background preloader

Random internet images (786 of 805)

Random internet images (786 of 805)

Live Wallpapers for Android | Android Live Wallpaper | Free Download at LiveWallpapers.org 9 Things You Need To Do/Install After Installing Ubuntu 9.04 After you have downloaded and installed Ubuntu 9.04, what is next thing you should do? Getting Ubuntu onto your hard disk is only the first step. It is still in the raw and unpolished state. To get the best out of it, you really need to configure and customize it to suit your needs. In part 3 of the series, I am going to go through the important things that you need to do after you have got Jaunty up and running. 1) Enable the repositories Every time I do a fresh install of Ubuntu, the first thing that I do is to enable the universe, multiverse, backport and Canonical’s ‘partner’ repositories. Go to System -> Administration -> Synaptic Package Manager. Click on Settings -> Repositories. Checked all the boxes. Go to the Third-Party Software tab. Close the window and press the Reload button at the top left corner to update the repositories. 2) Modifying GRUB menu The GRUB menu is the black screen that you see when you boot up your computer. 3) Configure Firewall 4) Wine 5) Ubuntu-Restricted-extras

Sagaki Keita (click images for detail) Artist Sagaki Keita was born in 1984 and lives and works in Tokyo. His densely composited pen and ink illustrations contain thousands of whimsical characters that are drawn almost completely improvised. I am dumbstruck looking at these and love the wacky juxtaposition of fine art and notebook doodles. See more of his work here, and be sure to click the images above for more detail. Thanks Sagaki for sharing your work with Colossal! How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. filetype:xls inurl:”email.xls” 3. “? 4.

The Alphabetizer puts just about any list in alphabetical order. ... Web Hosting High - Best Web Hosting - Web Hosting Ratings, Reviews & Guides Highly Detailed 3D Characters From Top 3D Artists – 53 Examples | Design your way Most 3d artists’ portfolios have at least a beautiful woman character in it and it will be no surprise that you’ll find a lot of them here. Now besides the curious gazing at these 3d pictures, you must realize the sisyphean work that is being put in these characters, the long hours to create the render and then applying the high quality texture to get incredible the incredible results illustrated below. Rage Captain Jack Sparrow Transient Princess Alien vs Predator Chess Open Green Queen of Blades Helena the archer Spiderman 3 N0X presentation shot The Grey Lady Sewer Dwelling Monster Bruce Willis The Scout The Boxer Astraiin Automaton Morgan Freeman Halowars Hugh Laurie Squidy Cross of iron Stargate tribute Water and human John Locke Darkness L is watching you Queen Space worker Bernadette Wolverine Muriel Cyborg Head Sapphire Unfinished Emperor Hulk Russell Crowe – Gladiator God’s Mastiffs Whispering Wind Way of the Warrior Kat Von 3D

The Document Which Was Formerly Called The MIT Guide to Lockpicking An interesting new lockpicking technique has been making its way around the internet. This technique uses 'bump keys' to open locks in a similar fashion to lockpicking guns but without requiring specialized hardware. You can read about bump keys in this document, and see a news report about them here. --- Presenting ---(drumroll please) I am told that the university which has its' name associated with this document would prefer not to. Which is too bad in a way. My original copy of this file was a text file zipped up with several GIF's. If you prefer, the entire thing is available as a PDF file or the original zipped postscript that the PDF was generated from. Nearly half of all the illustrations appear in chapter nine, so if that one takes a little while for your browser to fetch try to be patient. Otherwise, enjoy the file. - Akira This is how the Guide looked to me (as best I can recreate it) when it was given to me. - Dave Ferret Ted the Tool February 14, 1992 Distribution Contents

The Best Android Apps 10 Cool Nmap Tricks and Techniques « UrFix's Blog Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open

Related: