The TTY demystified
9 Gadgets You Can Fit In Your Pocket - Impulse Buy
9 Gadgets You Can Fit In your Pocket
100 Amazing Futuristic Design Concepts We Wish Were Real...
Concept designers are also referred to as visual futurists. These concept designs may not be on the market yet, but they can still inspire you to create
Top 10 DIY Projects That Cost Less Than $3
Why pay tons of money for something when you can make it yourself for pennies on the dollar? Here are some of our favorite life hacking DIY projects that'll run you less than the cost of a latte.
PowerUp 3.0 - Smartphone Controlled Paper Airplane
Encrypted email, based in Switzerland.
Corewars - An Introduction to Hostile Programming
10 awesome PHP functions and snippets
37 Data-ish Blogs You Should Know About
Why are free proxies free?
10 Useful Features Hidden in VLC, The Swiss Army Knife of...
There's a good chance you already use the VLC media player. But VLC isn't just a media player — it's a complete Swiss Army Knife for digital videos and music, filled with useful and fun features you haven't found yet.
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli...
Digital Art Gallery - Moltee
Digital art blog showcasing the best Concept art, Motion, Digital paintings, Illustrations, 3d and interfaces from around the web
All commands | commandlinefu.com
USBdriveby - exploiting USB in style
Zero-day exploit lets App Store malware steal OS X and iOS...
ophcrack download. ophcrack 2014-09-03 21:45:12.160000 free download. ophcrack A Windows password cracker based on rainbow tables
Materials - HackerThings
Materials. Products for the discerning hacker.
Running Your Business on Linux (No, You Don't Need Windows)...
Docker Containers: 9 Fundamental Facts - Network Computing...
Netcat - a couple of useful examples
One of the Linux command line tools I had initially under-estimated is netcat or just nc. By default, netcat creates a TCP socket either in listening mode (server socket) or a socket that is used in order to connect to a server (client mode).
Build seven good object-oriented habits in PHP
By clicking , you agree to the .
How to build a router based on Linux
The Ultimate Installation Guide for Kali Linux
Store your most valuable notes in a LockNote. Hide your everyday notes in a safe place. Application and document in one: the mechanism to encrypt and decrypt a ...
JobScheduler to the rescue
coreboot - Wikipedia, the free encyclopedia
NVD - Home
Cool android libraries to speed up your development
Trace a chain of DNS servers back to the source
dnstracer - determines where a given Domain Name Server (DNS) gets its information from for a given hostname, and follows the chain of DNS servers back to the authoritative answer. dnstracer - Kali Linux Git repo Options and Usage: DNSTRACER versi
10 Sublime Text productivity shortcuts - Thibh
Hidden Android Secret Codes & Their Usage
Best Hidden Android Secret Codes
AirSnare - Intrusion Detection Software for Windows
Linux.com :: Four ways to hide information inside image...
The Best Self-Hosted Alternatives to Popular Services
Leaked NSA Documents Reveal How To Hide From The NSA
If you want a truly anonymous life, then maybe it's time you learned about Tor, CSpace and ZRTP. ...
Android-x86 - Porting Android to x86
Android-x86 Open Source Project
In Cybercrime, What's Old Is New Again
16 Secret Hiding Places For Your Valuables
Fingerprints can be reproduced from photos of your hands...
A presentation by Starbug at the 31st Chaos Communications Congress (previously) demonstrated a technique for deriving fingerprints from a couple of photographs of your hands.
Appnr - Get Ubuntu Applications!
Tron v4.3.2 (2014-12-23) (bugfixes; additional SSD checks)...
Photofly, A Free App, Makes 3-D Models Out Of Your Snapshots...
Remember that scene in Mission: Impossible 3 where a spy walks around a bad guy at a party, surreptitiously snapping photos, then uses to make a 3-D mask of the bad guy's face?
Photorealistic 3D Reconstruction of Interiors with Autodesk...
Hiding Your IP Address, Anonymous Internet Surfing HOWTO...
Public proxy free servers list, socks, irc, connect, https, http, cgi proxies to avoid censorship, frequent updates
1000+ open source applications - Open Source Software Directory...
UnixTutorials - Ubuntu tutorials
Angry IP Scanner : Home - IP and Port Scanner Tool for Analyzing...
Angryiber Software - free software for internet, analyzing networks (ip scanner, port scanner), remote administartion and so on
Use Rsync for Daily, Weekly and Full Monthly Backups
Socket.IO: the cross-browser WebSocket for realtime apps....
Socket.IO aims to make realtime apps possible in every browser and mobile device, blurring the differences between the different transport mechanisms
xg - skin
The Lessons | Learning WebGL
Canvas Orbital Trails · CodePen
Click and drag to make more!
Anonymity | Security & Hacking Blog
Default password list
This list contains default Manufacturer passwords for devices (not all devices, but a lot).This list was made for use by System Administrators or other people who have lost their password or for some reason want to know the default password of the de...
How to create your own free computer forensics kit on a...
How to Hack Someones IP Address 2014 - Come to Hack
Defeat web trackers | Security & Hacking Blog
OpenVas - BackTrack Linux
Qink | Free Books
The Ultimate List of Freely Available Programming Books, providing a huge list of e-books for almost any programming language.
How to Audit Your Linux Security With Lynis
Adam Lewis - Visual Effects Artist
The online portfolio of Adam Lewis, digital sculptor and visual effects artist.
How to Encrypt Files on Linux Using GPG, Ccrypt, Bcrypt...
Microsoft Hyperlapse Project Aims to Make First-Person Videos...
Some Cool DIY Raspberry Pi Projects
Change Your Forgotten Windows Password with the Linux System...
SSHGuard - Defend from brute force attacks
Sshguard is a log monitor. It protects networked hosts from the today's widespread brute force attacks against services, most notably SSH. It detects such attacks and blocks the author's address with a firewall rule.
Hack any paid WiFi hotspot in about 30 seconds
Install Unity and create your first scene — Pixelnest...
Get Detailed Information About Particular IP address Connections...
IPv4 subnetting reference explained
Coding rules - Cryptography Coding Standard
Keys are so last century. Hack your door to lock and unlock...
Lifehacker curates tips, tricks, and technology for living better in the digital age.
A first-person engine in 265 lines
pwnat - NAT to NAT client-server communication
10 Best Security Software Tools for Linux
Tips, News, Tutorials, Reviews about Linux, Open Source Software, Ubuntu, Google, Chrome, Android, Apple, Programming, Gadgets, and all things tech.
psad: Linux Detect And Block Port Scan Attacks In Real Time...
Mission Impossible: Hardening Android for Security and Privacy...
How to Set Up a Virtual Private Network (VPN) Using OpenVPN...
DroneBL :: Blog :: Network Bluepill - stealth router-based...
Zscaler Research: Yahoo Ad Server Compromise Recap
Sniffing email passwords with Wireshark
19 ffmpeg commands for all needs
Dead Man's Switch dot Org
Axiis : Data Visualization Framework
Axiis is a Data Visualization Framework for Flex.
Fisheye DistortionChinaIndiaUnited StatesIndonesiaBrazilPakistanBangladeshNigeriaJapanMexicoPhilippinesVietnamGermanyEthiopiaTurkeyCongo,...
With complex graphs, it can be difficult to observe micro and macro features simultaneously. If you zoom in for detail, the graph is too big to view in its entirety. If you zoom out to see the overall structure, small details are lost. techniques al...
Chris.com - ASCII ART - Patterns - Pattern
Image Savant - Genetic Experiments
Emma Alvarez Blog: Top Best 50 Freeware For Design and Developing...
Official website of digital artist and illustrator Emma Alvarez
MyPaint » Features
Converting Regular Images into 3D
The boys at Microsoft Research are smart… I mean really smart, they make simple developers like me, look like extras in (for the US readers its a bit like ). At the they had a number of booths near the restaurant in which they proceeded to blow the...
three.js webgl - particles
Making of Ayasha | 3DTuts - Free Tutorials by 3D Modeling,...
Wi-Foo - The Secrets of Wireless Hacking
OpenRCE: The Open Reverse Code Engineering Community
Writing Buffer Overflow Exploits - a Tutorial for Beginners...
Microjs: Fantastic Micro-Frameworks and Micro-Libraries...
How much library code do you really need — 50K? 100K? 150K? More? How much of that do you really use?
Features | Kdenlive
7 free security tools for Linux
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives.
Must have Bluetooth hacking tools
This is a lis of the essential Bleutooth hacking tools, mostly for the Linux platform, that can be used to search out and hack
linux social engineering
A Wi-Fi virus outbreak? Researchers say it's possible
Memory Protection Feature
Virtualization done easily with VirtualBox
Run virtual machines with the open source VirtualBox