
The Freenet Project - /index Some Moral Dilemmas The Trolley Problem, not in Grassian. Suggested by Philippa Foot (1920-2010), daughter of Esther, the daughter of President Grover Cleveland, but of British birth because of her father, William Sidney Bence Bosanquet. A trolley is running out of control down a track. In its path are five people who have been tied to the track by a mad philosopher. This is a classic "right vs. good" dilemma. The Costly Underwater Tunnel Compare: 112 men were killed during the construction of Hoover Dam on the Nevada-Arizona border (the "official" number was 98, but others had died from causes more difficult to identify -- or easier to ignore -- like by carbon monoxide poisoning): The first to die was a surveyor, J.G. with a return to a completely unfamiliar Earth, against what seems to be genuine love for Preston, with a life in what actually are rather comfortable circumstances in the spaceship.
CakePHP: the rapid development php framework. Pages Free Portable Software USB Flash Drive Applications | Pendriveapps The List Blog 10. Why are dogs committing suicide by jumpingoff the Overtoun Bridge? The Overtoun Bridge is an arch bridge located near Milton, Scotland, overthe Overtoun Burn. A burn is a term used to describe a type of streamwhich is smaller than a river. Milton is a village in West Dunbartonshire,which is just on the outskirts of Dumbarton. The Overtoun Bridge hasgained public attention because of the unusually large number of dogs thathave allegedly leaped to their deaths off the bridge. The long leap from the bridge onto the waterfalls of the Overtoun Estatealmost always results in immediate death. There have been a number of theories as to why dogs are choosing to endtheir lives by jumping off the bridge, ranging from the bridge being hauntedto the canines suffering from depression, or even picking up depressed orsuicidal feelings from the bridge. 9. In the 1960s a group a marine biologists planted microphones in the world’soceans to record the songs of blue whales. 8. 7. 6. 5. 4. 3. 2. 1.
10 exceedingly useful Flash tutorials When used well, Flash adds an element of entertainment and interaction that can make your site more enjoyable and intuitive to use, as well as helping to create a strong visual identity. But used badly, it will send your visitors running away. Fortunately, our colleagues over on .net magazine and Computer Arts magazine know how to get the very best from Flash without wasting time and effort. Here are 10 Flash guides from .net and Computer Arts that we reckon will improve a wide range of sites - whether it's a home page hobby or a corporate project. The full tutorials, along with all the support files, are available from the links below. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Now read 10 seriously useful Photoshop tutorials Sign up for the free weekly TechRadar newsletterGet tech news delivered straight to your inbox.
Google Plus: Tips, tricks & how-to's Google Plus is another social network where you post status updates and share photos, just like Facebook — or is it? Actually, Google's latest project combines multiple services that make it more flexible and customizable than its competitors; for example, users can control exactly how their information is shared with features like "Circles," which separate contacts into distinct groups like friends, family and co-workers. While it's currently open to invited users only, it will soon be available to everyone. Described by Google as "real life sharing, re-thought for the web," Google+ makes it easy to tailor your online communication to your own needs and preferences. How to use Google+ If you're familiar with other social network platforms like Facebook, MySpace and Friendster, chances are the Google+ interface will look pretty familiar. Then you get to the fun part: finding your contacts and creating circles. Now, just drag and drop your contacts into each circle. Google+ tips & tricks
Awesome Robo! The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? I am a hacker, enter my world... Mine is a world that begins with school... Damn underachiever. I'm in junior high or high school. Damn kid. I made a discovery today. Damn kid. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. Damn kid. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. Yes, I am a criminal. I am a hacker, and this is my manifesto.
How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. If you want to be a hacker, keep reading.
Crack Password Hashes in Lion – OS X 10.7 This guide will NOT WORK with Mountain Lion 10.8. Please view our new, updated guide for Cracking Passwords in Mac OS X Mountain Lion This guide is an updated version of our extremely popular guide, Decrypt OS X User Account Passwords. The guide has been updated to work with Lion 10.7. Requirements Physical access to the machine. If you need to crack passwords on Tiger, Leopard, or Snow Leopard, please use our tried-and-true Decrypt OS X User Account Passwords guide. Procedure 1. If you don’t have access to an administrator already, you need to acquire root access. If you don’t have admin access, boot the computer into Single-User Mode by holding CMD+S on startup, mount the drive, and type the command: /sbin/mount -uw / Followed by: launchctl load /System/Library/LaunchDaemons/com.apple.opendirectoryd.plist And finally: passwd Then, enter your new root password when prompted twice. restart And hit return/enter. 2. 3. The utility works by extracting the hash from the User Profile, which is located in: