Thursday, March 19, 2009
How Much Does A Chest Wax Cost
and many others. Piracy maybe?? not only fun!!
Open any page on the internet that you want to change the page loads, enter the address in the coffin this code:
javascript: document.body.contentEditable = 'true'; document. designMode = 'on'; void 0Et voila, now you can edit the page as you prefer, you can drag elements, write or delete characters, delete the images.
and press enter
you can unleash your imagination as you wish but be careful no changes will be saved, and if you refresh the page will return all
as before! and hello to the next post!!
Wednesday, March 18, 2009
Pro Show Gold Evaluation

in this column I'll live distribution BackTrack.
do not know why maybe because the dragon, or perhaps because it appeals to me or learned over time to appreciate this wonderful distribution. More popular
BackTrack distribution formed by the merger of two distributions: WHAX and Auditor Security Collection.
The stable version is BackTrack 3, released in July 1, 2008 and includes more than 300 security tools and focuses mainly on increasing the compatibility / hardware flexibility. Backtrack
focuses on the need for testers of computer security and is available as LiveCD
like that and how LiveUSB, you can also install it permanently on your hard disk. The basic setup has a graphical interface. Backtrack extends its compatibility with accessibility and internationalization of software.
SOME 'OF HISTORY!
The BackTrack project released its first non-beta version, the 1.0 in
26/06/2006 .
next project released the second beta in October 13 and November 19, 2006. The stable version (2.0) was released in 06/03/2007 .
Note that Backtrack Security organized a training course called Offensive Security, and created the "Offensive Security Certified Professional certification. In fact, these courses teach the basics for a safety test using the LiveCD to backtrack. There
say that a better distribution especially to learn to test the security of your wireless network (More on I'll write a post about it) but for now we are waiting patiently for the relase of this distribution
4
Tuesday, March 17, 2009
Mirror Silver Contact Lens
initially developed as a simple
worm can exploit a weakness systems Windows (detected and accurate to October 2008), the malware has subsequently evolved , implementing auto-update mechanisms increasingly sophisticated ability to defend against removal mechanisms can also attack the keys USB and network shares.
Conficker is now preparing to be updated : from 1 April in fact, the malware download the new version of himself, identified as Conficker . C. To retrieve new malicious byte, the program will contact a number of domains generated using an algorithm of multiple choice with this technique, the cracker (Or, more likely, the development team) behind the malware is able to prevent the possibility of curbing the infection by inhibiting a single domain.
variant "C" will be characterized by a partial change of course: if older versions were in fact characterized by a particular aggressiveness of the mechanisms of replication, the next release will aim instead to consolidate its position:the worm will still more difficult to remove. CA speaks fact of features that stop the virus , inhibit access to the Security Center and Windows Update , prevent the execution of many cleaning tools, disable restarting in safe mode and delete all restore points generated by the operating system.
In fact, the best approach (if not only) groped for removal will be made use of secondary bootmemories, such as a CD that can boot the machine (like MegaLab . it CD Utility) or the use of a secondary hard drive. Operations then Tutt 'more than simple, especially for those who are facing an epidemic in a business scenario with a few hundred computers ..
To date, it is still unknown what are the intentions of the authors ofConficker : Despite the high spread in fact, the codicil does not do hostile actions, if not groped to replicate on as many computers as possible and equip themselves to resist attempts to remove . The malware
remaining constantly waiting for instructions from its creator : in all likelihood, the puppeteer behind Conficker is still considering how best to exploit the millions of computers become compromised, which could be used as bridgehead for attacks bring Distributed Denial of Service (DDoS ) on a commission basis, or turned into unwitting spam -fired power plants.
(source from:Megalab . it )
This damned worm does not seem to give up, next month we run for cover: Updated 's antivirus , especially windows update and keep More anti-malware ( spy - bots, spyware terminator, spyware - doctor just to name a few!)
Nintendo Club Point Generator
Hello everyone! :-) Today I'll write a post I had in mind for some time, we will talk about wireless ...
In computing, the term wireless (from wireless) indicate the lines of communication between electronic devices, which do not use cables. Traditional systems based on wired connections are called wired. Generally, the wireless
uses low-power radio waves. In
computer, wireless local area network , short-term English in WLAN indicates a " wireless local area network." The acronym WLAN is generically referred to all local networks of computers that do not use link cable to connect to each other hosts on the network.
The types of wireless network are three:
- PAN (Personal Area Network), at the household level
- WLAN (Wireless Local Area Network), the strict
- WAN (Wide Area Network) wireless
- BWA (Broadband Wireless Access), which is experiencing widespread thanks to WiMAX technology Uhmmm ... WiMAX a better technology sometimes write a post about .....
can communicate normally with 30 clients within a radius of 100 m . However, this feature varies depending on several factors, positioning, obstacles and interference with other electromagnetic fields , the power of the devices. To increase the transmission distance, there are repeaters that amplify radio signals. In experimental conditions, wireless networks can reach a capacity of several kilometers (WiMAX).
The main problem of wireless networks is the
security. The radio signals, being released into the ether, can be easily intercepted. It is therefore necessary to adopt counter-encryption-type to ensure confidentiality. The standard originally proposed for this task was the WEP 40 or 104 bits, but the weakness of this protocol, which made him very insecure imposed soon replace it with a WPA, which uses a variant of WEP in which the main weaknesses have been removed.
WPA2 Protocol, ratified in 2004 , is based on the algorithm of the AES encryption provides high security but is not compatible with previous generation devices.
For me and a good wireless technology that will improve over time definitely wanted to say a little pearl of wisdom, let us stop to protect wireless networks so the concept of total security in computer science there is also the WPA can be pierced (later write a post) frees the network to allow anyone to connect anywhere, as is the case for some time in many places in America ........
What Does A Ohio Dl Look Like
Who is 20 years old ......... INTERNET !!!!!!
Azzo this amazing technology is twenty years old, thanks to John Berners - Lee inventor of the Internet and in March 13, 1989
literally changed the way people communicate ......... The study showed how the data could be easily transferred over the Internet through the 'hypertext': The system, now familiar, which allows us to 'point' and click some text to another page of information on the 'great network '. "Vague but exciting," wrote Sendall giving the green light to a project that would have changed contemporary history.
people meditate Meditate ............
Sunday, March 15, 2009
Can I Use Orajel On My Head
time ago I wrote a post in which I told my failure to enter a counter statistics in my blog, but today I will tell you how or inserted and the procedures that I followed (and there was hard but I did it !!!). So how
histats.com the famous service that offers the possibility of holding subkeys my blog (at no cost) not only in terms of statistics but also in other things, I am not to say not to extend the discourse, perhaps more forward write a post on histats.com, register on the site it takes a minute or so to choose the layout of your counter and move on when the site will tell you the piece of code go to paste into the blog on layout -> page elements -> and add gadget ---> HTML / Javascript and insert code and title.
to now have statistics de
your blog at your fingertips. site and beautiful and offers many features
make good use of the maximum and do not limit yourself to only enter the counter. Hello and the next Post !!!!!! :-)
Holly Willoughby Buque Birthday Cake

First cose'e goog1e.it: none other than the dark version of the famous motor google search but with something more.
Goog1e.it was created in December 2007 on the 'example of Heapmedia.com. It 'a site that allows you to search Google on minimizing energy consumption of our computer.
seems nonsense and instead ..... Use
Goog1e.it to conduct their own research on the internet, saves energy because the screen during the voyage, is mainly black. The screen of your PC that displays a blank page consumes about 74watt, but a screen that displays a page black it consumes only 50.
I think there is a meaning in this concept because even if the energy savings is small, we should all save a little. Secondly, we think that seeing Goog1e.it every time we load our web browser, reminds us that we must take small steps to save energy.
I have set my homepage on
www.goog1le.it and honestly I've also tried to power the site and I noticed that doing research with google.it (The original) the autonomy of the laptop on battery (power ) decreased drastically. and then the interface is really nice and well cared for, a great site I must say. Also I have copied in my blog goog1e.it the predominant color and black it :-) I have friends in the blog link added to the list. For more information, please visit the site.
I want to thank and to congratulate all the staff at goog1e.it for the excellent work, I will help in my small long as I can. Hello
and Presto! ;-)
Saturday, March 14, 2009
Scab On Cock Keeps Coming Back
and a beautiful piece that is no longer writing in this blog for reasons that I have angered much hope that things aggiustino .......
much ........... I state that from where I connect to a network
sgam wireless, to connect using a network adapter if you look outside for some time More not detect the network and I am forced to suffer and not More connect to , moral of the story ......... buy some good products or you will end up like me can not do anything, Now (hopefully) will update my blog with the best articles in tuti hello