Ars Technica System Guide: Bargain Box, April 2014
Since the early 2000s, the Ars System Guides have been helping DIYers to become system-building tweakmeisters. This series is a resource for building computers to match any combination of budget and purpose. The Bargain Box is the most basic box in the hierarchy of Ars System Guide rigs. It has no intent beyond a minimalist goal—creating a solid, affordable, basic computer.
The glider: an Appropriate Hacker Emblem
The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts.
How to Build a Hackintosh
Build a Hackintosh with better performance than a Mac Pro — for half the price. A comprehensive, free, step-by-step guide. Last updated March 2013 with the latest Intel Ivy Bridge processor and motherboard recommendations (which, it’s worth noting, are not available on the out-of-date Mac Pros) and OS X Mountain Lion-native installation instructions. We’ve also refreshed the nVidia GPUs. New in this latest build: Thunderbolt!
Vote Now! Top Ten Web Hacking Techniques of 2011
Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE]
Love Thy Neighbor but hack his Wi-Fi
My neighbor works for a fortune 500 company. I don’t know what he does exactly but he got a 10mbps internet connection attached to his WiFi router. He is mostly not home till late in the evening. so all this bandwidth sits idle all day. such a waste! I did try to connect to this router many times but it kept asking for a password. That son of gun must have it encrypted it. So what should I do, It is a sin to have a 10mbps wireless in range and not hack it.
6 Tips For Improving Hard Drive Performance
I am a compulsive tweeker, and although it has yielded great dividends over the years I actually consider it to be one of my worst qualities because it can also be a real time-waster. I can't tell you how many times I've ended up chasing my own tail trying to squeeze those last few drops of performance out of my machine. So believe me when I tell you that quality information regarding computer performance improvements is hard to find, and I don't even exclude this post from that statement! I've done my best to make sure that the information I present here is both accurate and will actually improve performance but all I can truthfully say is that this is what has worked for me and so I take no responsibility if reading this guide unleashes the song which ends all worlds, but it really shouldn't do that so if it does please let me know. 1.)
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.
#3038363
SOPA Emergency IP list: So if these ass-fucks in DC decide to ruin the internet, here’s how to access your favorite sites in the event of a DNS takedown tumblr.com 174.121.194.34 wikipedia.org 208.80.152.201 # News bbc.co.uk 212.58.241.131 aljazeera.com 198.78.201.252
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.
Cain & Abel
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.
Fiber Optic Connectors Tutorial, Fiber Termination, Fiber Ferrule Polish Types, Fiber Connector Types
>> More Fiber Optic Technical References and Tutorials Digg this Del.icio.us Furl Add to Netscape.com SC fiber optic connector basic structure More than a dozen types of fiber optic connectors have been developed by various manufacturers since 1980s.
How to Hack Someones IP Address 2014 - Come to Hack
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow.
The Best New Features of Adobe Photoshop CS6
Photoshop CS6 has some great new features that designers are sure to love. Upgrading from CS4 or CS5 is simple and straightforward, and the new tools are intuitive, practical, and extremely helpful for a wide variety of design purposes. Adobe put a lot of time and effort into their newest iteration of Photoshop. As a result, there are hundreds of improvements. Rather than trying to list every single one of them, here are a few of the most noteworthy additions in Photoshop CS6. Content Aware Move