background preloader

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers

Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers
If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number, then these tools are for you. Big String. Browsing Security If you want to browse the Internet in privacy, these tools will help you do just that. Hide My Ass!. Computer Security Using the Internet is a huge open door for people to stick their nose in your business. avast!. Laptop Tracking If someone makes off with your laptop, know how to stop them with these tools. Adeona. Spying on Those Out to Get You If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them. GotVoice. Related:  Hacks

PortableApps.com - Portable software for USB drives Top 5 Websites To Learn How To Hack Like A Pro You might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on. The truth is that what was once a male-dominated community is fast changing into one that includes folks – men and women – from many walks of life, from many countries and with many backgrounds. A recent CNET article about DEFCON makes note of the fact that claims of sexual harassment and unwanted advances are increasing. This isn’t because hackers are getting more obnoxious or offensive, but because more female hackers are entering into the community and trying to find a home there, only to find insulting behavior, and other actions unbecoming of a gentleman. There’s a caveat that I have to share before diving into these sites. #1 – Hacking Tutorial: Tech Tips and Hacking Tricks

Useful and Fun things to do with the Ubuntu Terminal  If you're new here, you may want to subscribe to my RSS feed and if you have questions related to your ubuntu system post question to our forums. Thanks for visiting! Sponsored Link If you want to have fun with ubuntu terminal this is for you Entertainment Watch Star Wars telnet towel.blinkenlights.nl Chat with a bot telnet the-funk.net 7000 Custom ascii text banner See how long your machine has been running uptime To see the arbitrary precision calculator (7^500 is interesting! bc Must enter below code to use the next few sudo apt-get install cowsaySee your fortune fortune Use cowsay (replace “message” with your own text in single quotes) cowsay ‘message' Cowsay your Amarok lyrics dcop amarok player lyrics | cowsay sudo apt-get emacs21 To play ‘snake' emacs21 Once emacs21 opens, hit... Esc>>”X” Type in... snake To play ‘tetris' tetris Useful Show some computer stats lspci curl Check system temperature and battery charge acpi -t See a list of all running processes ps aux date Show a simple calendar cal

How To Permanently Delete Your Facebook Account Looking to permanently delete your Facebook account? Not surprising. Over the years, Facebook has seen its share of controversy in regards to the privacy of its users. It’s hard to say what sparked all the excitement: Rapid growth of its service? Parents growing awareness of the site and how their kids were using it? Whatever the reason, it’s obvious some no longer trust the social giant and I keep hearing the same question over and over again from my readers: “Is it possible to delete my facebook account?” and “I managed to deactivate it so it’s deleted right?” You would think the answer would be fairly straightforward. Personally, I feel Facebook has crossed the line of unethical behavior on this. Facebook Terms of Service Agreement – Section 2 - Sharing Your Content and Information – (updated 10/3/2012) You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application settings. …is still in effect.

Main Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. If you are impatient and want to know how to get started, jump to the Getting Started Tutorial. Aircrack-ng is the next generation of aircrack with lots of new features: More cards/drivers supported More OS and platforms supported WEP dictionary attack Fragmentation attack WPA Migration mode Improved cracking speed Capture with multiple cards Optimizations, other improvements and bug fixing … Note: Check trac for planned and requested features More news... Current version Latest version: 1.2 Beta 3 Zaurus (1.0-dev r830; older than beta2) Changelog Finally properly fixed the buffer overflow. Virtual Machine

How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “? 4.

Apple on Thinking Differently: Apple’s ‘s 1997 ‘Think Different’ Advertising Campaign I decided recently that it’s time to get this blog focused a little more on … helping people think differently. So, I’ve been thinking quite a bit lately about just what exactly it means to “think differently” (and I list 12 ways to think differently below). The meaning of ‘think differently” is not as simple as it sounds! In the middle of thinking about what it means to think differently, I stumbled across Wikipedia’s article on Apple Computer’s 1997 “Think Different” campaign. The “Think Different” campaign was fascinating for several reasons, including that prior to this campaign most computer products were marketed in general computer magazines, but this campaign was a brand campaign that went well beyond the traditional outlets. In addition, there was no product placement in the advertisements. “Here’s to the crazy ones. I have been thinking about 12 different ways that we can think differently. So here they are. 12 different ways to think differently: What do you think?

Over To You: What's The Best Way To Manage Music Across Multiple Systems? Dropbox is one way to sync files across multiple devices and OSes, but is it the best way? Reader Tim Dorcas writes: “With over 100GB of music/samples in my collection, and the fact that I use three different physical systems in two different OSes (Mac OSX and Windows), it is getting harder and harder for me to manage all of this data. I am looking for ideas on how to manage, organise, and sync my music. My current set-up is an iMac at home (as my primary computer), a Windows 7 laptop, a backup Windows 7 laptop, and a NAS for music and sample storage. I can’t be the only one struggling with this – any ideas? Well, Tim, we can ‘t offer you a definitive answer to this, so we’ll give you our suggestion then ask any Digital DJ Tips readers who are managing their music across multiple machines to let us know their thoughts too. However, we’re sure this isn’t the only solution, so as we say if any readers can offer further suggestions or solutions, please do so!

iBypass - The largest, most influential proxy network on the Int

Related:  vickybatsonpoutas