background preloader

High Yield Checking Account from ING DIRECT USA

High Yield Checking Account from ING DIRECT USA

Shedding Bikes: Programming Culture And Philosophy By Zed A. Shaw I have this hypothetical question I've been using periodically to talk about the relevance of ad hominem in evaluating software: What if Hitler gave you a cheese sandwich? It's a pretty simple question. Most normal folks would turn him down, politely most likely but they'd definitely not eat a sandwich from a guy who used to slowly increase his doses of arsenic. Ok, change this up some more, what if you were walking by and there was a box labeled "Cheese Sandwich" and right under that is a Nazi Swastika. Sure, you might open it, look at it, maybe sniff it, but most normal people won't eat it. Let's go one step further, and say you just find a random sandwich in a clear plastic bag on a table. Instinctively, humans have this sense of avoiding things that will poison them, and that involves using their memories, sense of history, and ability to think ahead to predict what could happen. Let's say I tell you that my software is "language agnostic". P.S.

Discover Credit Cards : Cash Back Credit Cards, Rewards Card, Travel Credit Card Godzilla Haiku Photo 21 Notes Godzilla Haiku turned 4 today!(Source: assets) Photo 83 Notes submitted by Justin Patterson wirewatcher 10 things to do after installing Ubuntu 10.04 Lucid Lynx If you’re going to be installing a freshly minted copy of Ubuntu 10.04 LTS later today or this weekend then the following list of 10 reader submitted post-install must-do’s will help ensure that you’re off to a flying start with your new OS. 1. Run Update Manager Just because you’ve installed the latest version of Ubuntu doesn’t mean that there won’t already be a handful of bug fixes updates or patches waiting for you. Make sure you run the update manager (if it doesn’t update you first) so that you’re benefitting from the latest fixes and features. 2. If you want to use advanced desktop effects such as Compiz (3d Cube, wobbly windows) then you will need to enable the “official” drivers for your graphics card. Ubuntu should automatically detect and alert you that 3D drivers are available. If Ubuntu fails to detect any hardware (do be patient as this isn’t always instant) then you can manually run the hardware configuration tool yourself from the System > Preferences menu. 3. 4. 5. 6. 7. 8.

GNOME Shell: Getting prettier by the day Gnome-Shell’s UI revamp continues apace and the ‘relayout’ version of GNOME-Shell, first shown off at GUADEC earlier this year, is getting ready to land. With it containing so many visual changes MrMars dropped off screenshots of the ‘relayout’ GIT branch in the OMG! Inbox! The ‘Activites’ overlay now looks more akin to Unity’s Dash with categories a-top and icons en-masse below. You can also see that the search button is now placed upper-right and, as with Ubuntu’s Unity, results appear instantaneously. Moving the mouse to the right of the screen invokes buttons to add remove workspaces: With Mutter continuing to improve with each successive update – as mentioned in a previous Gnome-Shell article – a few new visual tricks sit up SHell’s sleeve such as this very pretty Alt+tab effect.

d0z.me: The Evil URL Shortener « Spare Clock Cycles I, like many people, have been closely following a lot of the chaos happening around the recent Wikileaks dump, and was particularly fascinated by the DDoS attacks by activists on either side. One tool specifically caught my eye in the midst of the attacks, however: the JS LOIC. The tool works simply by constantly altering an image file's source location, so that the browser is forced to continuously hammer the targeted server with HTTP requests. As if the JS LOIC concept didn't have serious enough implications on its own, though, researchers from Attack & Defense Labs recently presented a much more effective DoS attack vector at Blackhat Abu Dhabi, which relies on Web Workers and Cross Origin Requests in HTML5. In addition to these DoS worries, I have also been uncomfortable for awhile now about the increasing use of and reliance upon URL shorteners for sharing links. With these issues in mind, I began wondering: what would happen if I mashed them all together? A few final notes:

littleblackbox - Project Hosting on Google Code LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys. A command line utility is included to aid in the identification of devices or network traffic that use these known private keys. Given a public certificate, the utility will search the database to see if it has a corresponding private key; if so, the private key is displayed and can be used for traffic decryption or MITM attacks. Alternatively, it will also display a table of hardware and firmware that is known to use that private key. The utility can obtain a public certificate several different ways: You may give it the path to a public SSL certificate file.

DEFT Linux - Computer Forensics live cd Download CrunchBang Linux 10 "statler" r20101205 Welcome to the download page for CrunchBang Linux Waldorf. Please choose a flavour from below: 32-bit 64-bit This is the download page for the stable branch of CrunchBang. Waldorf is built from Debian Wheezy sources. Debian Wheezy is the current stable branch of Debian and therefore it should provide excellent stability and security. Good luck with your #! ♥ CrunchBang? Help keep the electricity running and servers humming! The CrunchBang project is principally funded by (aka corenominal) and supported by community contributions.

About PlugBot - The PlugBot ~ The PlugBot is a small form factor computer used for Physical Penetration Testing PlugBot is a research project and I plan to release the code for free under GPL license. Please help me fund this project by donating via PayPal! PlugBot is a hardware bot. PlugBot Demo from RedTeam Security on Vimeo. PlugBot Demo: Download & Install Exploit Scripts from RedTeam Security on Vimeo. How do you use it? What's inside? About the Inventor PlugBot was brought to life by security researcher and penetration tester, Jeremiah Talamantes. DISCLAIMER: The researcher, nor any other party involved, does not condone the use of this technology for malicious purposes, such as gaining unauthorized access. Issue scan commands remotely Wireless 802.11b ready Gigabit Ethernet capable 1.2 Ghz processor Linux, Perl, PHP, MySQL on-board Covertly disguised as power adapter Capable of invoking most Linux-based scan apps & scripts Intelligent scan engine Very low wattage use First, you need to get your hands on the PlugBot hardware.

Setting up your own SSL VPN | TheXploit | Security Blog “All I want for Christmas is my own VPN…my own VPN, my own VPN” – Dustin I’ve been wanting to have access to my own secure VPN for quite some time so that when I’m away from home and only have access to insecure networks, I don’t have to use work’s VPN for personal use or worry about someone intercepting my traffic. I looked into a couple paid VPN solutions but none of them seem to guarantee your privacy as far as I’m concerned. I figured my best option was to setup and manage my own. I chose to do all my setup on Ubuntu Linux but you can easily port these instructions to an alternative Linux distribution with relative ease. Just a quick heads up before we dive in. Creating your own SSL VPN using OpenVPN An SSL VPN is generally all you’ll need for a secure VPN solution unless you want to use other devices that don’t support SSL VPNs, like an iPad, iPhone, or iPod Touch (see the second part of the article – coming soon). Start by installing OpenVPN and DNSMasq for local DNS resolution Mac OS X

Related: