Thanks ever so much Java, for that biz-wide rootkit infection...
Cup of coffee actually a carboy of toxic Kool-Aid
Cup of coffee actually a carboy of toxic Kool-Aid
Open source software goes head to head against its proprietary alternatives.
This post is about the desktop operating systems that fly under the radar of most people. We are definitely not talking about Windows, Mac OS X or Linux, or even BSD or Solaris. There are much less mainstream options out there for the OS-curious. The...
SecurityXploded is an Infosec Research portal offering more than 80, FREE Security & Password Recovery Tools, latest Research Articles and FREE Training on Reversing/Malware Analysis
By now, we should all be aware of the dangers of securing networks with WEP, which I demonstrated before how you could hack in 5 minutes. The advice has always been to use WPA or WPA2 to secure your network, with a long password that couldn't be hack...
CrazyCall is the ultimate tool for making prank calls and fooling your friends. You can change your Caller ID (SPOOF) and Voice (VOICE CHANGER) when calling. So when you call someone he sees on his Caller ID display the number you selected. You...
Inferno applications are written in , a modern, safe, modular, concurrent programming language with C-like syntax. It is more powerful than C but considerably easier to understand and debug than C++ or Java. It is easy to express the concurrency in t...
ServerFiles.com is a software/hardware directory for network administrators and IT professionals that are looking for Windows 2003, 2000, XP or Linux based networking & server software/hardware. It痴 a unique download/software site since it doesn稚 foc...
Lisa Phifer's Wireless CORner Wi-Fi Security Tools Page
Dedicated to Computer Hacking, Hacking Computers, Cellular Hacking, Hacker, Hackers
AMI Bios password Decoder
internet security and hacking white papers
Electronics. Products for the discerning hacker.
14 February 2012. Cryptome has been 100% restored with 70,000 clean files. The Blackhole malware was removed on 12 February 2012.
| | |
Image via CrunchBase
PhreakVidz.com - Videos Related To Phreaking
Working with the new Excel 2007 is now more frustrating than ever when it comes to finding the right commands. Sometimes it seems like part magic and part luck. That's why I've put together the cream of the crop of Excel shortcuts in easy to use...
Part I: Building the Foundation for Ethical Hacking - Introduction to Ethical Hacking -
Whether you're trying to increase your security at an internet café, tunnel your way to your home computer from your cubicle, or leave no trace on your friend's borrowed computer, a flash drive turned portable privacy toolkit is invaluable. Photo by ...
***Updated 8/9/2010*** I wanted to make an easy and secure way to enter my garage. RFID was the best way to unlock my door, even with my hands full I...
Linux Live is a set of shell scripts which allows you to create your own Live Linux from an already installed Linux distribution. The Live system you create will be bootable from CD-ROM or a disk device, for example USB Flash Drive, USB Pen Drive, ...
No, it's not Spiderman's latest web slinging tool but something that's more real world. Like the World Wide Web. The Invisible Web refers to the part of the WWW that's not indexed by the search engines. Most of us think that that search powerhouses l...
This article provides details on blocking Ads, Banners, Parasites, and Hijackers, web bugs, etc. with a custom HOSTS file
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
We provide pre-built images for several open-source operating systems. Please note that: Every image contains the latest software as of the day the image was built. Performing updates is on your ow...
I'm , a software developer.
Please look at to learn how to protect messages in google mail or facebook
Reference site for device drivers, based on , the free software that powers .
Copyright © 2004-2012 by Nicholas Brand http://livecdlist.com
DNSstuff offers DNS tools, Network tools, Email tools, DNS reporting and IP information gathering. Explore monitoring products and free DNS tools at DNSstuff.
OpenPanel is a free open source control panel. It has lots of functionality, an attractive interface and is very user friendly. OpenPanel is a platform for developers. Because it is extremely open and modular it can be utilised to control any process...
Image Buzz.. Discover Interesting Pics On The Web..
Enable and open god mode on windows 8, 7 and vista operating system to access all windows settings at one place.
After running tempalias.com as a fun project for a bit more than a year and a half, I would say that the experiment is now finished and tempalias.com is down for now.
is an developed by Eric Butler for the web browser. The extension uses a to intercept unencrypted from certain websites (such as and ) as the cookies are transmitted over networks, exploiting vulnerabilities. It shows the discovered identities ...
Python tools for penetration testers
This process is automatic. Your browser will redirect to your requested content shortly.
This site uses advanced css techniques
The binary number system (aka base 2) represents values using two symbols, typically 0 and 1. Computers call these bits. A bit is either off (0) or on (1). When arranged in sets of 8 bits (1 byte) 256 values can be represented (0-255). Using an ASCII...
A new, small scheduler patch may give the Linux desktop an incredible speed boost.
Youconvertit - YouTube Downloader, Download online videos with high quality, youtube, megavideo, dailymotion, vimeo, metacafe, photobucket, ehow, ted.
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.
The Exploit Database - Exploits, Shellcode, Vulnerability reports, 0days, remote exploits, local exploits, security articles, tutorials and more.
A tutorial explaining how to bypass firewalls, for instance at the office, in public places or wifi hotspots, using a SOCKS server or tsocks to tunnel everything through SSH, on Linux Ubuntu
MySQL offers much to the database administrator, such as its free, open source, and has great documentation and built-in replication support. But the security admin will point out one thing missing: encryption. Governments are cracking down on data p...
Popular Linux distributions like Ubuntu are great, but they don't always provide the power and customizability you're looking for after you've gotten comfortable with Linux.
You Might remember my post Think of this as part two. here is another list of really useful that you might find handy.
© 1999-2002 by Vivek G. Gite
Subscribe to our or enter your email address below to get the feed delivered to you by email:
Merry Christmas and Happy Holidays to all TGS Readers. To wrap this year, I've collected 50 UNIX / Linux sysadmin related tutorials that we've posted so far.
I'm interested in and write about a wide variety of topics - economics, psychology, marketing, music, etc. I prefer writing long articles to short posts and don't update very often.
CCNA router simulator from certexams.com: simulate and try hands-on and lab exercises with router simulator.
Here is a large list of CDs for various computer repair tasks. In this list, the following types of CD are available for download: Antivirus Boot CDs, Recovery Disks, Hardware Diagnostic Boot CDs, Network Testing/Monitoring, Data Recovery Boot CDs an...
(This article was originally published in Ubuntu Forums but has recently been removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or...
A thorough list of highly recommended, must-have programs, free tools and utilities for Linux desktops, across a wide range of categories
by Stan and Peter Klimas
The OS Files provides comprehensive details on all x86 based operating systems, with news, links, secrets, free downloads, requirements and more!
and get early access to thousands of Microsoft products, such as:
Finding high quality hacking or cracking tutorials can be hard. If you want to find the best legal hacking sites then read on for our comprehensive run-down of free hacking tutorials. I'll tell you where new crackers should go to learn the tricks of ...
Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin
Tips, News, Tutorials, Reviews about Linux, Open Source Software, Ubuntu, Google, Chrome, Android, Apple, Programming, Gadgets, and all things tech.
Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You
Pinguy OS an out-of-the-box working operating system for everyone, not just geeks ;)
The document has moved .