Skip to main content

Home/ Future of the Web/ Group items tagged to guide

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

A Guide to the Dark Web's Lighter Side | WIRED - 2 views

  •  
    "Diego Patiño That underground warren of anonymous sites known as the dark web has a reputation for nightmarish stuff like child porn and hit men for hire. It does indeed contain those horrors-and a lot of perfectly decent things. Fire up your Tor browser and explore the lighter sides of the dark web with your conscience intact."
Alexandra IcecreamApps

Things to Consider When Buying a Laptop - Icecream Tech Digest - 0 views

  •  
    Modern laptops have plenty of advantages compared to stationary PCs: they are portable, they don’t occupy the whole table in a room thanks to a much smaller size, plus today’s laptops can be as powerful as PCs. Due to constant … Continue reading →
  •  
    Modern laptops have plenty of advantages compared to stationary PCs: they are portable, they don’t occupy the whole table in a room thanks to a much smaller size, plus today’s laptops can be as powerful as PCs. Due to constant … Continue reading →
Paul Merrell

WikiLeaks just dropped the CIA's secret how-to for infecting Windows | Ars Technica - 0 views

  • WikiLeaks has published what it says is another batch of secret hacking manuals belonging to the US Central Intelligence Agency as part of its Vault7 series of leaks. The site is billing Vault7 as the largest publication of intelligence documents ever. Friday's installment includes 27 documents related to "Grasshopper," the codename for a set of software tools used to build customized malware for Windows-based computers. The Grasshopper framework provides building blocks that can be combined in unique ways to suit the requirements of a given surveillance or intelligence operation. The documents are likely to be of interest to potential CIA targets looking for signatures and other signs indicating their Windows systems were hacked. The leak will also prove useful to competing malware developers who want to learn new techniques and best practices. "Grasshopper is a software tool used to build custom installers for target computers running Microsoft Windows operating system," one user guide explained. "An operator uses the Grasshopper builder to construct a custom installation executable."
Gary Edwards

Be Prepared: 5 Android Apps You Must Have in Case of Emergency - Best Android Apps - 2 views

  •  
    "WHEN CALAMITY STRIKES The unpredictable nature of most emergencies often puts us in dangerous situations. But today's technology has come far enough to inform, alert, secure and guide us through dangerous situation, if we happen to face any. Emergencies may come in the form of environmental or circumstantial problems. Therefore it is always better to accompany yourself with at least 5 apps that can help you in case of any emergency. Here is the list of top 5 emergency apps for Android."
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gary Edwards

AJAX, AIR, RIA, Adobe Getting It, David Mendels and "Rich Internet Apps: How ... - 0 views

  • What we saw them do was create a single screen application with rich interactivity on the client, but still all of the benefits of being a web based application (nothing to install, back end connectivity for inventory and other data using XML, use of client side media/animation to guide the user, reachable through any browser, etc.) We really looked at this as the best of web applications and the best of desktop applications: rich connectivity, platform independence, no install, lightweight as well as rich client side logic and interactivity, ability to integrate rich media and communications. But we dropped the baggage of the page based metaphor that basically required a page refresh for everything and got beyond the layout/graphics/media constraints of HTML.
  •  
    Blog from James Governor covers an exchange with Adobe's David Mendels concerning the transition from the static document centric Web 1.0, to the dynamic application platform we know today as the Web 2.0. David discusses the transition from DHTML to AJAX to RIA. David and his group at Adobe witnessed the transition and coined the phrase RIA - Rich Internet Application, to describe this incredible transition. No mention of WebKit as an important aspect enabling the interactive - dynamic document model behind Adobe RIA.
  •  
    Like this http://www.hdfilmsaati.net Film,dvd,download,free download,product... ppc,adword,adsense,amazon,clickbank,osell,bookmark,dofollow,edu,gov,ads,linkwell,traffic,scor,serp,goggle,bing,yahoo.ads,ads network,ads goggle,bing,quality links,link best,ptr,cpa,bpa
Gonzalo San Gil, PhD.

How to set up your own VoIP system at home | Ars Technica UK - 0 views

  •  
    "An exhaustive guide to setting up all manner of at-home phone trickery. by Nigel Whitfield - Jul 14, 2016 8:35am CEST"
Gonzalo San Gil, PhD.

How To Use Nmap Security Scanner (Nmap Commands) - LinuxAndUbuntu - 1 views

  •  
    "Nmap is a great security scanner. Many systems and network administrators use it for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In this article, I'll guide you through how to use Nmap commands."
Paul Merrell

Secret 'BADASS' Intelligence Program Spied on Smartphones - The Intercept - 0 views

  • British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.
  • Programmers frequently embed code from a handful of such companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user live? Where does the user work? Where is the user right now? What’s the phone’s unique identifier? What version of Android or iOS is the device running? What’s the user’s IP address? Answers to those questions guide app upgrades and help target advertisements, benefits that help explain why tracking users is not only routine in the tech industry but also considered a best practice. For users, however, the smartphone data routinely provided to ad and analytics companies represents a major privacy threat. When combined together, the information fragments can be used to identify specific users, and when concentrated in the hands of a small number of companies, they have proven to be irresistibly convenient targets for those engaged in mass surveillance. Although the BADASS presentation appears to be roughly four years old, at least one player in the mobile advertising and analytics space, Google, acknowledges that its servers still routinely receive unencrypted uploads from Google code embedded in apps.
Gonzalo San Gil, PhD.

How to Scan for Rootkits, backdoors and Exploits Using 'Rootkit Hunter' in Linux - 0 views

  •  
    "This article will guide you a way to install and configure RKH (RootKit Hunter) in Linux systems using source code."
Gonzalo San Gil, PhD.

E-Books And Guides Of Top 5 Upcoming Programming Languages - 2 views

  •  
    "To stay up and high in the field of programming, it is essential for any programmer to stay updated with the latest programming languages. You can learn atleast 5 from these references and ebooks. "
Gonzalo San Gil, PhD.

The paranoid's survival guide, part 1: How to protect your personal data - Computerworld - 1 views

  •  
    "Privacy is under attack from all quarters, but even today, there are things you can do to protect your personal data. Here are some tips. By Robert L. Mitchell"
Gonzalo San Gil, PhD.

Install Google Chrome on Fedora 21/20, CentOS/RHEL 7 | If Not True Then False - 0 views

  •  
    "This guide explains howto install Google Chrome Web browser on Fedora 21/20/19/18 and CentOS/Red Hat (RHEL) 7. Best way to install and keep up-to-date with Google Chrome browser is use Google's own YUM repository."
Paul Merrell

Exclusive: How FBI Informant Sabu Helped Anonymous Hack Brazil | Motherboard - 0 views

  • In early 2012, members of the hacking collective Anonymous carried out a series of cyber attacks on government and corporate websites in Brazil. They did so under the direction of a hacker who, unbeknownst to them, was wearing another hat: helping the Federal Bureau of Investigation carry out one of its biggest cybercrime investigations to date. A year after leaked files exposed the National Security Agency's efforts to spy on citizens and companies in Brazil, previously unpublished chat logs obtained by Motherboard reveal that while under the FBI's supervision, Hector Xavier Monsegur, widely known by his online persona, "Sabu," facilitated attacks that affected Brazilian websites. The operation raises questions about how the FBI uses global internet vulnerabilities during cybercrime investigations, how it works with informants, and how it shares information with other police and intelligence agencies. 
  • After his arrest in mid-2011, Monsegur continued to organize cyber attacks while working for the FBI. According to documents and interviews, Monsegur passed targets and exploits to hackers to disrupt government and corporate servers in Brazil and several other countries. Details about his work as a federal informant have been kept mostly secret, aired only in closed-door hearings and in redacted documents that include chat logs between Monsegur and other hackers. The chat logs remain under seal due to a protective order upheld in court, but in April, they and other court documents were obtained by journalists at Motherboard and the Daily Dot. 
Gary Edwards

Cloud Storage Users Share Pros and Cons of Leading Services | CIO - 1 views

  •  
    Good review comparing the leaders in the sync-share-store file category. Some very interesting comments from users in the pro-con sections. "Dropbox, Box, OneDrive and Google Drive are among the most popular cloud services for storing, syncing and sharing files. Picking the best service for your organization can be a challenge, but this guide will help determine which cloud service is right for you."
  •  
    I still maintain that any file sync service that doesn't do end-to-end encryption should be avoided like the plague. However, my love affair with Wuala is nearing its end. Comcast has been having difficulties with keeping me online lately and I discovered that Wuala requires that you be both logged in and *online* or you have no access to your synced files. None. I'm in the process of switching over to Barracuda Networks' Copy, https://www.copy.com/ which stores local files in a local directory structure, rather than in a JRE virtual drive.
Paul Merrell

Help:CirrusSearch - MediaWiki - 0 views

  • CirrusSearch is a new search engine for MediaWiki. The Wikimedia Foundation is migrating to CirrusSearch since it features key improvements over the previously used search engine, LuceneSearch. This page describes the features that are new or different compared to the past solutions.
  • 1 Frequently asked questions 1.1 What's improved? 2 Updates 3 Search suggestions 4 Full text search 4.1 Stemming 4.2 Filters (intitle:, incategory: and linksto:) 4.3 prefix: 4.4 Special prefixes 4.5 Did you mean 4.6 Prefer phrase matches 4.7 Fuzzy search 4.8 Phrase search and proximity 4.9 Quotes and exact matches 4.10 prefer-recent: 4.11 hastemplate: 4.12 boost-templates: 4.13 insource: 4.14 Auxiliary Text 4.15 Lead Text 4.16 Commons Search 5 See also
  • Stemming In search terminology, support for "stemming" means that a search for "swim" will also include "swimming" and "swimmed", but not "swam". There is support for dozens of languages, but all languages are wanted. There is a list of currently supported languages at elasticsearch.org; see their documentation on contributing to submit requests or patches.
  • ...1 more annotation...
  • See also Full specifications in the browser tests
  •  
    Lots of new tricks to learn on sites using MediaWiki as folks update their installations, I'm not a big fan of programs written in PHP and Javascript, but they're impossible to avoid on the Web. So is MediaWiki, so any real improvements help.  
Mike Nall

Step-by-Step Guide to your Social Media Success - 1 views

    • Mike Nall
       
      wow
karen Martinez

A Perfect Guide To Buy The Ideal Kindle For e-Readers - 0 views

  •  
    Digital book arrangement by an Amazon kindle has been an incredible accomplishment in the field of computerized hardware. If you are looking for Amazon Kindle Support then check www.technicalbulls.com
Paul Merrell

VoIP-4D Primer - - Building Voice Infrastructure in Developing Regions - 0 views

  • The "VoIP-4D Primer" is a free guide available in four major languages. The work is an effort to disseminate the use of telephony over the Internet in developing regions. The 40-page guide targets both technical and non-technical readers. The first part presents the essentials of telephony over the Internet. For those interested in the more technical details, hands-on guidelines and configuration files are included in the second part. The examples provide essential background to build your own low-cost telephony system.
Gonzalo San Gil, PhD.

Invisible Web: What it is, Why it exists, How to find it, and Its inherent ambiguity - 1 views

  •  
    [What is the "Invisible Web", a.k.a. the "Deep Web"? The "visible web" is what you can find using general web search engines. It's also what you see in almost all subject directories. The "invisible web" is what you cannot find using these types of tools. The first version of this web page was written in 2000, when this topic was new and baffling to many web searchers. Since then, search engines' crawlers and indexing programs have overcome many of the technical barriers that made it impossible for them to find "invisible" web pages. These types of pages used to be invisible but can now be found in most search engine results: Pages in non-HTML formats (pdf, Word, Excel, PowerPoint), now converted into HTML. Script-based pages, whose URLs contain a ? or other script coding. Pages generated dynamically by other types of database software (e.g., Active Server Pages, Cold Fusion). These can be indexed if there is a stable URL somewhere that search engine crawlers can find. ]
« First ‹ Previous 41 - 60 of 68 Next ›
Showing 20 items per page