Free Encryption / Cryptographic Libraries and Source Code...
Free encryption / cryptographic source code, free encryption libraries, free software - add security to your application
5 YouTube Channels Each IT Expert Must Know
I'm sure you will find something useful in these videos. A good idea is to subscribe to these channels and once a day/week check the subscribtion tab to update your skills and knowledge.
Learn to Code from Scratch
Male Logic (8 pics) ~ News Forage
10 code snippets for PHP developers « The html blog
The web sandbox of Asvin Balloo
UNIX tips: Learn 10 good UNIX usage habits
By clicking , you agree to the .
This Speaks to me on a Spiritual Level - Imgur
5 Coding Challenges to Help You Train Your Brain
HowStuffWorks "How to Make a Million Dollars"
Thanks to inflation, there are more millionaires today than ever before. Find out exactly what makes a person a millionaire.
Best Resources to Start Learning Android Programming
Fiction Writers Character Chart to help authors to get a better grip on building characters for their novels.
This Is The Second Best Sandwich Ever Made
This is possibly the best sandwich ever - part 2
Pork Chops & Chicken: Bad Ass Red Sangria
2 Bottles of Cabernet Savignon (the $5.99 el cheapo kind. I also try NOT to use blends like cab/merlot blends ect.) 1 orange sliced 1 lemon sliced 1 lime sliced 1 apple peeled, cored, and sliced or diced 2 cups of apple juice 1 1/3 cups of cranberry ...
15 Secret Bars You Need To Visit
Prohibition is long over, but the spirit of the 1920s has been awakened in recent years thanks to the growing number of so-called "secret" bars in major cities across the country. Many of these drinking establishments, while not technic...
Wine Flavor Visualization
What is the relationship between wine varieties and flavor components? This visualization attempts to show the strength of these relationships. I culled descriptive flavor words from over 5,000 published wine tasting notes written between 1995-2000 i...
Best Steak Marinade in Existence
Print - 110 Predictions For the Next 110 Years
How to Order Wine Like a Sommelier
10 Awesome (White) Wines under $20 - A Beautiful Mess
Heyyyoo! My name is Katherine. I'm Trey's big sister. Do you ever use made up words? My brother used to be a grammar snob in college and would make fun of me for it a lot. "Heyyyoo" is one of...
Top 10 Ways to Break Into and Out of Almost Anything
Whether you're stuck inside and need to break out or you've found locked outside and need to get in, having the key or password is rarely your only option.
Alan Friedman/ Solar Nirvana / 6 November 2011
The 34 Simple Two-Ingredient Recipes
Death By Oreo Cupcakes
They are probably the best Oreo cakes I have ever tried. A lot of cake's that I have experimented with before are like a vanilla cake with bits of Ore...
10+ extremely useful PHP classes
NMNH - Virtual Tour
Old PC Games - homepage
Welcome to . You'll find here hundreds of PC game downloads of miscellaneous genres. Please browse the games below, or use our fulltext search.
Why Nikola Tesla was the greatest geek who ever lived
An ode to the father of the electric age.
HERE IS TODAY
How to compile the Linux kernel
Do you want to remove bloat from your Linux installation? Are you looking to enable extra features that aren't provided by your distro? Fancy trying some of the cutting-edge patches doing the rounds? You'll need to recompile your kernel, and while it...
The Linux Kernel Module Programming Guide
© 2001 Peter Jay Salzman
Draw a Stickman
Draw a stickman and watch him come to life!
Invent Your Own Computer Games with Python
Invent Your Own Computer Games with Python is a free ebook programming tutorial for the Python programming language. Learn how to program by making fun games!
Beef Stew with Red Wine, Root Vegetables and Garlic Bread...
Beef Stew with Red Wine, Root Vegetables and Garlic Bread - The Huffington Post
How can I know if my computer is infected? 10 signs of infection...
Running Spotify in Linux using Wine under a separate user...
How to run Windows applications in Linux, with Wine running under a user account that doesn't have access to your personal files and folders.
Virutal Honeynet: Deploying Honeywall using VMware
Hacking Email: 99 Email Security and Productivity Tips
Everyday, and some not everyday tips, on how you can keep your email safe and secure.
How to create your own free computer forensics kit on a...
How to Recover the Product Key from an Unbootable Windows...
Index of /content/downloads/pdf
Without a Trace: Turn Your Flash Drive into a Portable Privacy...
Whether you're trying to increase your security at an internet café, tunnel your way to your home computer from your cubicle, or leave no trace on your friend's borrowed computer, a flash drive turned portable privacy toolkit is invaluable. Photo by ...
Panda Cloud Antivirus - The best free antivirus and the...
Panda Cloud Antivirus Free Edition is the best free antivirus. Download free antivirus real-time protection against viruses, spyware, adware, rootkits and other types of Internet and identity theft threats.
The Open Organisation Of Lockpickers :: Meetings
#3038363 - Pastie
Pastie now if line-wrap is a bad or good idea.
Automate backups on Linux
Six Deadly Security Blunders Businesses Make
Small, subtle mistakes can lead to big security breaches
SQL Query Tool, SQL Editor and Database Development Tool for SQL Server, Oracle and Sybase.
If historical events had Facebook updates...
How to bypass strict firewalls on public wifi hotspots and...
A tutorial explaining how to bypass firewalls, for instance at the office, in public places or wifi hotspots, using a SOCKS server or tsocks to tunnel everything through SSH, on Linux Ubuntu
Knoword - Expand your vocabulary
Knoword is a quick thinking game that helps boost vocabulary, spelling, speed of thought, as well as increasing analytical, observational and typing skills.
How to Ditch Big Brother and Disappear Forever
So you've decided you want to drop off the map and leave Big Brother behind. It's harder than ever in our always-connected world, but if you're ready to plan your big vanishing act, here are a few tips to get you started.
Vulnerable Servers - Google Hacking Database
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
Garlic Cheese Mini Biscuits - Red Lobster Knock-off
Oh my Dee they look delish!
International Association for Cryptologic Research
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communica...
how to survive in vi and emacs
this guide is intended for gnu emacs where commands associated with buffer, file and help operations are obtained by clicking the relevant menu bar item with the left mouse button, and selecting the operation from the drop-down menu. also "copy", "c...
Darkest Chocolate Crepe Cake
Get Martha Stewart's Darkest Chocolate Crepe Cake recipe. Also browse hundreds more test kitchen-approved food recipes and cooking tips from Martha Stewart.
The Ultimate Steak Manual
As a consequence of our lacking antlers to sort matters out, man's competitive nature can lead to all manner of attempted besting between friends. One popular method is over a flame. Not by wrestling on a bonfire, but by outdoing your pal in the cook...
HowStuffWorks "How can parts of Canada be 'missing' gravity?"...
For more than 40 years, scientists have tried to figure out what's causing large parts of Canada to be missing gravity. Learn about two theories that may explain the phenomenon.
Ryse | Crytek
You cannot view the contents of this item
Who should be reading this document and why should the average Linux user care about security? Those new to Linux, or unfamiliar with the inherent security issues of connecting a Linux system to large networks like Internet should be reading. is ...
How Hacker News ranking algorithm works - amix.dk
Gravity Probe B - Special & General Relativity Questions...
The relativistic factor is:
the procrastination flowchart - clikr
clikr.co - click the picture and you'll be served with fresh entertainment
six course dinner: Roast Zucchini Soup with Stilton
Linux Kernel Newbies - Linux Kernel Newbies
2009-2012 | SadAndUseless.com | Theme by
theWAREHOUSE web comic
Some women just rave about being pregnant.
Sauced: Homemade Ketchup
Heinz has totally spoiled me. When Erin asked if I'd be interested in starting up this new "Sauced" column, I started racking my brain about what condiment to tackle first. I could think of nothing more fitting, more ubiquitous, than...
Butler Lampson - Computer Security in the Real World
Linphone, open-source voip software
Linphone, Free SIP VOIP client, open-source voip software for Linux, windows, mac, iphone, android. Free sip voip sdk.
DSL was originally developed as an experiment to see how many usable desktop applications can fit inside a 50MB live CD. It was at first just a personal tool/toy. But over time Damn Small Linux grew into a community project with hundreds of develop...
Sweet Potato Gnocchi with Gouda Cheese Sauce
Pin It This morning I was looking at my home page and I realized that there is a lot of orange sweet potato and pumpkin going on. Considering the time of year I think it is very fitting. Maybe I
How do they do IT? eHealth's bleeding edge part 1
Ever since the Federal Government announced its plan to construct a National Broadband Network (NBN) much time and talk has been dedicated to the endless possibilities of the fibre network. In few sectors has this been more the case than healthcare.
Using remote_api with OpenID authentication
Tutorial 4: Make a Game in 60 Minutes
The code in this tutorial illustrates the technique described in the text. A complete code sample for this tutorial is available for you to download, including full source code and any additional supporting files required by the sample.
Using Unix Computers
Infographic: How Hackers Get In and Got In
The WWW Security FAQ
Version 3.1.2, February 4, 2002
Josko Gravner Wines
Josko Gravner's wines taste like no other and his production methods are out of the ordinary. The purity, or perhaps honesty, of these wines is what marks them out.
Secure Shell FAQ Section 1: About Secure Shell
To paraphrase the README file:
Sneaky Apps for Sneaky People
Mudslide and Brownie Trifle
Share and Enjoy:
eSecurity Planet: Internet Security for IT Professionals...
Security buying guides, product reviews, tutorials, news, and analysis for IT leaders in small, midsize, and enterprise organizations.
Command-line PHP? Yes, you can!
By clicking , you agree to the .
Dr. Dobb's | Good stuff for serious developers: Programming...
Software tools and techniques for global software development. Dr. Dobb's features articles, source code, blogs,forums,video tutorials, and audio podcasts, as well as articles from Dr. Dobb's Journal, BYTE.com, C/C++ Users Journal, and Software Devel...
Faster-than-Light Neutrino Puzzle Claimed Solved by Special...
The relativistic motion of clocks on board GPS satellites exactly accounts for the superluminal effect, says physicist.
Linux: Install a million games in one click!
Article about djl and GameStore, game management utilities for Linux a-la Steam Valve in Windows, allowing you to search, browse and install hundreds of Linux games in a single mouse click
Pumpkin Monkey Bread
| | | Filed under ,
Honey Mustard Chicken with Bacon and Mushrooms
Honey Mustard Chicken with Bacon and Mushrooms
Dear blank, please blank: Hilarious.
All of the most hilarious letters on dearblankpleaseblank.com.
Top 10 Ways to Turn Your Retired Gadgetry into the Technology...
With the rapid progression of technology each year, it's easy to accumulate a pile of obsolete gadgets that you just can't bear to get rid of. So don't!
Linuxtracker | The Premier Linux BitTorrent Website
Posted by: on:
Shells and Shell Scripts
A Unix shell is a command language interpreter, the primary purpose of which is to translate command lines typed at a terminal into system actions. The shell itself is a program through which other programs are invoked. Al...