Xamarin - Build mobile apps for iOS, Android, Mac and Windows...
10 Best Sites to Learn How to Code Quickly
Web development has become a very important topic on the web these days and the internet has become the best source for developers to learn more about code. It is a very easy way and a very popular one and the developers can find important informatio...
Handy programs to carry on a USB stick. - Featured software...
Handy programs to carry on a USB stick. - Featured software selections at SnapFiles
Privnote - Send notes that will self-destruct after being...
Share a confidential note via a web link that will self-destruct after it is read by your intended recipient.
Top 10 Incredibly Useful Windows Programs to Have On Hand...
Theremin - A Playable Touch Synthesizer Using Web Audio...
reSRC · List of free programming books
Just Delete Me | A directory of direct links to delete your...
USB password stealer
Nerd Rage - A comic about nerds raging over nerdy things...
Weekly comic exploring comics, video games, movies, toys, and nerd culture with nerds raging over nerdy things. Warning! There will be nerd rage beyond this point.
35 Websites to Send Text Message Online for Free
5 Coding Challenges to Help You Train Your Brain
25 Killer Websites that Make You Cleverer
List of free and open-source software packages
This is a list of : licensed under and . Software that fits the may be more appropriately called ; the in particular objects to their works being referred to as . For more information about the philosophical background for open source software, s...
Top 10 Ways to Break Into and Out of Almost Anything
Whether you're stuck inside and need to break out or you've found locked outside and need to get in, having the key or password is rarely your only option.
Know Every Note on the Guitar in 9 Days
Knowing every note on the guitar is a challenge unique to the instrument. A saxophone has only one way to finger each note, while a guitar usually has a few different strings and four fingers to choose from. String a few notes together and the permut...
115 Useful Websites - Imgur
70 of the Most Useful Websites on the Internet
1. netflixroulette.net — Find something random to watch on Netflix. 2. pintsinthesun.co.uk — Find somewhere to drink a pint in the sun. 3. gfycat.com — Upload your gifs. 4. youconvertit.com — Convert...
Bump Key HOWTO
How to make and use a bump key. Opens nearly any lock in seconds, and much easier to do than lock picking. http://www.tlarson.com/blog
Pinguy OS an out-of-the-box working operating system for everyone, not just geeks ;)
Ethical Hacking Steps
Hacker Rank :: Real World Programming Problems and Competitions...
Crack Windows Passwords
"Talk is cheap. Show me the code. "
Tutorial: Cracking WEP Using Backtrack 3
Standard Disclaimer: This article is provided for informational purposes only. thew0rd.com and its affiliates accept no liability for providing this
Anonymous Releases Their Own Operating System: Anonymous-OS...
Anonymous has just released Anonymous-OS, their own Ubuntu-based operating system that uses the MATE desktop environment. It was created to help che
On Hacking, and How to Hack a Hotel Room
Complete video at: http://fora.tv/2007/09/27/Implementing_Science_Fiction IT security expert Paul "Pablos" Holman discusses the motivations and mindsets behi...
Household Hack Pack!
What can you make with paper clips, rubber bands, a pencil, a keyring, a BB and a screwdriver? Here are 4 great hacks anyone can do! Like it? Tweet it! http:...
Hacking For Dummies Cheat Sheet - For Dummies
Not all hacking is evil. Ethical hacking reveals security weaknesses or flaws in your computing setups. This Cheat Sheet provides you with quick references to tools and tips, and alerts you to commonly hacked targets — information you need to make yo...
Why We Hack: The Benefits of Disobedience
Sometimes disobedience is necessary and good when rules fail us, and it's at the core of why we hack. Hacking is a means of expressing dissatisfaction, confounding the mechanism, and ultimately doing better.
How to make the Elevator Skip all floors and Stop at the...
Here's an awesome hack, especially if you are in a hurry. This hack can make the elevator you are in, to skip all the floors and stop at the floor you want it to, Overriding stops at other floors should only be used in an emergency.
Facebook has become the starting ground for script kiddies and newbie hackers to start in their field of hacking. There are many that promise to compromise with the passwords and thus hacking into the desired facebook accounts within minutes. But ho...
Free Beginner Guitar Lessons - Guitar Noise
Learn how to play guitar with free beginner guitar lessons. More than 600 free lessons including easy guitar songs with guitar tabs and videos.
The Linux Kernel Module Programming Guide
© 2001 Peter Jay Salzman
How to remotely display and control a Linux desktop from...
How to remotely display and control a Linux desktop from a Windows or Linux system using VNC
LinuxCommand.org: Learn the Linux command line. Write shell...
LinuxCommand.org is a web site devoted to helping users of legacy operating systems discover the power of Linux.
The Ethical Hacker Network - Video: Man-in-the-Middle Attack...
The Ethical Hacker Network - Free Online Magazine for the Security Professional, Ethical Hacker Network, Columns, Wilson, Video: Man-in-the-Middle Attack on MySpace with Cain
The document has moved .
Short Film of the Day: Stuxnet: Anatomy of a Computer Virus...
Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely
5 Hacks to Bypass Megavideo 72 minutes Limitation
Update: Here is the latest post on Bypassing Megavideo Time limit Megavideo is one of the most popular video sharing websites on the web currently. The
Cracking Tutorial for Newbies by FlOrEsTaN.
You notice the title. I am a beginner. I have been cracking for about a month or 2, with mixed success. It should be noted therefore, lots of what I say may be incomplete or inaccurate. It is the intention of this tutorial to teach *complete* newbies...
Hackers: How They Get In, How They Got In
Posted by in , on August 23, 2010
Advanced password hacking using Google - easy to learn,...
is your best friend when it comes to . The search engine giant has crawled loads of data which was intended to be protected by webmasters, but is being exploited and mined by smart users using Google dorks. Today I will be discussing some practical d...
SQL Injection - Walking through walls.
While this may be 1-2-3 for web application programmers, it is quite revealing for those not involved with web application security on a daily basis. This is...
Hacking Wireless Networks with Man in the Middle Attacks...
Segment from Hak5 1x03 - Hacking wireless networks with Man in the Middle attacks
Infographic: How Hackers Get In and Got In
The Hacker Manifesto (1986)
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.
Comment "hacker" un distrib' de Coca-Cola, a ne pas utiliser, bien sur ;). Leech By Orko [WFC hack team], from YouTube.
How to Ditch Big Brother and Disappear Forever
So you've decided you want to drop off the map and leave Big Brother behind. It's harder than ever in our always-connected world, but if you're ready to plan your big vanishing act, here are a few tips to get you started.
Guitar/Guitar Chords Song Library - Wikibooks, open books...
The following is a list of notable easy to learn guitar songs from the 1950s to the present. It also contains links to external websites containing different informal chords to songs which represent many different authors' own interpretations of the ...
No CD Cracks For PC Games - The Free Information Society...
How To Hack Wireless
This video shows one method of hacking a wireless WEP connection and gives you some tips on how to better secure your wireless. WEBSITES: http://www.backtrac...
Painfully Computer PranksComputer Hacking
Learn How To Hack from The Basics. Become an Ethical Hacker and Protect Yourself from Malicious Hack Attacks. Get cool PC Tricks, Tips, and more.
Jason Scott - That Awesome Time I Was Sued for Two Billion...
Jason Scott - That Awesome Time I Was Sued for Two Billion Dollars - Video and Slides
Serials & keys - unlocks the world
fogus: 10 Technical Papers Every Programmer Should Read...
Pseudo-random ramblings from Fogus.
Portlandia: Battlestar Galactica
Doug and Claire get pulled into a Battlestar Galactica marathon, from Portlandia season 2, episode 2.
Powerhouse Programs of Linux
STAR WARS ASCIIMATION - Main Page
STAR WARS In a way you've never seen before
HowStuffWorks "How Operating Systems Work"
The operating system controls your computer's tasks and manages system resources to optimize performance. Learn how your operating system works.
How to Restart Windows Without Restarting the Computer
How To Permanently Delete Your Account on Popular Websites...
We all have an increasing number of sites and online services we're members of, and sometimes it all gets a little overwhelming. At times, we just need to delete our memberships to some sites, either in an effort to simplify our lives or just because...
The Brads - Buying a Computer
I'm going to be sharing this with friends. I love linux mint (linuxmint.com)
CSSWARP - CSS Text to Path Generator
CSSWarp is a tool for "warping" HTML text directly in the browser. It will apply text transforms to your CSS in a way that you will have native text in an HTML page that looks as if it were created with Illustrators attach to path tool.
You're given a 3D puzzle consisting of blocks that hold each other together. Take it apart
Speedtest.net Mobile Speed Test
Get Speedtest.net Mobile Speed Test on the App Store. See screenshots and ratings, and read customer reviews.
Top 50 Programming Quotes of All Time
Tips, News, Tutorials, Reviews about Linux, Open Source Software, Ubuntu, Google, Chrome, Android, Apple, Programming, Gadgets, and all things tech.
67 Open Source Replacements for Really Expensive Applications...
Open source software goes head to head against its proprietary alternatives.
20 very useful Java code snippets for Java Developers
20 very useful Java code snippets for Java Developers. Java Code Snippets. parse xml in java, string to date, generate json, current method name, string to int, jdbc oracle connection, util.date to sql.date, fast file copy using NIO, thumbnail image,...
College Stress Infographic
Juggling the demands of higher education and life's other responsibilities can create challenges leading to additional stress for students.
How To Recover Passwords Using Ophcrack LiveCD
Survival Bow Making Instructions
The following bow making instructions will help you construct an effective bow in a relatively short amount of time. A quickie bow is a fast-made bow for immediate use in a survival situation. It is carved from a sapling or branch of a tree.
how to easily delete your online accounts
instructions to delete Skype, Facebook, Windows Live, Yahoo, Twitter, MSN and other accounts
God as Computer Programmer
The requested page was not found on this web server. Due to technical difficulties, Columbia Web pages are temporarily being delivered from a backup server at Akamai Technologies. The page you have requested might not be on this backup server. Ple...
Doom Survival Guide - SAS Survival Manual
The Top 100 Items to Disappear First
The 100 things to disappear first when the SHTF. You could also call this ‘The Top 100 Things You should start stocking up on. Even if you don't need more than 2 (you should always have 2 of everything) each item on this list will be great for barter...
Rules of Gun Fighting - (Marines; Army; Navy; Air Force)...
Zip bomb - Wikipedia, the free encyclopedia
Greatest Engineering Achievements of the Twentieth Century...
Snares And Traps
The logic of Unix's design choice stands out more clearly when we contrast it with other operating systems. Here we will attempt only a design overview; for detailed discussion of the technical features of different operating systems.
404 Error: Now what???
Welcome to Zork (originally Dungeon). This version created 11-MAR-91 (PHP mod 03-AUG-05) There are 54 users playing Zork. Of those, 49 have not logged in. There are 97409 registered adventurers. You are in an open field west of a big white house wi...
"In the Beginning Was The Command Line" - by Neal Stephenson...
About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business took off, and its founders made a lot of money and received the credit the...
In Which I Fix My Girlfriend's Grandparents' WiFi and Am...
Lo, in the twilight days of the second year of the second decade of the third millennium did a great darkness descend over the wireless internet c...
Guide To (Mostly) Harmless Hacking
IWS is an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce.
Download Advanced Linux Programming
Advaned Linux Programming web site
SS64 | Command line reference
Command line reference: Database and Operating Systems.
Hacker's Essentials Kit
Optimizing C and C++ Code
In this article we will explore optimization techniques for C and C++ code developed for Realtime Systems.
The 43 Things Administrators Should Never Do
A list of 43 things which fall under Networking, Configuration, and Security, which administrators should never do.
Validate a Credit Card - SoftwareProjects : Internet Marketing...
Validate a Credit Card Programming
From Windows to Linux
Book of Proof
The OS Files - Your total operating systems portal
The OS Files provides comprehensive details on all x86 based operating systems, with news, links, secrets, free downloads, requirements and more!