10 More Puzzle Websites to Sharpen Your Programming Skills...
Relaxing rain audio for work, play and sleep
Hacker's Essentials Kit
Codecademy is the easiest way to learn how to code. It's interactive, fun, and you can do it with your friends.
PartyCloud - Mix 20 millions songs !
PartyCloud is powered by the iWebDJ Player and SoundCloud music.
How does anger exist when there is music like this?
Caution: Side effects include whistling and thoughts of summer Listen, then ask yourself if you are happier than before you clicked that triangle. call it part 2... http://8tracks.com/gamble/smiles-are-contagious
Caution: Her clothes WILL fall off
I'm working on a theory that these songs will make a girl's clothes fall off at will. You can thank me later. Music by Massive Attack, The XX, and The Weeknd.
The Hacker Manifesto
by +++The Mentor+++ Written January 8, 1986
Learn to Pick Locks for Fun and an Increased Understanding...
Learning to pick locks is a fun exercise in learning about locking mechanisms, honing a useful skill, and getting a better understanding of how locks work and protect—or fail to protect—you and your stuff. Photo by Lanchongzi. If you've never picked ...
List from: http://reinholdweber.com/?p=3 , just to give credit where credit is due. This information is great, so thanks to the author at http://reinholdweber. If a method can be static, declare it static. Speed improvement is by a factor of 4....
Instructions for Life
Dark alien planet discovered by NASA
Scientists are unsure what causes the planet to be so dark, but they believe it could be 'a chemical we haven't even thought of yet.'
Hack This Site!
HTS costs up to $300 a month to operate. We your help!
Removing an object on a photo with GIMP
Tutorial to remove objects (or people) and restore the portion of the background they hide in a photo with the Resynthesizer plugin.
A Boy And His Atom: The World's Smallest Movie
Coolest Websites and Online Tools 2012
Each year I try to compile a list of my favorite websites and tools to share with friends.
EPIC - EPIC Online Guide to Practical Privacy Tools
The document has moved .
YouTube Playlists for Learning Programming
YouTube Playlists for Learning Programming. C, C++, Java, PHP, MySql, HTML, CSS free courses.
Top 10 Warranty-Voiding Hacks
You can turn some of your best gear into so much more with a few of the right modifications. The problem is, hacking your gadgetry often means voiding your warranty.
Songs you should dream to: You will forget Everything around...
You know this half-dreaming feeling? The only missing ingredient is this mix.
6 Real People With Mind-Blowing Mutant Superpowers
We've all dreamed of having superpowers at some point (today), and these are the rare cases where people actually got them.
Team Hot Wheels - The Yellow Driver's World Record Jump
The Yellow Driver of Team Hot Wheels breaks the world record for distance jump in a four-wheeled vehicle at the Indianapolis 500 on May 29th 2011. Watch as t...
Russian Bus Driver dubbed 'The Punisher' deliberately rams...
Safe Hex - safe computing tips to defend against viruses,...
Safe Hex - safe computing tips to defend against viruses, worms, trojans, malware and other questionable code.
Songza - Listen to Music Curated by Music Experts
Relaxing? Working? Throwing a party? Songza plays the right music for any situation. Songza is 100% free, with no audio ads.
How To Crack A Wi-Fi Network's WPA Password With Reaver
Your Wi-Fi network is your convenient wireless gateway to the internet, and since you're not keen on sharing your connection with any old hoolig...
UPDATED - Using Googles Full Capabilities « XBOX, XBOX...
Here is an updated version of the ‘Using Google's Full Capabilities'. This is basically a master list found on a Russian hacking website. To save you the dangers of going there, we've compiled it here. Enjoy.
When Audi started a war to BMW....
lol is unthinkable
Free online radio
What happened in my birth year?
What happened in
Gadgetsnu 25 Simple Yet Awesome Gadgets and Accessories
You know what they say, "less is more", and these simple (yet awesome) gadgets are the perfect examples. 25. Mini Doughnut Factory 24. Wooden iPhone
14 February 2012. Cryptome has been 100% restored with 70,000 clean files. The Blackhole malware was removed on 12 February 2012.
210 Awesome Open Guitar Chords and How to Use Them
Are you bored of the sound of standard chords? Then, using open guitar chords is a way to pimp up your playing and boring chord progressions. There are thousands of open guitar chords and millions of
Songs to lie on your bed and stare at the ceiling to
The name of the mix pretty much says it all ... try it
Match the arrestee with their alleged crime.
Just click and drag the crimes into the squares beneath each suspect. Then click the submit arrow. NOTE: When this game was originally posted on 7/8/11, only six contestants correctly lined up each de
20 very useful Java code snippets for Java Developers
20 very useful Java code snippets for Java Developers. Java Code Snippets. parse xml in java, string to date, generate json, current method name, string to int, jdbc oracle connection, util.date to sql.date, fast file copy using NIO, thumbnail image,...
Index of /ressources/outils/patator/download
Madeon - Pop Culture Live
Madeon performs Pop Culture. Live in Nantes, France in July 2011.
Top Gear Bravely Tests World's Smallest Car on England's...
CakePHP: the rapid development php framework. Pages
Use code generation and scaffolding features to rapidly build prototypes.
How to fix any computer - The Oatmeal
A guide to fixing any Windows, Mac, or Linux computer
The Future Sounds Like This: 10 Magnificently Modern Musical...
All commands | commandlinefu.com
A repository for the most elegant and useful UNIX commands. Great commands can be shared, discussed and voted on to provide a comprehensive resource for working from the command-line
A beginner's guide to building botnets—with little assembly...
Report: Bing serves up 500% more malware than Google
MIT Guide to Lockpicking@Everything2.com
While the " guide to lockpicking" is reproducible on a " basis", some concern has been expressed on behalf of the MIT ''. See:
Weak security in our daily lives@Everything2.com
So, you know those s with that pad? The one under the driver's side handle? Well, if you look closely you will see that there are really only 5 s, labeled "1/2", "3/4", "5/6", "7/8", "9/0". In an effort to avoid a little confusion, I'm going t...
Top 50 Free Open Source Classes on Computer Science : Comtechtor...
KickJava.com: Java API By Example, From Geeks To Geeks.
Java API By Example, From Geeks To Geeks.
Stumblers Who Like Barn Cars - Now to find someone to perform...
A New York man retired. He wanted to use his retirement money wisely, and decided to buy a home and a few acres in Portugal. The modest farm house had been vacant for 15 years. The owner and his wife both had died and t...
Embed This Infographic
The Last Page of the Internet
Why Linux is better
Find out why Linux is better.
How To Become A Hacker
Â Â Â Â Â Â Â Â
The Best Hacking Tutorial Sites - Learn Legal Hacking
Finding high quality hacking or cracking tutorials can be hard. If you want to find the best legal hacking sites then read on for our comprehensive run-down of free hacking tutorials. I'll tell you where new crackers should go to learn the tricks of ...
Mohawke's Best of the Best Free and Open Source Software...
Mohawke's best of the best free and open source software: Everything you can imagine from free OS X and Windows software, games, and even operating systems.
Ethical Hacking Tutorials
clikr clicking pictures has never been so much fun!
clikr.co - click the picture and you'll be served with fresh entertainment
Interactive Sky Map - WIKISKY.ORG
adrn | galaxy
Chromium OS builds by Hexxeh
Vanilla builds are bleeding edge. They give you the opportunity to see and use the latest and greatest that ChromiumOS has to offer. Weren't one of the lucky ones to receive a Google Chrome Notebook? Vanilla is for you! All this, requires only a 4GB ...
Free login to any site
Free login to any site, on any company,
Computer Stupidities: Operating Systems
Most computer users understand that you need an operating system to use a computer practically, even if it is not clear why. But many users don't.
in Bb 2.0 - a collaborative music/spoken word project
play these together, some or all, start them at any time, in any order.
ThisIsWhyImBroke :: The Internet's Mall
Discover all the coolest stuff you never knew existed on the web. With thousands of reasons to spend every penny you've got, This Is Why I'm Broke features amazing products from the web.
Error Messages - Google Hacking Database
Really retarded error messages that say WAY too much!
TinEye Reverse Image Search
The document has moved .
The most comprehensive Java library for the scientific community.
C programming.com - Learn C and C++ Programming
MINIX 3 is a free, open-source, operating system designed to be highly reliable, flexible, and secure. It is based on a tiny microkernel running in kernel mode with the rest of the operating system running as a collection of iso...
The Restart Page - Free unlimited rebooting experience from...
Free unlimited rebooting experience from vintage operating systems
Gadgetsnu 30 Geeky Gadgets you would love to own
Victorinox Secure Pro USB Drive The un-hackable Victorinox Secure features AES256 technology, together with Victorinox patented unique MKI's Schnuffi
Useful Life Hacks « The Bored Ninja - Fun, Interesting,...
The best content on the web to cure your boredom!
This is the best ever, how a 13 year old tried to hack a...
This is absolutely hilarious. This guy tried to phish for some dudes password via MSN. And it eneded up with him getting pwned. The lesson is, don't phish, i love his end comment. You need to check this out! Greg_ValveOLS: i was just making a joke bu...
Guide To (Mostly) Harmless Hacking
IWS is an online resource that aims to stimulate debate about a range of subjects from information security to information operations and e-commerce.
Hack Attack: Turn your $60 router into a $600 router
Of all the great DIY projects at this year's Maker Faire, the one project that really caught my eye involved converting a regular old $60 router into a powerful, highly configurable $600 router.
Top 10 Ways to Access Blocked Stuff on The Web
The web is a generally free place, but some sites and services want to make it annoying to navigate and enjoy. Stream any video you'd like, see the sites you need, and get at services you thought were down with these tips. Photo by chidorian. 10.
The 50 Free Apps We're Most Thankful For
It's the time of year where we all give thanks, and among many other things, we here at Lifehacker are thankful for all the free apps out there that improve our lives (and the developers that make them!).
Build a Killer Customized Arch Linux Installation (and Learn...
Popular Linux distributions like Ubuntu are great, but they don't always provide the power and customizability you're looking for after you've gotten comfortable with Linux.
50 Open Source Tools to Make Your Life Easier
The open source community is vibrant, continually growing, and just loves to create applications and tools to make lives easier. Here are 50 of our
Stumblers Who Like dd.dynamicdiagrams.com
pointerpointer.com by Moniker
Please hold still while we locate your pointer...
A streaming radio station and mood-based music discovery tool, Ghostly Discovery is a free app for the iPhone and iPod Touch that lets you listen to the Ghostly International and Spectral Sound catalogs (full songs, nothing less) and share your favor...
PirateBox DIY - David Darts Wiki
is a self-contained mobile communication and file sharing device. Inspired by pirate radio and the free culture movement, PirateBox utilizes Free, Libre and Open Source software (FLOSS) to create mobile wireless file sharing networks where users can ...
Using Googles Full Capabilities. « XBOX, XBOX 360, PS2,...
Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack.
How to use Google for Hacking.
The document has moved .
Index of /article/book
6 Awesome Easter Eggs Hidden in Programs You Use Every Day...
How to create your own free computer forensics kit on a...
HOWTO bypass Internet Censorship, a tutorial on getting...
A tutorial on how to bypass Internet Censorship using Proxies, Shells, JAP e.t.c. Different ways to beat the filtering in schools, countries or companies. (blocked ports e.t.c)
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.
Password Secrets of Popular Windows Applications
SecurityXploded is an Infosec Research portal offering more than 80, FREE Security & Password Recovery Tools, latest Research Articles and FREE Training on Reversing/Malware Analysis
How to Crack the Account Password on Any Operating System...
Web World Wide » 50 Free Internet Tools for Tin-Foil Hat...
August 11, 2008 at 10:36 am · Filed under ,
How to Unlock a Computer Without a Password Reset Disk
A locked computer can result in dead-end frustration, potentially costing hundreds of dollars in repair bills. Unlock your computer without the aid of a password-reset disk by accessing the default Administrator account from Safe Mode and unlocking y...
384 manually selected sites about Python Programming Language...
Code Like a Pythonista: Idiomatic Python
PVC Pipe Organ Medley
He used to have two, but now he's an organ donor.
50 Places You Can Learn to Code (for Free) Online
If you're curious about learning a programming language, you're in luck: there's no shortage of resources for learning how to code online.
Become a Programmer, Motherfucker
If you don't know how to code, then you can learn even if you think you can't. Thousands of people have learned programming from these fine books:
Sandboxie - Sandbox software for application isolation and...
Sandboxie - Sandbox security software for Windows. Install and run programs in a virtual sandbox environment without writing to the hard drive.
Enter a phrase to create the password chart:
Understanding iOS passcode security
Despite frequent news to the contrary, passcodes are an excellent way to keep the data on your iOS devices safe with minimal fuss. Here's a bit (or two) on how they work.
Computer Programming Algorithms Directory
Welcome to my computer programming algorithms directory. I am hoping to provide a comprehensive directory of web sites that detail algorithms for computer programming problems. If you know of any web sites that describe an algorithm (or multiple al...