Search on This Topic:   
[ Go to Home | Select a New Topic ]

Page 5 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | > | >> ]   


Keyboard Ninja Score: More about Printer Friendly Send to a Friend Save as PDF

Posted on Wednesday, May 18, 2011 @ 15:34:41 EDT in Computers
by Southern

 Kill Windows with the Blue Screen of Death in 3 Keystrokes

Have you ever wanted to show off your keyboard ninja skills by taking down Windows with just a couple of keystrokes? All you have to do is add one registry key, and then you can impress your friends… or use it to convince people to switch to Linux.

This isn’t a bug, it’s a “feature” in Windows that is designed to let users trigger a crash dump for testing purposes. There’s even a whole Microsoft KB article on the subject.

To enable this feature, open up regedit and then browse down to one of these keys, depending on your keyboard type:

USB Keyboard


PS/2 Keyboard



Now right-click on the right-hand pane and add a new DWORD key named CrashOnCtrlScroll, giving it a value of 1.

Reboot your computer, and when it starts back up you can trigger the Blue Screen of Death by using the following keyboard shortcut:

    Hold down Right Ctrl and hit Scroll Lock twice


To remove this “feature” you can just delete the registry key and then restart your computer again.

Please note that following this article WILL crash your computer… really isn’t very useful, but it’s lots of fun =)




AutoHotkey Score: More about Printer Friendly Send to a Friend Save as PDF

Posted on Monday, May 16, 2011 @ 15:38:32 EDT in Computers
by Southern

AutoHotkey is a free, open-source utility for Windows. With it, you can:

    Automate almost anything by sending keystrokes and mouse clicks. You can write a mouse or keyboard macro by hand or use the macro recorder.
    Create hotkeys for keyboard, joystick, and mouse. Virtually any key, button, or combination can become a hotkey.
    Expand abbreviations as you type them. For example, typing "btw" can automatically produce "by the way".
    Create custom data-entry forms, user interfaces, and menu bars. See GUI for details.
    Remap keys and buttons on your keyboard, joystick, and mouse.
    Respond to signals from hand-held remote controls via the WinLIRC client script.
    Run existing AutoIt v2 scripts and enhance them with new capabilities.
    Convert any script into an EXE file that can be run on computers that don't have AutoHotkey installed.

Getting started might be easier than you think. Check out the quick-start tutorial.




AntiHook™ Score: More about Printer Friendly Send to a Friend Save as PDF

Posted on Monday, May 16, 2011 @ 15:34:15 EDT in Computers
by Southern

The ultimate Host Intrusion Prevention System (HIPS) for protection against Malicious Software including Rootkits

    Exhaustive Realtime Protection - AntiHook detects and stops attacks in real-time, following the rule “prevention is better than cure”.
    Complementary to existing anti-virus, firewall and anti-spyware systems - in fact it even protects them and the operating system!
    No Updates Required - AntiHook utilises advanced behaviour-based technology so no ongoing data definition updates and high subscription fees.
    Zero-Day Protection - Be protected from new and unknown threats even before your anti-virus company responds to new threats and releases updates.




Hide Zip Files inside Image – How to Score: More about Printer Friendly Send to a Friend Save as PDF

Posted on Monday, May 16, 2011 @ 15:29:55 EDT in Computers
by Southern

There are many commercial products available to protect you private data. Files can be encrypted and password protected to maintain its security. Techieportal had done a review on Top 5 Best File Encryption Software. While this form of protection is useful, there are easy techniques to hide your data in plain view.

Files can be hidden as an image. Most users will never know that the image file contains other files hidden within it. This is also a very good way to share files on the internet if the other person knows how to extract the information in the image.

How to Hide Zip files inside Image

Zip files can contain multiple files or folder. So first we zip the files using a software like Winrar or the inbuilt compression tool in Windows. Instructions to zip a file are given at the end of this post.

    Create a new folder
    Place an image (preferably a PNG image) in the folder along with the zip file
    Open command prompt and navigate to the folder in which you placed these filed (eg type cd c: estfolder)
    Type the following copy /b image-file name+ zip-file-name test-file.jpg (replace with appropriate file names)

The test-file.jpg will now be visible in the folder. If you open the file you will only see the image ! The zip file is now hidden inside the image.

To open the files inside this image either open the image with Winrar/Winzip or rename the testfile.jpg to or rar.

How to Zip a file

Create a new folder. Copy the files you want to zip into this folder. Right-click on the folder, select “Send To” and then click on “Compressed Folder”.

TechiePortal: Alfred



Man upgrades Windows 1.0 to Windows 7 [video] Score: More about Printer Friendly Send to a Friend Save as PDF

Posted on Saturday, May 14, 2011 @ 23:47:45 EDT in Computers
by Southern

Tom Warren

Windows 1.0 to Windows 7

Windows 1.0 to Windows 7

One man has captured every install of Windows from 1.0 through to 7 and shared it with the world via YouTube.

The video details install processes and the UI for each version of Windows over the past 25 years and most importantly the upgrade process. The only exception is Windows ME, missing as you can only upgrade to ME or 2000 and not both. The video creator, Andrew Tait, used VMWare to install each version and started by installing MS-DOS 5.0 to prepare for the Windows 1.0 installation. Monkey Island and Doom 2 are both installed to test upgrade compatibility throughout the years.

Microsoft first introduced Windows 1.0 on November 20, 1985. Since the introduction of Windows, the operating system has dominated the personal computer market. Microsoft’s market share worldwide for Windows currently sits at 91%, which is significantly higher than its rivals, Apple and Linux. Windows has seen a number of key changes throughout its life and the video (below) demonstrates the majority of these.

However, it hasn’t been all rosy over the past 25 years. Several run-ins with authorities worldwide have forced Microsoft to un-bundle key components of its operating system such as Internet Explorer and more recently Windows Media Player. A notorious court case with the American Department of Justice, which ended in 2001, saw Microsoft forced to share its systems, APIs source code and records with a specially allocated panel of experts. In the years after 2001 it also saw Microsoft un-bundling Internet Explorer from the Windows shell. Microsoft also got into trouble with the European Commission on several occasions. In 2003 the EU ordered Microsoft to provide a version of Windows without Windows Media Player, labeled Windows N. In January 2009 the EU also forced Microsoft to create a version of Windows without Internet Explorer. The company created the version, known as Windows 7 E, but later scrapped it in favor of a “browser ballot” screen that would allow consumers to pick their preferred browser.

If you’re a Windows fan and have 10 minutes free then check-out the nostalgic video below, thanks to The Next Web for spotting this classic.




An A-Z Index of the Bash command line for Linux Score: More about Printer Friendly Send to a Friend Save as PDF Read More...

Posted on Saturday, April 30, 2011 @ 00:57:10 EDT in Computers
by Southern

  adduser  Add a user to the system
  addgroup Add a group to the system
  alias    Create an alias •
  apropos  Search Help manual pages (man -k)
  apt-get  Search for and install software packages (Debian/Ubuntu)
  aptitude Search for and install software packages (Debian/Ubuntu)
  aspell   Spell Checker
  awk      Find and Replace text, database sort/validate/index
  basename Strip directory and suffix from filenames
  bash     GNU Bourne-Again SHell
  bc       Arbitrary precision calculator language
  bg       Send to background
  break    Exit from a loop •
  builtin  Run a shell builtin
  bzip2    Compress or decompress named file(s)
  cal      Display a calendar
  case     Conditionally perform a command
  cat      Display the contents of a file
  cd       Change Directory
  cfdisk   Partition table manipulator for Linux
  chgrp    Change group ownership
  chmod    Change access permissions
  chown    Change file owner and group
  chroot   Run a command with a different root directory
  chkconfig System services (runlevel)
  cksum    Print CRC checksum and byte counts
  clear    Clear terminal screen
  cmp      Compare two files
  comm     Compare two sorted files line by line
  command  Run a command - ignoring shell functions •
  continue Resume the next iteration of a loop •
  cp       Copy one or more files to another location
  cron     Daemon to execute scheduled commands
  crontab  Schedule a command to run at a later time
  csplit   Split a file into context-determined pieces
  cut      Divide a file into several parts


Page 5 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | > | >> ]   

News ©

Site Menu

null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh

Site Info

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,988,409
  • Today: 426
Server InfoServer Info
  • Oct 20, 2020
  • 03:27 pm EDT


This is the list of NukeSentinel(tm) banned IP addresses.

  • 73.24.98.*
  • 173.213.87.*
  • 98.197.145.*
  • 73.234.87.*
  • 73.109.63.*
  • 71.127.160.*
  • 100.2.118.*
  • 173.187.19.*
  • 65.26.249.*
  • 104.175.249.*
  • 75.163.186.*
  • 70.112.139.*
  • 71.84.5.*
  • 73.91.47.*
  • 68.134.221.*
  • 174.84.236.*
  • 107.3.49.*
  • 96.233.150.*
  • 35.136.109.*
  • 159.242.0.*



Thank you, Navy SEALs



You have been warned!
We have caught 2549 shameful hackers.