Request Search Results

News: Laying the Foundation pt.3

Having fun with those sentences So now you have about 30-50 sentences sitting in front of you and you've read through them, but don't quite have a feel for how they are supposed to sound. This is very demotivational because if you can't hear the flow of the sentence, you may be afraid that you are learning it incorrectly and that can really be a tough obstacle to get through.

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

How To: Get Your Suspended Google+ Profile Reinstated

Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ account has been suspended, you can appeal the suspension and get your profile reinstated.

News: jDCPU-16

Hello everyone! I'd really love for my implementation to get more popular and become one of the official java implementations of the DCPU. If you could help me out by bug testing or sending me a pull request to add new features, that'd be awesome. Thanks!

Hacker Fundamentals: A Gentle Introduction to How IP Addresses Work

Imagine you're in Paris and you need to get to Versailles. Looking around for directions, you come to a cold realization—you do not speak a lick of French! How are you going to get to Versailles and what happens if there is a detour? It will be a difficult struggle, and you'd probably get lost and eventually fail. This is why it's important to know some of the country's language before taking that trip in the first place.

How To: Send SMS Messages with Python

In this article, I'll show you how to send SMS messages with Python. You'll need Python 2.7 or later, urllib and urllib2. The code basically uses an online text messaging service to "POST" html data, as if a person was entering the data themselves. The uses for something like this are unlimited. For example, I modified the basic code so I would receive a text message letting me know every time someone rang my doorbell. The program could interface with Arduino through a serial port, and send d...

News: Minecraft Seed

So as per request, i found an great seed. Right out of the spawn, there is over 7 ravines right out of the spawn, with iron, coal, gold, and redstone everywhere. This world is pretty good for advanced players wanting to make a legit build

News: Army Admits Re-Education Camp Manual “Not Intended For Public Release”

Fort Leonard Wood Public Affairs director Tiffany Wood has provided the first official response to the shocking U.S. Army document that outlines the implementation of re-education camps, admitting that the manual was “not intended for public release” and claiming that its provisions only apply outside the United States, a contention completely disproved by the language contained in the document itself.

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 4. The fourth in a series of realistic simulation missions was designed to be exactly like a situation you may encounter in the real world. This time, we are told "Fischer's Animal Products is a company that slaughters animals and turns their skin into overpriced products which are then sold to rich bastards! Help animal rights activists increase political awareness by hacking their mailing list."

How To: get free car

Advertisng is the key of selling products. Internet is one of advertising media, So many websites on the internet just making money from the online advertising. In online advertising the one that play an important part is traffic or page rank, the website is not valued by appearance or designing only, nor the cheap or the special products only, but the most have a role is traffic. Eventhough the appearance and your produst on the site is cheap you can't get buyer or visitor with the weak page...

News: FarmVille Haunted House

On your farm Once you get your frame, you will need 8 of each building material (nails, bricks and boards) to build your Haunted House frame. There are 3 stages of expansion for this constructible building.

News: Storage Cellar

More Storage is here for all! It takes up less space than a plot and once you expand it to 500, you can get rid of your other barns if need be and it will hold all 500 items on its own!

News: MIT Student Invents $3 Blood Sucking Plunger That Could Speed Up Healing for Millions

The medical field has known for some time now that negative pressure (re: suction) can drastically speed up wound recovery time. However, the machines that are currently available are quite expensive, and not an option for third world countries. Enter MIT student Danielle Zurovcik. The doctoral student has created a hand-powered suction-healing system that could completely revolutionize first aid in developing nations. Her device goes for only 3 bucks a pop.

How To: Hide your IP address using IP Hider 4.0

IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies.