background preloader


Facebook Twitter

ICSI Netalyzr — Results. Direct TCP access to remote FTP servers (port 21) is allowed.

ICSI Netalyzr — Results

Direct TCP access to remote SSH servers (port 22) is allowed. Direct TCP access to remote SMTP servers (port 25) is prohibited. This means you cannot send email via SMTP to arbitrary mail servers. Such blocking is a common countermeasure against malware abusing infected machines for generating spam. Your ISP likely provides a specific mail server that is permitted. Direct TCP access to remote DNS servers (port 53) is allowed. 9 Things You Need To Do/Install After Installing Ubuntu 9.04. After you have downloaded and installed Ubuntu 9.04, what is next thing you should do?

9 Things You Need To Do/Install After Installing Ubuntu 9.04

Getting Ubuntu onto your hard disk is only the first step. Pinguy OS. Scorpion Technology: Purchase Computers: Computer Hardware & Software Systems in Australia from Scorpion Technology - Scorpion Technology. Trim Slice: a $250 Tegra 2 dual-core ARM Cortex-A9 PC – Computer Chips & Hardware Technology. New paltforms like Nvidia’s Tegra 2 are allowing for some very powerful tablets to appear on the market, usually running the Android OS. Designer Laptop Bags: 30 Stylish Laptop Bags. There are many designer laptop bags available in the market today and all you have to do is just go out there and get the right one to suit your personality, whether it be a fashionably chic one, a funky functional one or plain classic styled one.

Designer Laptop Bags: 30 Stylish Laptop Bags

Just like everything else you carry, a laptop bag also says a lot about your personality. Here are 30 designer laptop bags you can choose from. 1. My Document Laptop Sleeve Ever wondered what a gigantic folder icon would look like? 2. This one is a unique designer laptop bag, well designed, with complete laptop protection, premium form-fitting polyurethane construction, original foil-stamped KRINK artistry and a poly-satin interior lining. Teach Parents Tech. The animated guide to Building a PC. Learn to build a PC from scratch with... Upgrading through every version of Windows. Old Spice Voicemail Message Generator. How To Do A WiFi Antenna Hack (Connecting Your Computer)

PirateBox DIY - David Darts Wiki. How to make a Sawed-off USB Key. Holy crap– somebody just went and TORE MY FREAKING USB CABLE IN HALF while it was still attached to my laptop!!!

How to make a Sawed-off USB Key

No– wait– sorry. That’s just my USB drive. My bad. Never mind. (And after the jump, how to make your own.) It’s no secret that there are a lot of strange USB devices out there, particularly flash drives. Despite all that, the picture above is a little surprising– because yes, it’s a working USB flash drive. This is a KingMax 1 GB USB flash drive, one of the smaller varieties out there. The plastic cover is attached only weakly, by a bit of silicone adhesive, and peels off fairly easily to expose the bare printed circuit board of the flash drive.

Allmyapps Windows Application Store for Desktop and Web Apps. The 101 Most Useful Websites on the Internet. Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware. Please note that this document is quite dated (last updated in 2008).

Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware.

Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!) , malware and other questionable code. You can use the Windows Update and Office Update sites to keep your system up-to-date. 3. Note that security holes may be discovered in these programs as well (though probably less frequently), so it's a good idea to check for updates regularly.

Berkeley Computer Science Lecture. Linux Shell Scripting Tutorial - A Beginner's handbook. Last Updated Expert(s) TCP/UDP: Joe Touch; Eliot Lear, Allison Mankin, Markku Kojo, Kumiko Ono, Martin Stiemerling, Lars Eggert, Alexey Melnikov, Wes Eddy, Alexander Zimmermann, Brian Trammell, and Jana Iyengar SCTP: Allison Mankin and Michael Tuexen DCCP: Eddie Kohler and Yoshifumi Nishida Reference Note.

10 Cool Nmap Tricks and Techniques « UrFix's Blog. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing.

10 Cool Nmap Tricks and Techniques « UrFix's Blog

Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection. How to Make Your Own Touchscreen Heads Up Display. Motion Detection Is an Effective, Dead Simple Security Camera App. Elder Scrolls V: Skyrim: Perks, random quests, BEARDS!- Destructoid. 4d00a959a6a17hive.png (800×1600) Random internet images (786 of 805) Web Hosting High - Best Web Hosting - Web Hosting Ratings, Reviews & Guides.

The Open Internet: A Case for Net Neutrality. Whisper Bot - Send Secure Notes... Simply! Access Any Website Or Forum Without Registering. Visit any forum or website to find something useful and they will ask you to register.

Access Any Website Or Forum Without Registering

Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. How Secure Is My Password?