10 Really Easy Ways to Unclog Drains
Wise Bread Picks We all know the warning signs. The sink takes a little longer to drain.
Vote Now! Top Ten Web Hacking Techniques of 2011
Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE]
Batch virus maker tool to create your own viruses
Batch virus maker tool is the one which can create batch viruses.The properties and behaviour of the virus can be set by yourself.Batch programs are essentially sequences of DOS commands that 'type themselves' when the batch file is run.Batch files consist of control elements, internal DOS commands and external commands or programs. With a little ingenuity one can duplicate most of the functions of a general purpose language, but doing any kind of math is tricky, there are no arithmetic commands at all. But most of us use Batch codes for creating viruses.One of the important feature of batch viruses are it cant be detected easily by Antivirus systems. 1.
50 Life Secrets and Tips
Memorize something everyday.Not only will this leave your brain sharp and your memory functioning, you will also have a huge library of quotes to bust out at any moment. Poetry, sayings and philosophies are your best options.Constantly try to reduce your attachment to possessions.Those who are heavy-set with material desires will have a lot of trouble when their things are taken away from them or lost. Possessions do end up owning you, not the other way around. Become a person of minimal needs and you will be much more content.Develop an endless curiosity about this world.Become an explorer and view the world as your jungle. Stop and observe all of the little things as completely unique events.
Smart tips to make life easier
Posted on February 24, 2012 in Humor If you’re new here, you may want to subscribe to our RSS feed or follow us on Facebook or Twitter . Thanks for visiting! Rate this Post
Bicycle Maintenance Guide and Riding Tips
This page was last updated 24 May 2007. I often get asked about bicycle maintenance and repairs, and tips for how to ride efficiently. This little manual is intended as a summary of what I have learned over the years. I am not a professional mechanic.
How To Become A Hacker
Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.
The Evil Access Point!
In this tutorial we are going to create an evil wifi access point! when someone connects to it and uses some services like “pop3,imap,ftp,smtp,http,https,dns” these services will be tested for all the expoits that maches them in the metasploit framework 3 and tries to exploit each one , when one of them successly exploited a session will be opened for a remote prompt or shell depends on the system being attacked. How to configure that evil access point : * Set your card to monitor mode
Awesome Products that Make You Wish You Thought of Them First
Feeding the inner geekness… Loading… A Big Make Attack Bed… Two all beef patties, special sauce, lettuce cheese, pickles onions on a sesame seed bed. A Bubble Wrap Calendar… This is one calendar I would consider fun.
Shoe Lacing Methods
Mathematics tells us that there are more than 2 Trillion ways of feeding a lace through the six pairs of eyelets on an average shoe. This section presents a fairly extensive selection of 50 shoe lacing tutorials. They include traditional and alternative lacing methods that are either widely used, have a particular feature or benefit, or that I just like the look of. 50 Different Ways To Lace Shoes
NEW!!!! Destroy someone's Computer! : OFF Topic
vampyre is right.1. LIL DEVIL IS AN A-HOLE2. THAT IS HACKING WHICH IS ILLEGAL3. LIL DEVIL IS AN A-HOLE X10= ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE ASSHOLE 4.