Wednesday, July 12, 2006

Intricate Steps of How to Hack Into a Computer

Here is a huge map that pretty much shows you all possible ways to gain entrance into a system. From finding exploits and scanning ports to password cracking. It shows all the likely paths you can take to hack into a computer and/or test out it's security.

Go to the source article

Digital Dirt: How to Clean Up Your On-line Profile

According to a 2005 survey of 102 executive recruiters, an executive job-search and networking organization, 75% of recruiters use search engines to uncover information about candidates, and 26% of recruiters have eliminated candidates because of information found on-line. Search engines aren't going away, so here are some tips to help you.

Go to source article

Monday, July 10, 2006

Dead Pixel Tester

Dead Pixel Tester - TFT screens have thousands of pixels, on a 1024x768 monitor, there are three cells for each pixel - one each for red, green, and blue - which amounts to nearly 2.4 million cells (1024x768x 3 = 2,359,296). There's only a slim chance that all of these will be perfect; more likely, some will be stuck on (creating a "bright" defect) or dead (resulting in a "dark" defect). DPT was written to help me check my own screens (Couldn't find one that worked across multiple desktops so had to write my own!) by cycling through the three primary colours used (red,green,blue) and all on (white) and all off (black). Simply select a colour then closely inspect your monitor in each of the primary colours checking for pixels that are not operating as expected. Stuck pixels (always on) are easier to noticed then pixels that are not on due to their size (normally under .5mm). This application is freely distributable for non commercial gain

Go to the source page

software recomended for your use

IE Tweaking software -->> Techlogica IE Customizer

It allows you to enhance and personalize Internet Explorer 6.0 by giving you access to over 75 hidden features in an easy-to-use interface.

harddisk erasing software -->> Eraser

Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS.
Eraser is Free software and its source code is released under GNU General Public License.

Rootkit finder-->> RootKit Hook Analyzer

RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.

Sunday, July 09, 2006

Ten Things to Know Before Buying a Video Card

Selecting a video card upgrade can be an intimidating task. Unless you've kept up with all the GPU announcements and performance reports, it's practically impossible to know which cards are worth buying. Here are 10 things you need to know about video cards before shopping for one.

Go to Source article

Friday, July 07, 2006

The Best Whiteboard on the Internet

This is one of those great tools that the Internet was
born to host! A free white board that you can easily invite people to collaborate with.
With a plethora of features and no membership required.
Great for small businesses, not for profits and just people that want to share
ideas.

Go to the source page

Monday, July 03, 2006

Method to Better Predict Software Vulnerabilities

Researchers at Colorado State University have developed a model to predict with much greater accuracy the number and severity of vulnerabilities that will likely surface in operating systems and in major software applications in the near future

read more