Here is a huge map that pretty much shows you all possible ways to gain entrance into a system. From finding exploits and scanning ports to password cracking. It shows all the likely paths you can take to hack into a computer and/or test out it's security.
Go to the source article
Wednesday, July 12, 2006
Digital Dirt: How to Clean Up Your On-line Profile
According to a 2005 survey of 102 executive recruiters, an executive job-search and networking organization, 75% of recruiters use search engines to uncover information about candidates, and 26% of recruiters have eliminated candidates because of information found on-line. Search engines aren't going away, so here are some tips to help you.
Go to source article
Go to source article
Monday, July 10, 2006
Dead Pixel Tester
Dead Pixel Tester - TFT screens have thousands of pixels, on a 1024x768 monitor, there are three cells for each pixel - one each for red, green, and blue - which amounts to nearly 2.4 million cells (1024x768x 3 = 2,359,296). There's only a slim chance that all of these will be perfect; more likely, some will be stuck on (creating a "bright" defect) or dead (resulting in a "dark" defect). DPT was written to help me check my own screens (Couldn't find one that worked across multiple desktops so had to write my own!) by cycling through the three primary colours used (red,green,blue) and all on (white) and all off (black). Simply select a colour then closely inspect your monitor in each of the primary colours checking for pixels that are not operating as expected. Stuck pixels (always on) are easier to noticed then pixels that are not on due to their size (normally under .5mm). This application is freely distributable for non commercial gain
Go to the source page
Go to the source page
software recomended for your use
IE Tweaking software -->> Techlogica IE Customizer
It allows you to enhance and personalize Internet Explorer 6.0 by giving you access to over 75 hidden features in an easy-to-use interface.
harddisk erasing software -->> Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS.
Eraser is Free software and its source code is released under GNU General Public License.
Rootkit finder-->> RootKit Hook Analyzer
RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.
It allows you to enhance and personalize Internet Explorer 6.0 by giving you access to over 75 hidden features in an easy-to-use interface.
harddisk erasing software -->> Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS.
Eraser is Free software and its source code is released under GNU General Public License.
Rootkit finder-->> RootKit Hook Analyzer
RootKit Hook Analyzer is a security tool which will check if there are any rootkits installed on your computer which hook the kernel system services. Kernel RootKit Hooks are installed modules which intercept the principal system services that all programs and the operating system rely on. If any of these system services are intercepted and modified it means that there is a possibility that the safety of your system is at risk and that spyware, viruses or malware are active.
Sunday, July 09, 2006
Ten Things to Know Before Buying a Video Card
Selecting a video card upgrade can be an intimidating task. Unless you've kept up with all the GPU announcements and performance reports, it's practically impossible to know which cards are worth buying. Here are 10 things you need to know about video cards before shopping for one.
Go to Source article
Go to Source article
Friday, July 07, 2006
The Best Whiteboard on the Internet
This is one of those great tools that the Internet was
born to host! A free white board that you can easily invite people to collaborate with.
With a plethora of features and no membership required.
Great for small businesses, not for profits and just people that want to share
ideas.
Go to the source page
born to host! A free white board that you can easily invite people to collaborate with.
With a plethora of features and no membership required.
Great for small businesses, not for profits and just people that want to share
ideas.
Go to the source page
Monday, July 03, 2006
Method to Better Predict Software Vulnerabilities
Researchers at Colorado State University have developed a model to predict with much greater accuracy the number and severity of vulnerabilities that will likely surface in operating systems and in major software applications in the near future
read more
read more
Subscribe to:
Posts (Atom)