Jump to content

All Activity

This stream auto-updates     

  1. Yesterday
  2. spookn

    Great magazine site

    THANKS
  3. Rædwulf

    Online Video Downloader

    hell this looks super promising.. thank u much for the fantastic find and share..
  4. ShAmmY1989

    Online Video Downloader

    Online Video Downloader https://www.tubeoffline.com/
  5. Last week
  6. hi, can someone help with the new version of amibroker 6.27 or latest . Thanks in advance. ras
  7. Rædwulf

    Russ and Sam, two friends...

    hahaha.. at 89 id done the same.. good one bmo..
  8. Russ and Sam, two friends, met in the park every day to feed the pigeons, watch the squirrels and discuss world problems. One day Russ didn't show up. Sam didn't think much about it and figured maybe he had a cold or something.. But after Russ hadn't shown up for a week or so, Sam really got worried. However, since the only time they ever got together was at the park, Sam didn't know where Russ lived, so he was unable to find out what had happened to him. A month had passed, and Sam figured he had seen the last of Russ, but one day, Sam approached the park and-- lo and behold!--there sat Russ! Sam was very excited and happy to see him and told him so. Then he said, 'For crying out loud Russ, what in the world happened to you?' Russ replied, 'I have been in jail.' 'Jail!' cried Sam. What in the world for?' 'Well,' Russ said, 'you know Sue, that cute little blonde waitress at the coffee shop where I sometimes go?' 'Yeah,' said Sam, 'I remember her. What about her? 'Well, one day she filed rape charges against me; and, at 89 years old, I was so proud that when I got into court, I pled 'guilty'. 'The damn judge gave me 30 days for perjury.'
  9. Russ and Sam, two friends, met in the park every day to feed the pigeons, watch the squirrels and discuss world problems. One day Russ didn't show up. Sam didn't think much about it and figured maybe he had a cold or something.. But after Russ hadn't shown up for a week or so, Sam really got worried. However, since the only time they ever got together was at the park, Sam didn't know where Russ lived, so he was unable to find out what had happened to him. A month had passed, and Sam figured he had seen the last of Russ, but one day, Sam approached the park and-- lo and behold!--there sat Russ! Sam was very excited and happy to see him and told him so. Then he said, 'For crying out loud Russ, what in the world happened to you?' Russ replied, 'I have been in jail.' 'Jail!' cried Sam. What in the world for?' 'Well,' Russ said, 'you know Sue, that cute little blonde waitress at the coffee shop where I sometimes go?' 'Yeah,' said Sam, 'I remember her. What about her? 'Well, one day she filed rape charges against me; and, at 89 years old, I was so proud that when I got into court, I pled 'guilty'. 'The damn judge gave me 30 days for perjury.'
  10. very good to hear u caught them and rectified it and nothing was stolen..
  11. Very relevant. I've had two financial breaches this week. Quickly caught and reversed but could have been bad.
  12. Yea wait until I found out who pwned me, They think I'm at War with Uranus, Well I shove them up Uranus A$$
  13. Pretty cool, 10 year history of each time I got pwned Just happens I knew most of them and have recently been over My security....
  14. Massive breach leaks 773 million email addresses, 21 million passwords The best time to stop reusing old passwords was 10 years ago. The second best time is now. It emerged that more than a billion unique email address and password combinations had been posted to a hacking forum for anyone to see in a mega-breach dubbed Collection #1. The breach was revealed by security researcher Troy Hunt, who runs the service allowing users to see if they’ve been hacked called Have I been Pwned. He has now loaded the unique email addresses totalling 772,904,991 onto the site. The data includes more than a billion unique email and password combinations – which hackers can use over a range of sites to compromise your services. They will do so by utilizing so-called credential stuffing attacks, seeing bots automatically testing millions of email and password combinations on a whole range of website login pages. The data originally appeared briefly on cloud service MEGA and was later posted to a popular hacking forum. The Collection #1 folder is comprised of more than 12,000 files weighing in at 87 gigabytes. Most concerningly, the protective hashing of the stolen passwords had been cracked. This means they are easy to use because they are available in plain text rather than being cryptographically hashed as they often are when sites are breached. Should I be worried? In a word: Yes. It’s a massive concern, not least because scale of this breach is huge: Yahoo’s breaches saw 1 billion and 3 billion users affected but the stolen data hasn’t actually resurfaced yet. And unlike other huge hacks such as Yahoo and Equifax, this breach cannot be tied down to one site. Instead it appears to comprise multiple breaches across a number of services including 2,000 databases. Hunt says there are many legitimate breaches in the directory listing, but he cannot yet verify this further. “This number makes it the single largest breach ever to be loaded into HIBP,” he adds in a blog. What’s more, his own personal data is in there “and it's accurate”, he says. “Right email address and a password I used many years ago. Like many of you reading this, I've been in multiple data breaches before which have resulted in my email addresses and yes, my passwords, circulating in public.” Finding out if you’re affected If you are one of the 2.2 million people that already use the Have I Been Pwned site, you should have received a notification: Nearly half of the site's users – or 768,000 – are caught up in this breach. If you aren’t already a member, you need to visit Have I Been Pwned now. Once on the site, you simply need to type in your email address and search, then scroll down to the bottom of the page. The site will let you know if your email address is affected by this breach – and while you are there, you can see if your details were stolen in any others too. https://haveibeenpwned.com/ To find out if your password has been compromised, you separately need to check Pwned Passwords– a feature built into the site recently. This feature also helps you to use strong passwords: if yours is on there, it’s safe to assume others are using it and your accounts could be easily breached. https://haveibeenpwned.com/Passwords What if my details are there? Hunt says in his blog: “Whilst I can't tell you precisely what password was against your own record in the breach, I can tell you if any password you're interested in has appeared in previous breaches Pwned Passwords has indexed. If one of yours shows up there, you really want to stop using it on any service you care about.” If you have a bunch of passwords, checking all of them could be time-consuming. In this case, Hunt suggests 1Password's Watchtower feature which can take all your stored passwords and check them against Pwned Passwords in one go. https://1password.com/ Most importantly, if your password is on the list, do not ignore it as it can be used in credential stuffing attacks mentioned earlier. Hunt says: “People take lists like these that contain our email addresses and passwords then they attempt to see where else they work. The success of this approach is predicated on the fact that people reuse the same credentials on multiple services.” More generally, as the number of breaches and their sheer scale increases, it’s time to clean up your password practices. In addition to using two-factor authentication, passwords should be complex – such as a phrase from a favourite book or a line from a song. At the same time, security experts don’t rule out analogue books containing your password – as long as these are not stored on your device or with it. If you take these measures into account you should be able to avoid using the same password across multiple sites. Ideally, start using a password manager to ensure you can remember these. Have I Been Pwned https://haveibeenpwned.com/ Pwned Passwords https://haveibeenpwned.com/Passwords 1Password https://1password.com/
  15. Judge orders Net Neutrality lawsuit to go ahead Despite Shutdown This week the possibility emerged that the ongoing government shutdown could delay net neutrality’s day in court — but the court was not sympathetic to the FCC’s request that the lawsuit be put off. Oral arguments for this major challenge to the agency’s rollback of 2015’s internet regulations will go ahead as planned on February 1. During a shutdown, federal employees — including government lawyers — must have specific authorization to continue working, since it’s illegal for them to do so without pay. In this case a judge on the case must effectively make that authorization. The FCC is among the many agencies and organizations affected by the shutdown, and many employees are stuck at home. As such it requested a postponement of an upcoming court date at which it and several companies and advocacy groups are scheduled to argue over its rollback of net neutrality. A counter-argument filed immediately by industry group INCOMPAS pointed out that during previous shutdowns, the court had not granted such requests and should stick to that precedent. The judges of the D.C. Circuit Appeals Court appear to agree with the latter argument; the FCC’s motion was denied and arguments will go forward as planned on February 1. This is definitely not good news for the FCC. While it no doubt has its ducks in a row as far as defending its net neutrality rollback and new rules in court (it has done so before and will again), it’s far from ideal that the case will take place after a prolonged absence of all the pertinent experts from their posts. Briefing the lawyers, updating arguments, responding to industry concerns — it’s not easy to do when all your staff is sitting at home watching “Bandersnatch” over and over. The lawsuit against the FCC has lots of good points to make about the rules it has established and the process by which it approved those rules, so this is no mere formality or frivolous suit. And net neutrality champions are likely happy to hear that they may very well catch the agency flat-footed. The judges of the D.C. Circuit Appeals Court appear to agree with the latter argument; the FCC’s motion was denied and arguments will go forward as planned on February 1.
  16. Rædwulf

    Become a VIP Member Now!!! New Content!!!

    way to go mate.. enjoy all the extra goodies and access to the VIP Server..
  17. How This Small Piece of Metal Can Destroy the Invincible 5.9l Cummins Turbo Diesel Let’s talk about an engine that has earned the reputation of invincibility - the Cummins 5.9L Turbo Diesel. It’s a powerplant that has gained notoriety among the auto community unlike any other engine from its category. Quite frankly, it maintains one hell of a cult following. I’ve even taken a few sips of the holy water. But one little part can make it all go wrong. Call it a guilty pleasure if you must, but there is just something about the second-generation… Back in the late ’80s, American truck manufacturers were upping the ante for the heavy-duty pickup market. Ford and Chevrolet were offering diesel engines that began redefining what “heavy duty pickup” truly meant. Chrysler, in a rare stroke of genius, decided to join the race by using an industrial-grade engine from a manufacturer known for reliable and powerful oil burners: Cummins. No diesel engine on earth is as legendary as a 12-valve Cummins. Not only is the inline-six known… Now, fitting an iron-block, 1,100 pound inline-six diesel behemoth engine into an otherwise standard 3/4 ton Dodge Ram led to all sorts of issues that could effectively write off the truck that surrounded it. Even still, the engine’s overbuilt nature meant it was more than capable of chugging along way past the chassis’ expiration date. That is until a piece of metal the size of a pebble had its say in things. This little piece of metal is so villainous it’s been given a name that is whispered in secrecy during moonlit Ram pickup owner gatherings: the Killer Dowel Pin. (That’s KDP for short.) What’s The Problem? You’ve probably heard of dowel pins before, but if not, here’s what they do. These small metal cylinders align precision-fit engine components to one another. In the example of the Cummins engine, a series of dowel pins ensure that the timing case at the front of the engine perfectly aligns with the cylinder block. Dowel pins serve an important but innocent purpose. That is because in nearly every engine ever created, dowel pins are captive within the components they are aligning; they are closed-off with no way to escape. However, in the 5.9L Cummins engine, there’s a dowel pin that isn’t captive; it can wiggle its way right on out of place. Normal engine vibration is all it takes for this to happen. There is no warning and there are no symptoms. One second the engine can be purring right along, the next the sounds of metal mashing and snapping fill the air. The failure can go down in many ways, but usually the end result is the same. That little dowel pin does its fair share of damage when it falls directly down into the timing gears at the front of the engine. Imagine, if you will, one of those penny press machines. You know, the ones that turn valuable, circular copper currency into an oval picture from a vacation you’re going to forget? That’s basically what the dowel pin is doing when it hits the timing gears. However, pennies are soft and malleable and the dowel pin is not. It’s made of the same steel the timing gears are, and neither of them are going to give up the fight until both are destroyed. A cracked timing case, a snapped camshaft, and mutilated valves and pistons represent some of catastrophic results that could occur when the timing gears are forced in unintended directions. Ultimately, the invincible engine can be taken down for good. The Fix: Luckily, there is a way to permanently fix the issue before it ever happens. It’s done by closing off the dowel pin’s exit. There are many vendors offering an inexpensive retrofit kit that consists of a small metal tab that covers the dowel pin’s hole. The tab is secured in place via a nearby timing case bolt. It’s a simple fix to a simple problem, so long as it’s caught before the carnage occurs. The problem is that a decent amount of disassembly is required to get to the dowel pin. You’ll first need to drain the coolant system and yank out the radiator and cooling fan. Then it’ll be time to pull out the serpentine belt and remove the massive harmonic damper from the crankshaft. At this point you’ll be met by the 20 bolts securing the timing cover to the timing case. Once the cover is out of the way, the killer dowel pin will be completely exposed. If you feel like taking this on yourself, be sure to study this much more thorough how-to here. At least proactively fixing the issue is less headache than requiring a new engine. Which Trucks? It’s important for me to state that the issue described above predominantly applies to the 6BT 12 valve 5.9L Cummins engines most notably found in 1989-1998 Dodge Ram pickups. There are a few reports of dowel pin issues in the 1998.5-2002 24 valve ISB-series of Cummins 5.9L engines as well, but these are rare. If you just bought a brand-new, $80,000 Ram diesel pickup, don’t worry. This issue doesn’t apply to you. The venerable Cummins 5.9L engine is certainly deserving of its robust reputation, but nothing is without faults. With this proactive repair you can have the invincible diesel engine you’ve always dreamed of.
  18. Google dropping Android apps who have no business reading SMS, call logs As open as the Android platform may be, it is also criticized for being just as open to abuse. Google has been trying to plug up holes that it may have left open in the past, though sometimes it accidentally also shuts the door on well-meaning developers’ faces. One recent example of that is its new policy on SMS and Call Log permissions which almost spelled trouble for Tasker. While the popular automation framework managed to dodge that bullet, Google is now reminding other developers that the hammer will be falling soon. The history of Android app permissions is a messy one but hindsight is always 20/20. All Google can really do damage control and try to curtail the broader permissions it allowed apps to have before. Unfortunately, sometimes such changes are bound to break things and ruffle a few feathers. That happened last November when Google announced that apps that currently have permissions for SMS and Call Logs but are not actually SMS apps or phone apps would be banned from Google Play Store. The idea was that those apps wouldn’t have any business being able to read what should be private data. In fact, those permissions have indeed been misused and abused to violate user privacy. Unfortunately, that new policy also hit apps like Tasker that, while not necessarily SMS or phone apps, allow users to automate the sending of messages or making calls. Accessibility apps also fell afoul of the policy so Google has given them some reprieve by letting them apply for an exception subject to review. That period for applying exceptions is now over and offending apps will soon be removed from the Google Play Store. Google isn’t closing the door, however, and developers can either remove the unnecessary permissions from their apps or submit a permission declaration to be reviewed. Hopefully, this could lead to a significant reduction in wayward apps, at least until some new permission becomes the new security hole.
  19. Earlier
  20. Tech 425

    How to defrag your Linux System

    How to defrag your Linux System There is a common misconception among GNU/Linux users that our systems never ever need to be defragmented. This stems from the success of the journalized filesystems used by most distributions including EXT2,3 and 4, JFS, ZFS, XFS, ReiserFS and BTRFS. All of these boast smart ways and techniques in regards to the files allocation in the disks, minimizing the fragmentation problem to a point that there is practically no reason to defrag even after many years of installing and uninstalling applications and libraries in the same system. Fragmentation though can still be an issue though, especially for users that use space limited disks that may not offer many file allocation options. Here's a bulk description of how the (Linux) file allocation procedure works: files are stored in multiple places in the disk, leaving huge unwritten space between them, allowing them to grow unobstructed over time if needed. This is in contrary to filesystems like the Windows' NTFS which places files next to each other consecutively. If the disk gets more crowded and a file needs more space to grow by staying in one piece, Linux filesystems attempt to re-write it completely on another sector that has enough space to store it as a whole. This way, everything is kept clean, tidy and in one piece each. Confined space though, causes this file “maneuvering” to get more challenging with time. Here's how to deal with this problem and how to actually defrag your Linux system. Now, the first thing that you'll need to do is get a defragment tool installed. There are many defragmenters available for Linux filesystems but I will use “e4defrag” as it is one that will most probably be already installed in your system. Using this tool, you can determine if you have fragmented files and how serious this fragmentation is. To do this, open a terminal and type: sudo e4defrag -c /location or /dev/device. Below, I have scanned my /home folder for fragmented files and actually found five of them. My fragmentation score though is quite low so defragging won't do much different in my system's performance in that case. If this outputs a score over “30”, then defragging would be a good idea. At first, I will demonstrate how to defrag using e4defrag, by defragging my fragmented files one by one. The e4defrag program is part of the e2fsprogs package which should already be installed on your computer. In case the program is missing, install it with this command on Ubuntu: sudo apt-get install e2fsprogs To do this I use the following command: sudo e4defrag Followed by the location and name of the file as shown in the screenshot below: This is good when you have to defrag just a couple of files like I did, but if you want to defrag your whole system then you should first unmount all partitions and run the following command: sudo e4defrag /dev/* If you want to perform defrag without unmounting, then: sudo e4defrag / Would be a safe choice. Since many users nowadays use SSDs and not HDDs, it is important to note that the defragmentation procedure is only beneficial for the later. If you own an SSD, there is simply no point in worrying about fragmented files as those disks can access their storage randomly, wheres HDDs access sequentially. Defragging your SSD will only increase the read/write count and thus reduce the lifetime of your disk.
  21. Carrie Fisher and her stunt double Tracy Eddon, sun tanning while on a break from filming - Return of the Jedi
  22. Charlton Heston on the set of Planet of the Apes
  23. Rædwulf

    Post Videos and .Gifs Here

    that Mathematician vid is pretty cool..
  24. Tech 425

    Post Videos and .Gifs Here

    Homeowner snags purse from package thief's car
  1. Load more activity
×