False Bottom Secret Compartment
15 Best Free Video Editing Software Windows Users Should...
this list presents best video editing software for free to use, windows users should try these software for edit and manipulate videos according to the requirement.
Zimmermann Telegram - Wikipedia, the free encyclopedia
The (or ) was a 1917 diplomatic proposal from the to to make war against the United States. The proposal was intercepted and decoded by British intelligence. Revelation of the contents outraged American public opinion and helped generate support f...
Gmail on Home Linux Boxes using Postfix and Fetchmail
xkcd: Password Strength
Search comic titles and transcripts:
A Mini-Course in Cryptography
Dive Into HTML5
ive Into elaborates on a hand-picked selection of features from the HTML5 specification and other fine standards. We encourage you to — Mark Pilgrim's artfully titled "HTML5: Up Running" — published on paper by O'Reilly, under the Google Press imp...
The 50 Best Free Educational Apps from Google Play
Don't look now, iPhone Kool-Aid drinkers, but . iTunes had a good run, but now is the time of Google Play, Android's home for more than 600,000 apps. To help ease the transition back to school, we've combed through the pile to find the best education...
How to Encrypt Your Internet Traffic
This is the coolest trick I learned while working at Blinkx. At the time, our management really hated when we go on any type of instant messaging applicati
The Restart Page - Free unlimited rebooting experience from...
Free unlimited rebooting experience from vintage operating systems
Best Practices for Firing A Network Security Administrator...
Want to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure ...
Oh God, Here Come the Private Security Drones
It was inevitable. Drones are in ever-wider use by the military, and some day they might deliver you food, but it looks like they'll also be the private, flying-camera spies for private companies too.
Dan Rodney's List of Mac OS X Keyboard Shortcuts & Keystrokes...
Your place for good, concise, Mac keystrokes, tips and tricks.
How to Secure SSH with Google Authenticator's Two-Factor...
Want to secure your SSH server with easy-to-use two-factor authentication? Google provides the necessary software to integrate Google Authenticator's time-based one-time password (TOTP) system with your SSH server. You'll have to enter the code from ...
Index of /~zeph/4261/handouts
Linux Command Line Cheat Sheet
Linux Command Line Cheat Sheet from DaveChild. A cheat sheet of the commands I use most for Linux.
Hacker's Essentials Kit
How to create your own free computer forensics kit on a...
103 Free Security Apps for Mac, Windows and Linux
Password Secrets of Popular Windows Applications
SecurityXploded is an Infosec Research portal offering more than 80, FREE Security & Password Recovery Tools, latest Research Articles and FREE Training on Reversing/Malware Analysis
Free Diagnostic Tools
Wormly has a few useful, simple, free tools to make your sysadmin life a bit easier. Including: Web server security scan, SMTP, POP3, FTP testing and Remote Ping.
How tech companies are interconnected
Sarah Kessler and Nick Sigler examine the . I think this might be the beginnings of a tech version of Six Degrees of Kevin Bacon.
Probably the Best Free Security List in the World
Subscribe to our or enter your email address below to get the feed delivered to you by email:
The Playfair cipher is a digraph substitution cipher. It employs a table where one letter of the alphabet is omitted, and the letters are arranged in a 5x5 grid. Typically, the J is removed from the alphabet and an I takes its place in the text tha...
Secure crypto-algorithm wins gold-standard status
The Keccak algorithm has won the SHA-3 cryptography contest – but existing techniques appear sound and may not need replacing
PARIS - panorama | © gillesvidal - photographe
gilles vidal - photographe
Infographic: Get More Out Of Google
Posted 11/23/11 in
HowStuffWorks "The Basics of C Programming"
A computer program is the key to the digital city: If you know the language, you can get a computer to do almost anything you want. Learn how to write computer programs in C.
Creating a lighter fingerprint with a more intricate word-based cipher
Proyectos de alumnos de la Universidad Panamericana.
960 Grid System
The 960 Grid System is an effort to streamline web development workflow.
PHP Programming Tutorials and Reference Guide
What percentage of today's web development workforce is female?
Free Website Builder
IM-Creator is a new way to create your website: choose a design, insert your content and publish it to the world - all in one simple, clear and seamless process.
mini-itx.com - projects - mini-itx cluster
Full alphabetical archive on right hand side of page...
TCP/IP Protocol Sequence Diagrams
The TCP/IP Guide - The TCP/IP Guide: Introduction and "Guide...
Mikengreg Games Co. | Solipskier
We're Mike & Greg and we make games. Stay awhile and give us a high-five.
Exoskeleton | Berkeley Robotics & Human Engineering Laboratory...
Math, Physics, and Engineering Applets
If you don't have Java, get the .
AN ENGINEER WITH TOO MUCH TIME ON HIS HANDS
50 amazing MacBook decals that you can buy online
Blog of Francesco Mugnai
Jobs and Wozniak with a Blue Box
Postfix Admin - Web based administration interface
Postfix -- the Sendmail Replacement
Nice and Free CSS Templates
polyphonic mpeg ringing ringtone video download mobile phone games
CSS Cheat Sheet
PDF Encryption Tool - protect your pdf files easily with...
Word Processor - Spreadsheet - Database - Download (alternative...
Build a Mobile and Desktop-Friendly Application in Django...
Chris Shiflett ▪ SQL Injection
Chris Shiflett ▪ Foiling Cross-Site Attacks
DNS Best Practices, Network Protections, and Attack Identification...
This white paper provides information on general best practices, network protections, and attack identification techniques that operators and administrators can use for implementations of the Domain Name System (DNS) protocol.
Master the Google Operands - Search Like a God & Save Time...
The internet, a network spanning the globe. Today around 20% of the world's population is connected. That's over 1.4 billion people, a number with ten digits and it's growing. Imagine each of these individuals would contribute only one sentence per d...
HTG Explains: What is Encryption and How Does It Work?
Encryption has a long history dating back to when the ancient Greeks and Romans sent secret messages by substituting letters only decipherable with a secret key. Join us for a quick history lesson and learn more about how encryption works.
GNU Privacy Guard - Wikipedia, the free encyclopedia
BackTrack Linux - Penetration Testing Distribution
Penetration Testing and Security Auditing Linux Distribution
167. Kryptos - The Unsolvable Sculpture
Kryptos is a sculpture outside of the CIA headquarters in Virginia, America. It consists of four copper panels each of which is covered in code. Letters which spell out nonsense, until you figure o...
Secret bookshelf door. Motorized. electronic lock
Here is the start of my secret bookshelf door which leads into my basement. It will have a motor which automatically opens and closes the shelves. There will...
Secret Knock Detecting Lock
Unlock your door with a secret knock. More information, source and schematics at http://grathio.com
How to create a self-signed Certificate
The First Few Milliseconds of an HTTPS Connection
What exactly happens when an HTTPS connection is established? This article analyzes the data exchanged between the browser and the server, down to the byte, in order to set up a secured connection.
CABINET // How to Make Anything Signify Anything
Cabinet Magazine a quarterly of Art and Culture
DTerm: A command line anywhere and everywhere
Current local time in San Francisco
SparkleShare - Self hosted, instant, secure file sync
SparkleShare creates a special folder on your computer in which projects are kept. All projects are automatically synced to their respective hosts (you can have multiple projects connected to different hosts) and to your team's SparkleShare folders w...
Smoothboard 2 | Smoothboard.net - The Wiimote Whiteboard...
Linux Compose Key | Derek Sivers
Learning the shell - Lesson 6: I/O Redirection
Learn the Linux command line
NameChecklist - Find your name the easy way!
Find your name the easy way! Use namechecklist to check if your brandname, username, domain and vanity url are still available on the worldwide web.
Screws Small Encyclopedia Sometimes ... - justpaste.it
Sometimes You do not know, what screw you need to turn this piece of furniture. That is why this little encyclopedia was created.
Invent Your Own Computer Games with Python
Invent Your Own Computer Games with Python is a free ebook programming tutorial for the Python programming language. Learn how to program by making fun games!
Advanced Bash-Scripting Guide
30 Aug 2011
A Very Quick Comparison of Popular Languages for Teaching...
"Hello World" seemed a bit too trivial, so I decided on the relatively simple task of reading two numbers from the user, adding them together and printing out the result. My interest was
Mars Science Laboratory: Send Your Name to Mars
Mars Science Laboratory the next rover to explore the planet mars - Send Your Name to Mars