background preloader

Computers

Facebook Twitter

ICSI Netalyzr — Results. Direct TCP access to remote FTP servers (port 21) is allowed.

ICSI Netalyzr — Results

Direct TCP access to remote SSH servers (port 22) is allowed. Direct TCP access to remote SMTP servers (port 25) is prohibited. This means you cannot send email via SMTP to arbitrary mail servers. Such blocking is a common countermeasure against malware abusing infected machines for generating spam. Your ISP likely provides a specific mail server that is permitted. Direct TCP access to remote DNS servers (port 53) is allowed. 9 Things You Need To Do/Install After Installing Ubuntu 9.04. After you have downloaded and installed Ubuntu 9.04, what is next thing you should do?

9 Things You Need To Do/Install After Installing Ubuntu 9.04

Getting Ubuntu onto your hard disk is only the first step. It is still in the raw and unpolished state. Pinguy OS. Scorpion Technology: Purchase Computers: Computer Hardware & Software Systems in Australia from Scorpion Technology - Scorpion Technology. Trim Slice: a $250 Tegra 2 dual-core ARM Cortex-A9 PC – Computer Chips & Hardware Technology.

New paltforms like Nvidia’s Tegra 2 are allowing for some very powerful tablets to appear on the market, usually running the Android OS. But Compulab has decided to use Nvidia’s platform to create a tiny, feature-packed desktop PC instead. The Trim Slice is the smallest nettop I believe I have ever seen measuring just 130 x 95 x 15mm.

Designer Laptop Bags: 30 Stylish Laptop Bags. There are many designer laptop bags available in the market today and all you have to do is just go out there and get the right one to suit your personality, whether it be a fashionably chic one, a funky functional one or plain classic styled one.

Designer Laptop Bags: 30 Stylish Laptop Bags

Just like everything else you carry, a laptop bag also says a lot about your personality. Here are 30 designer laptop bags you can choose from. 1. My Document Laptop Sleeve. Teach Parents Tech. The animated guide to Building a PC. Learn to build a PC from scratch with... Upgrading through every version of Windows. Old Spice Voicemail Message Generator. How To Do A WiFi Antenna Hack (Connecting Your Computer) Why pay $30 for an extender antenna for your router or PC card when you can make the same thing for about a nickel?

How To Do A WiFi Antenna Hack (Connecting Your Computer)

Watch the video and see for yourself. It works! Step 1: The Thinking Behind It I wanted to see for myself the difference between a standard wireless antenna and one of those thirty dollar add on extender antennas by prying the rubber tips off each with a small screw driver. The only difference was the length and configuration of the wire inside. PirateBox DIY - David Darts Wiki. How to make a Sawed-off USB Key. Holy crap– somebody just went and TORE MY FREAKING USB CABLE IN HALF while it was still attached to my laptop!!!

How to make a Sawed-off USB Key

No– wait– sorry. That’s just my USB drive. My bad. Never mind. The 101 Most Useful Websites on the Internet. Here are the most useful websites on the Internet that will make you smarter, increase productivity and help you learn new skills. These incredibly useful websites solve at least one problem really well. Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware. Please note that this document is quite dated (last updated in 2008).

Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware.

Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!) , malware and other questionable code. Berkeley Computer Science Lecture. Linux Shell Scripting Tutorial - A Beginner's handbook. Www.iana.org/assignments/port-numbers. Last Updated Expert(s) TCP/UDP: Joe Touch; Eliot Lear, Allison Mankin, Markku Kojo, Kumiko Ono, Martin Stiemerling, Lars Eggert, Alexey Melnikov, Wes Eddy, Alexander Zimmermann, Brian Trammell, and Jana Iyengar SCTP: Allison Mankin and Michael Tuexen DCCP: Eddie Kohler and Yoshifumi Nishida Reference Note.

www.iana.org/assignments/port-numbers

10 Cool Nmap Tricks and Techniques « UrFix's Blog. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing.

10 Cool Nmap Tricks and Techniques « UrFix's Blog

Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection. How to Make Your Own Touchscreen Heads Up Display. Motion Detection Is an Effective, Dead Simple Security Camera App. Elder Scrolls V: Skyrim: Perks, random quests, BEARDS!- Destructoid. 4d00a959a6a17hive.png (800×1600) Random internet images (786 of 805) Web Hosting High - Best Web Hosting - Web Hosting Ratings, Reviews & Guides. The Open Internet: A Case for Net Neutrality.

Whisper Bot - Send Secure Notes... Simply! Access Any Website Or Forum Without Registering. Visit any forum or website to find something useful and they will ask you to register.

Access Any Website Or Forum Without Registering

Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. How Secure Is My Password?