packages to store everything that a particular program needs to run. Source or Binary? Package Dependencies Programs often use some of the same files as each other. Package Managers