LifeHacker While I've no qualms about a DIY project that gets you tinkering around, I'd think an easier, possibly more efficient solution would be to just get one of those cassette tapes devices that connect to your player's headphone connection. A 'drawback' is that you'll have to have a wire hanging down from your cassette deck, and you won't be able to just slide your phone/MP3 player back into your pocket or wherever out of the way, but... But some advantages would be you'd be able to use just about any device you wanted. Rather than a binder of CDs, you could get a lot of cheap MP3 players and load your favorite band's discographies onto each, instead of taking up potentially valuable space on your phone's storage. Or you could connect your friends laptop or whatever without having to worry if they have Bluetooth. And also, I'd assume it'd save some battery life. A few have already suggested using an FM transmitter as an alternative...
“Password” Remains Top Password, “Jesus” Cracks the Top 25 People: What are you doing? This is just getting sad now. Remember all of those password leak stories you’ve seen in the last few months? How many? One? It’s time for SplashData‘s annual list of the 25 most-common passwords on the internet. The most common password, as revealed by the study, is “password.” New entries on the top 25 list include “welcome,” “jesus,” “ninja,” “mustang,” and “password1.” Check out the complete list below: 1. password (Unchanged) 2, 123456 (Unchanged) 3. 12345678 (Unchanged) 4. abc123 (Up 1) 5. qwerty (Down 1) 6. monkey (Unchanged) 7. letmein (Up 1) 8. dragon (Up 2) 9. 111111 (Up 3) 10. baseball (Up 1) 11. iloveyou (Up 2) 12. trustno1 (Down 3) 13. 1234567 (Down 6) 14. sunshine (Up 1) 15. master (Down 1) 16. 123123 (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football (Up 5) 21. jesus (New) 22. michael (Up 2) 23. ninja (New) 24. mustang (New) 25. password1 (New) Well, it doesn’t seem to be working. Facepalm.
Smaller Government Centrist Description You want the government a bit smaller overall than what we have not, but not a whole lot smaller. You could get what you want with a nearly equal mix of Democrats and Republican, if they are the correct Democrats and Republicans. A random selection of each leads to bigger government. Be choosy. Or you could add a few Libertarians to that equal mix of Democrats and Republicans. Then again, this year the Libertarians actually have a more moderate than usual presidential ticket, with former Governor Gary Johnson and Judge Jim Gray. And I have a few more options for you below. Political Campaigns, Parties and Organizations Balanced Approaches to Smaller Government Here are some sites that offer some creative ways to cut excess government while protecting and even extending the values that big government currently serves. media. Economics Regardless of your political values, economics is worth knowing...
How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared Ethernet notion. In a shared Ethernet, you can think of all of the computers in a LAN as being plugged into the same wire, and all of the traffic that travels through it can be captured. Everything. For example, assume that your network card picks up a packet from someone else's network. Now, this is an oversimplified version of what really goes on, but I'm trying to illustrate a point. Before we get into grabbing frames and causing mayhem for lulz, we need to explain what a packet is and the concept of a frame. The Open Source Interconnection (OSI) Model The model is divided into seven layers, as shown below. When your computer is receiving data, the contrary process will occur. Layer 1: Physical Layer 2: Datalink $ .
DIY IRL Hacks This New Zealand modder decided to make a touch screen PC for his kitchen so his wife could keep inventory of their food, print out shopping lists, access the web, watch TV and use it as a normal PC. First, he found a cheap touch screen monitor which would form the heart of the device. These screens are used in vending machines and public places in Japan so they are vandal-proof and water-proof which is perfect for the kitchen environment. **Note** This post was first published six months before the iPad was released. For the PC aspect of the project, he decided to build one from scratch. Once he had everything running, he needed a better interface than the standard Windows desktop. On top of that, he added a barcode scanner for groceries and a TV tuner! Similar PC Modding Articles:
100 Websites You Should Know and Use In the spring of 2007, Julius Wiedemann, editor in charge at Taschen GmbH, gave a legendary TED University talk: an ultra-fast-moving ride through the “100 websites you should know and use.” Six years later, it remains one of the most viewed TED blog posts ever. Time for an update? We think so. To see the original list, click here. And now, the original list from 2007, created by Julius Wiedemann, editor in charge at Taschen GmbH.
10 More Conspiracy Theories Mysteries Conspiracy theories – I can’t get enough of them! Fortunately there are so many floating about that we have been able to give you not one, not two, but now three lists of theories that many people believe with all their might. It makes the list because it appears in almost every alien or UFO conspiracy theory ever devised. There are television shows purporting to explain just what goes on there, one even including an interview with “a disgruntled employee,” who is provided with black-out lighting, but no vocal distortion, and who states that “it is a testing ground for experimental aircraft. I considered putting the Aurora Aircraft on this list, but since its existence is tied so closely to Area 51, I use Area 51 as a catch-all of sorts. But the conspiracy theory goes on to claim that humans were unable to come up with these technologies. This one at least seems plausible, as it has nothing to do with science fiction. Yes, you read that right. Every generation, since St.
PhreakVids Cheap GPUs are rendering strong passwords useless Think that your eight-character password consisting of lowercase characters, uppercase characters and a sprinkling of numbers is strong enough to protect you from a brute force attack? Think again! Jon Honeyball writing for PC Pro has a sobering piece on how the modern GPU can be leveraged as a powerful tool against passwords once considered safe from bruteforce attack. Take a cheap GPU (like the Radeon HD 5770) and the free GPU-powered password busting tool called 'ighashgpu' and you have yourself a lean, mean password busting machine. The results are startling. It gets worse. Surely throwing symbols in there keeps you safe, right? What's the solution? [UPDATE: Take a look at this - whitepixel 2 running with 4 x HD 5970 cards (8 x GPUs) capable of 33.1 billion MD5 password hashes/sec.
100777.com | Dedicated to Truthseekers. Cracking WiFi Networks 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down </i>*} 3.