background preloader

Shii.org: Highest quality Internet since 2004

Shii.org: Highest quality Internet since 2004

An Atlas of Cyberspaces This is an atlas of maps and graphic representations of the geographies of the new electronic territories of the Internet, the World-Wide Web and other emerging Cyberspaces. These maps of Cyberspaces - cybermaps - help us visualise and comprehend the new digital landscapes beyond our computer screen, in the wires of the global communications networks and vast online information resources. The cybermaps, like maps of the real-world, help us navigate the new information landscapes, as well being objects of aesthetic interest. Some of the maps you will see in the Atlas of Cyberspaces will appear familiar, using the cartographic conventions of real-world maps, however, many of the maps are much more abstract representations of electronic spaces, using new metrics and grids. For more information on the geographies of the Internet, the Web and Cyberspaces, check out The Geography of Cyberspace Directory. (© Copyright - Martin Dodge, 2007.

Online FAQ The information here is designed to help you make the most from your website. Please read these carefully. If you don't find what you need, our technical support team are waiting to hear from you. Electronic mail How do I access my mail (using POP3)? What can be done to reduce spam? How can I have a mailing list for my site? News Updates Where can I get up-to-the-minute news updates? Domain name registration What domain name(s) should I register for my site? Website authoring Where can I find a guide to website creation? Website uploading How do I upload my web site? Website content Are there any restrictions on what I can publish? Logging on to the server How do I log on to the server? Web scripting and interaction with users What operating system does the server run? Performance and web-site analysis How busy is the server? E-Commerce How can my site take credit card payments? How do I access my mail using POP3? < back to the questions I'm getting a lot of spam. Visit Delysid on Twitter

L’attaque de l’année ! Même dans des situations où on pense que son système de sécurité est infaillible, les hackers font preuve d'une imagination sans limite. Dernier exemple avec la société Netragard qui a pratiqué un audit chez l'un de ses clients, dont le système informatique était hyper sérieux, avec tout un tas de règles très strictes sur l'utilisation des réseaux sociaux, des téléphones, et sur l'accès physique aux ordinateurs. Et pourtant, Netraguard a réussi sans se déplacer à avoir accès à un ordinateur de l'entreprise (et donc à l'intranet et à tout le reste...). Comment ? Grâce à une souris "Cheval de Troie" qui a été modifiée pour contenir un micro contrôleur s'activant 60 secondes après que la souris soit branchée sur l'ordinateur, et capable de "taper" des choses aux clavier... Sans avoir besoin d'Autorun (qui de toute façon était désactivé), le micro controlleur Teensy a alors pu exécuter un malware fait maison, et stockée dans une mémoire flash placée à l'intérieur de la souris.

Telnet BBS Guide - How To Access Telnet BBS Systems If you are new to the process of Telnet and have never accessed a Telnet BBS system before, the following is a mini-tutiorial of how the Telnet process works and how to use a Telnet client. Click here to see a list of Telnet client software Click here to see the Telnet BBS FAQ. How do I access BBS systems on the Internet? Bulletin Board Systems (BBS) have been around long before the Internet. But when BBSes moved to Telnet, this changed. However, there are several FREE third-party Telnet applications you can use to access these systems. Windows XP based Systems If you run Windows XP, Telnet is a built-in application that in most cases is already turned on and ready to go. Command Line Telnet bbsaddresshere (example: telnet bbs.dmine.net)orTelnet (ip address here) (example: telnet 127.0.0.1)There are some BBS systems that do not use the default port (port 23). Accessing Telnet BBSes Via Your Web Browser 1. You can now use the Command Line commands as described above. Mac OS X

Brutforce with ubuntu cluster Botnet TDL4 Botnet TDL4 Cette news m'a fasciné... La société Kaspersky a mis au jour un réseau de botnet du nom de TDL4 (ou TDSS) de plus de 4,5 millions de machines. D'après l'éditeur d'antivirus, TDL4 a véritablement été conçu pour régner en maitre sur ses machines grâce à : Un système d'affiliation qui permet de rémunérer les gens qui installent (volontairement) ce malware sur les machines d'autres personnes (pas vraiment au courant). Bref, un beau petit joujou qui fait mal et qui est réparti dans les pays de la manière suivante : TDL4 est utilisé pour collecter des données personnelles (accès à des serveurs, n° de carte de crédit, vol d'identité...etc) mais aussi pour lancer des attaques Ddos...etc. Pfiou ! [Source] Vous avez aimé cet article ?

Le L∞p HealthMap Open Source, Geo & Health Workshop (#gecohealth) Invalid quantity. Please enter a quantity of 1 or more. The quantity you chose exceeds the quantity available. Please enter your name. Please enter an email address. Please enter a valid email address. Please enter your message or comments. Please enter the code as shown on the image. Please select the date you would like to attend. Please enter a valid email address in the To: field. Please enter a subject for your message. Please enter a message. You can only send this invitations to 10 email addresses at a time. $$$$ is not a properly formatted color. Please limit your message to $$$$ characters. $$$$ is not a valid email address. Please enter a promotional code. Sold Out Pending You have exceeded the time limit and your reservation has been released. The purpose of this time limit is to ensure that registration is available to as many people as possible. This option is not available anymore. Please read and accept the waiver. All fields marked with * are required. US Zipcodes need to be 5 digits. Map

Princeton study: Nighttime images help track disease from the sky Public release date: 8-Dec-2011 [ Print | E-mail Share ] [ Close Window ] Contact: Morgan Kellymgnkelly@princeton.edu 609-258-5729Princeton University Normally used to spot where people live, satellite images of nighttime lights can help keep tabs on the diseases festering among them, too, according to new research. Princeton University-led researchers report in the journal Science Dec. 9 that nighttime-lights imagery presents a new tool for pinpointing disease hotspots in developing nations by revealing the population boom that typically coincides with seasonal epidemics. The team used nighttime images of the three largest cities in the West African nation of Niger to correlate seasonal population growth with the onset of measles epidemics during the country's dry season, roughly from September to May. Migratory populations are notoriously difficult to track, Bharti said, which can amplify the difficulty and complexity of carrying out large-scale vaccinations. [ Print | E-mail

Deep Web Research 2010 Bots, Blogs and News Aggregators is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web. The Deep Web covers somewhere in the vicinity of 1 trillion pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find about 200 billion pages at the present time of this writing. In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others. This Deep Web Research 2010 article is divided into the following sections: ARTICLES, PAPERS, FORUMS, AUDIOS AND VIDEOS (Current and Historical) Metadata?

driven by data

Related: