background preloader

NETadMIN Interviews

NETadMIN Interviews

SCRIPT COMPARE a side-by-side reference sheet sheet one: version | grammar and execution | variables and expressions | arithmetic and logic | strings | regexes | dates and time | arrays | dictionaries | functions | execution control | exceptions | threads sheet two: streams | asynchronous events | files | file formats | directories | processes and environment | option parsing | libraries and namespaces | objects | inheritance and polymorphism | reflection | net and web | gui | databases | unit tests | logging | debugging sheet two: streams | asynchronous events | files | directories | processes and environment | option parsing | libraries and namespaces | objects | inheritance and polymorphism | reflection | net and web | gui | databases | unit tests | logging | debugging version used The versions used for testing code in the reference sheet. show version How to get the version. php: The function phpversion() will return the version number as a string. python: import platform platform.python_version() ruby: <? pad

Windows 7: 77 Windows 7 Tips Windows 7 77 Windows 7 Tips Edited by Keith Ward At a Glance: Make Windows 7 faster Get more done with Windows 7 The best Windows 7 shortcuts Securing Windows 7 Windows 7 may be Microsoft’s most anticipated product ever. And whether or not you're upgrading from Vista or skipping it altogether and moving up from Windows XP, you'll need to know how to make the most of it in your environment. 1. 2. 3. 4. 5. 6. 7. Figure 1 The Problem Steps Recorder dramatically speeds up troubleshooting. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Figure 2 The Reliability Monitor has been broken out separately from Performance Monitor. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. Figure 3 User Account Control, the bane of administrators, has been revamped and improved. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. Figure 4 The Credential Manager provides a handy, secure place to store passwords. 39. 40. 41. 42. Figure 5 Windows 7 unbinds many applications from the OS, making it easy to add and remove them. 43. 44. 45. 46.

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Hide File in Picture In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. Create a folder on your hard drive, i.e. Now you should have a folder that looks something like this with files, a JPG image, and a compressed archive: Now here’s the fun part!

Hacker Claiming He Can Exploit Windows Update A hacker who stole SSL certificates from a Dutch-based certificate authority claims that he can distribute malware through Microsoft's Windows Update. There's a hacker out there somewhere claiming that he can issue fake updates to Windows-based desktops and laptops thanks to a set of stolen digital certificates. This means he has the potential to pump malware into Microsoft's Windows Update service and infect the entire Windows user base. Calling himself "Comodohacker," the supposed 21-year-old Iran resident recently took credit for several attacks against certificate authorities (CA) – organizations and companies authorized to issue secure socket layer (SSL) certificates – including one against Comodo in March, and one just recently involving Dutch-based DigiNotar and 531 stolen certificates. It was this latest DigiNotar hack in which Comodohacker retrieved several certificates that could be used to impersonate Microsoft’s Update services.

SSH OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

Russian Company Displair Creates Interactive Cold Fog Computer Screens - Video Vault It seems every other day a story breaks that claims to have the next Minority Report-like technology—but this one comes closer than any we've seen so far. Russian company Displair projects images into a cold fog and then uses an infrared camera to capture user movements. As TechCrunch reports, Displair "has only 0.2 seconds lag time between gesture and computer reaction, compared to 0.1 second lag time of Kinect," making it a close competitor to the motion-sensing device for the Xbox 360 as far as accuracy, but going about it in a whole different way. Educational, commercial, and entertainment applications abound, but Medical-Group, in Russia, has already expressed an interest in using the technology for psychotheraputic treatments. Michael del Castillo Upstart Business Journal Technology & Innovation Editor Email Michael earned his BA from Mercer University, along the way excavating a Roman bathhouse with the American School of Archaeology.

The Ultimate Dropbox Toolkit & Guide Dropbox, the app we all (at least many of us) know and love, has a plethora of advanced uses to make life so much easier in managing data between multiple computers and online. We’ve posted several roundups of tips and tricks for Dropbox and now we present our ultimate toolkit and guide. We’ve pulled all our tips and tricks together and added quite a few more. Dropbox? Not familiar with Dropbox? Is Dropbox a web app? Dropbox is software that syncs your files online and across your computers. Dropbox Tour The secondary component of Dropbox is the web app. So what else can you do with Dropbox? Tips & Tricks Dropbox seems to have an ever growing list of fun things you can do with the app, so instead of scrolling through one massive list to find something that interests you, use the list below to skip straight to the section you’d like to read. Basic Tips List Advanced Tips List Basic Tips Invite Others to Get Free Space — [tips list] Invite Friends Local Area Network Sync — [tips list] LAN Sync Mac

How to Obscure Any URL How to Obscure Any URLHow Spammers And Scammers Hide and ConfuseLast Updated Sunday, 13 January 2002 NOTICE: the IP address of this site has changed of late, and I've been unable to set aside time for the rather large task of revising this page. Its numerous links to the old IP address won't work. It'll be updated soon! Since this page was first written in 1999, Internet Explorer and Netscape have both begun dealing with URLs differently, particularly in versions 6 and above. Some of the examples here will no longer work with those browser versions. The URL (Universal Resource Locator) of the page you are now viewing is It is also The weird-looking address above takes advantage of several things many people don't know about the structure of a valid URL. These tricks are known to the spammers and scammers, and they're used freely in unsolicited mails. How It's Done Go ahead and use the links.

Related: