Saturday, December 30, 2006
Messages to Spies Are Coded but Not Hidden
Read More
Wednesday, December 20, 2006
Linux Distro Timeline 1991-2006
View The Image
How to digitize cassette tapes
Source Article
Sunday, December 10, 2006
Saturday, December 09, 2006
How Microsoft fights off 100,000 attacks per month...
Read The Article
Wednesday, November 15, 2006
PowerShell: Microsoft releases a new Windows Command Prompt
Read More
Saturday, November 11, 2006
The best software development group in the world
"In the NASA space shuttle"
"As the 120-ton space shuttle sits surrounded by almost 4 million pounds of rocket fuel, exhaling noxious fumes, visibly impatient to defy gravity, its on-board computers take command. Four identical machines, running identical software, pull information from thousands of sensors, make hundreds of milli-second decisions, vote on every decision, check with each other 250 times a second. A fifth computer, with different software, stands by to take control should the other four malfunction.
At T-minus 6.6 seconds, if the pressures, pumps, and temperatures are nominal, the computers give the order to light the shuttle main engines -- each of the three engines firing off precisely 160 milliseconds apart, tons of super-cooled liquid fuel pouring into combustion chambers, the ship rocking on its launch pad, held to the ground only by bolts. As the main engines come to one million pounds of thrust, their exhausts tighten into blue diamonds of flame."
Read More
Thursday, November 09, 2006
Flickr's Desktop Wallpaper Pool
Go There
BitTorrent FAQ and Guide
BitTorrent FAQ Link
Monday, October 23, 2006
Saturday, October 21, 2006
A Complete History of Tux - so Far.
Read More
Sunday, October 15, 2006
How many seconds old are you?
Read More
Thursday, October 05, 2006
How to Shoot Yourself in the Foot in Any Programming Language
Read more
Saturday, September 30, 2006
The Hello World Collection
Go to the source
Friday, September 29, 2006
No, I can't fix your computer!
Go to source
Wednesday, September 20, 2006
Classic Mistakes Enumerated--from book "Rapid Development"
"Some ineffective development practices have been chosen so often, by so many people, with such predictable, bad results that they deserve to be called "classic mistakes." Most of the mistakes have a seductive appeal. Do you need to rescue a project that's behind schedule? Add more people! Do you want to reduce your schedule? Schedule more aggressively! Is one of your key contributors aggravating the rest of the team? Wait until the end of the project to fire him! Do you have a rush project to complete? Take whatever developers are available right now and get started as soon as possible!
Developers, managers, and customers usually have good reasons for making the decisions they do, and the seductive appeal of the classic mistakes is part of the reason these mistakes have been made so often. But because they have been made so many times, their consequences have become easy to predict, and they rarely produce the results that people hope for."
Go to the article source
Saturday, September 16, 2006
"Winkey Ver. 2.8" Great windows Shortcut launcher
Download it
Tuesday, September 12, 2006
C/C++ development with the Eclipse Platform
Go to the source article
BSD Vs. Linux - What you did not Know
Go to the source article
P.S - > the page has bad color scheme. don't tell me i didn't warn you.
Monday, August 21, 2006
Check you website's popularity on social networking websites
Go to the WebSite
How (color blind person) see the world!
"After 26 years I discovered that I see the world in a different way than all others see it!
I'm a successful web designer, and a lot of people were asking me "so, what do you see!!". "
Go to the WebSite
Sunday, August 20, 2006
50 Common Interview Questions
answer them. Read the questions listed; you will also find some
strategy suggestions with it.
Go to the Article
Tuesday, August 01, 2006
"Suspended" Honda F1 Car
read more
Wednesday, July 12, 2006
Intricate Steps of How to Hack Into a Computer
Go to the source article
Digital Dirt: How to Clean Up Your On-line Profile
Go to source article
Monday, July 10, 2006
Dead Pixel Tester
Go to the source page
software recomended for your use
It allows you to enhance and personalize Internet Explorer 6.0 by giving you access to over 75 hidden features in an easy-to-use interface.
harddisk erasing software -->> Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS.
Eraser is Free software and its source code is released under GNU General Public License.
Rootkit finder-->> RootKit Hook Analyzer
RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.
Sunday, July 09, 2006
Ten Things to Know Before Buying a Video Card
Go to Source article
Friday, July 07, 2006
The Best Whiteboard on the Internet
born to host! A free white board that you can easily invite people to collaborate with.
With a plethora of features and no membership required.
Great for small businesses, not for profits and just people that want to share
ideas.
Go to the source page
Monday, July 03, 2006
Method to Better Predict Software Vulnerabilities
read more
Friday, June 30, 2006
Amazingly Detailed Flash Periodic Table
read more
Thursday, June 29, 2006
Google File System - how Google does it
read more
Thursday, June 22, 2006
BumpTop 3D Desktop Prototype
Monday, June 19, 2006
A New Technique to Quickly Erase Hard Drives
read more
Saturday, June 17, 2006
Wednesday, June 07, 2006
Genetic HIV Resistance Deciphered
read more
Tuesday, June 06, 2006
A VC's View of Web 2.0
read more
Security without firewalls: Sensible or silly?
read more
Web 2.0 works for Corporate America
read more
Sunday, June 04, 2006
A great Interactive Periodic Table
read more
Worlds Fastest Growing City (pics)
read more
Thursday, June 01, 2006
TagLines - Visualization of the Evolution of Flickr Tags
read more
Entire community wiped out in 10 months (with before and after pics)
(Via: http://www.mg.co.za/)
read more
Stalkerati.com: A site to "keep track" of your friends!
read more
Impressive Collection of Before and After Photo Retouching Examples
read more
Wednesday, May 31, 2006
A Very Economical Personal Organiser! (Free)
not really great but i thought that u guys should see this
read more
Sunday, May 28, 2006
"Fantastic Four" - video from "youtube'
The Prisoners' Dilemma and Trust
The Prisoners' Dilemma was extensively studied as a model of first strike nuclear ballistic missile strategy. In it, two prisoners are held separately, and both are offered the following deal, `If neither of you confess, you shall both go free. If both of you confess, you will both receive long sentences. If only one of you confesses, that one will receive a short sentence, but the other will receive a doubley long one.'
The thing is, unless I can be certain that you won't confess, the best thing I can do is to confess, and settle for a short or long sentence, but avoiding the doubley long one. You feel the same way. So unless we are both certain (remember the old packer `certainty'), which we cannot be, we both end up with long sentences where we could have got off with none at all.
This result was depressing during the Cold War, when considerable strategic advantage could be gained from a first strike. While the game theorists insisted that a double launch was inevitable, the human race, faced with utter destruction, was able to behave rationally and avoid any kind of nuclear exchange at all, let alone the Spasm predicted by game theory.
P.S - This was taken from www.reciprocality.org/
For any person wishing to carry a mapper's strengths into the workplace, the life and work of the physicist Richard Feynman is worth studying. He told stories. The Spencers' Warbler was a bird identified for him by his father. The name was made up. His father then made up names for the bird in many other languages, and pointed out that young Feynman knew no more than when he started. Rote-learning names of things means nothing. Only looking at what the bird itself is doing tells one anything about it.
He was utterly honest and saw through artificial complexity by always insisting on simplicity and facts. See his personal version of The Challenger Report, contained in his book What Do You Care What Other People Think?.
He used simple, humorous, curious language, filled with little pictures and enthusiasm. His techniques for puncturing pomposity were unrestrained.
His Lectures on Computation have recently been published, and are worth reading, as is everything he ever published, from Six Easy Pieces, to the Red Book Lectures. James Gleik's Genius and the Gribben's Richard Feynman are rewarding biographies.
Get hold of his stuff and read it.
p.s- this article was taken from www.reciprocality.org
Hide In Picture
Hide In Picture (HIP) is a steganography program. It is a program that allows you to "hide" any kind of file inside standard bitmap pictures. The pictures look like normal images, so people will not suspect they contain hidden data.
You can use a password to hide your files, and only those who know the password use are able to retrieve them - without it, people cannot even be sure there is something hidden in the image.
You could use a normal cryptography program to protect secret data from other people. But then, even if they are not able to read it, they will be able to see you are hiding something. With HIP, you can hide your secret data inside an innocent family photograph (which you can then send to other people who know the password) or even your desktop wallpaper, which nobody will ever suspect of.
Saturday, May 27, 2006
15,000 layer Photoshop file.
read more
Things You Didn't Know About Your Body
read more
Friday, May 26, 2006
A Camera You Can Download
Thursday, May 25, 2006
If I'm not doing anything wrong, then you have no cause to watch me.
read more
Flickr group: Soviet Union Propaganda
read more
Repairing Windows XP in Eight Commands
read more
Protecting yourself against the BitTorrent bandits!
read more
Voyager 2 Detects Odd Shape of Solar System's Edge
Voyager 2 could pass beyond the outermost layer of our solar system, called the "termination shock," sometime within the next year, NASA scientists announced at a media teleconference.
The milestone, which comes about a year after Voyager 1's crossing, comes earlier than expected and suggests to scientists that the edge of the shock is about one billion miles closer to the Sun in the southern region of the solar system than in the north.
This implies that the heliosphere, a spherical bubble of charged low-energy particles created by our Sun's solar wind, is irregularly shaped, bulging in the northern hemisphere and pressed inward in the south.
Scientists determined that Voyager 1 was approaching the termination shock when it began detecting charged particles that were being pushed back toward the Sun by charged particles coming from outside our solar system. This occurred when Voyager 1 was about 85 AU from the Sun.
One AU is the distance between the Earth and the Sun, or 93 million miles.
In contrast, Voyager 2 began detecting returning particles while only 76 AU from the Sun.
"This tells us that the shock down where Voyager 2 is must be closer the sun than where Voyager 1 is," said Ed Stone, Voyager project scientist at the California Institute of Technology in Pasadena.
The researchers think that the heliosphere's asymmetry might be due to a weak interstellar magnetic field pressing inward on the southern hemisphere.
"The [magnetic] field is only 1/100,000 of the field on the Earth's surface, but it's over such a large area and pushing on such a faint gas that it can actually push the shock about a billion miles in," Stone explained.
Both Voyager spacecrafts were launched from Cape Canaveral Air Force Station in Florida: Voyager 2 headed out on Aug. 20, 1977, Voyager 1 on Sept. 5, 1977.
Currently, Voyager 1 is about 9.1 billion miles from the Sun and traveling at a speed of 3.6 A U per year while Voyager 2 is about 7.3 billion miles away and moving at about 3.3 AU per year.
Teenager repellent
Mosquito is a teenager repellent - an ultrasonic device that emits a sound only audible to teenagers. It's targeted to business seeking a solution to anti social youths hanging in front of their stores fronts and driving their customers away.
The box is installed in front of a store and emits an unbearable sound, only discernable to those under 20! driving them away.
Apparently, the company has sold thousands of models in the UK, to the complete delight of it's inventor, Howard Stapleton.
In their own words:
It seems that there is a very real medical phenomenon known as presbycusis or age related hearing loss which, according to The Merck Manual of Diagnosis and Therapy, "begins after the age of 20 but is usually significant only in persons over 65". It first affects the highest frequencies (18 to 20 kHz) notably in those who have turned 20 years of age". It is possible to generate a high frequency sound that is audible only to teenagers.
101 of the Top Free Software Utilities to use
read more
14 year old kid becomes millionaire through online scamming
read more
The Curious Incident of Sun in the Night-Time
read more
Tuesday, May 23, 2006
Today's proverb
it means : - Who watches the watchers?
think about it.
Wednesday, April 19, 2006
My Favorite firefox Extensions
- Adblock Filterset.G Updater
- Adblock Plus
- Download Manager Tweak
- dutchblock
- Fasterfox
- Firefox Extension Backup Extension (FEBE)
- FlashGot
- History Menu
- IE View
- MediaPlayerConnectivity
- MR Tech Local Install
- Performancing
- SearchPluginHacks
- ShowIP
- StumbleUpon
- Tab Mix Plus
- VideoDownloader
- WellRounded
- Who Is This Person?