nattster.blogspot.com
nattster: May 2008
http://nattster.blogspot.com/2008_05_01_archive.html
ลั่ลล้า. Thursday, May 01, 2008. กลับมาใช้ Windows XP แล้ว.หลังจากใช้ Vista มาหลายเดือน. ใช้ Windows Vista มาหลายเดือน เมื่อคืนกลับมา ตั้งใจจะลง Vista Ubuntu 8.04. นั่ง backup ข้อมูล แก้ partition ใหม่หมดเลย แล้วเอาแผ่น Recovery ของ Fujitsu ใส่เข้าไป ปรากฏว่าแผ่น Recovery ฟ้อง error ไม่ยอมลงให้ เพราะหา Partition WinRE ไม่เจอ (เป็น Partition ที่ Windows Vista ใช้ในการ Recovery). ก็เลยค้นๆ ไปเจอ ViStart ( http:/ lee-soft.com/. เมื่อ 3:16 PM. Subscribe to: Posts (Atom). View my complete profile.
nattster.blogspot.com
nattster: August 2008
http://nattster.blogspot.com/2008_08_01_archive.html
ลั่ลล้า. Saturday, August 23, 2008. ซื้ออุปกรณ์อิเล็กทรอนิกส์ จากร้านขายอะไหล่ (ใน "บ้านโป่ง"). วันนี้เป็นครั้งที่ 3 ที่ไปซื้ออุปกรณ์อิเล็กทรอนิกส์ (มานั่งประกอบวงจรเล็กๆ น้อยๆ). ไปซื้อ resistor บอกเค้า ขอ 175 kOhm 1/4 watts (คิดในใจว่าไม่มีเท่านี้แน่ๆ). เลยบอกเขาว่า ขอ resistor ที่ขนาดใกล้เคียง หรือรวมกันได้ขนาดเท่ากันก็ได้. เขาก็บอกว่า "ไม่มีค่ะ. ใกล้เคียงก็ 180 kOhm ค่ะ". อืม อนุกรมกันบวกกัน ขนานกันมันจะลด". เมื่อ 11:09 PM. Sunday, August 17, 2008. เคยถามเพื่อนมั้ย? เปิดๆ ไปเจอรายชื่...ที่...สาเหต$...
hackbuzz.blogspot.com
Hack to Learn: Bypass proxy at Your Company
http://hackbuzz.blogspot.com/2008/04/bypass-proxy-at-your-company.html
Tuesday, April 22, 2008. Bypass proxy at Your Company. Step 1: If Bess used to filter URL at comp or school, visit https:/ vtunnel.com/. Use v-tunnel, you'll be able to surf anyplace you like. Step 2: Just enter the website address you want and click "submit" button, you can find lots of working web-based proxies at http:/ www.aplusproxy.com/webproxy.php. Subscribe to: Post Comments (Atom). Enter your search terms. Enter your email address:. Bypass proxy at Your Company. 40 Million People Hacked.
hackbuzz.blogspot.com
Hack to Learn: What Is Ethical Hacking?
http://hackbuzz.blogspot.com/2008/05/what-is-ethical-hacking.html
Thursday, May 29, 2008. What Is Ethical Hacking? An Ethical Hacker is an expert hired by a company to attempt to attack their network and computer system the same way a hacker would. Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. The end result is the company's ability to prevent an intrusion before it ever occurs. An Ethical Hacker works to uncover three key pieces of information. First, he determines what information an ill...
mastersinforensicscience.com
Top 25 Startups Revolutionizing Computer Forensics & Security – Blog-O-Forensics
http://mastersinforensicscience.com/2010/top-25-startups-revolutionizing-computer-forensics-security
Discussing law, forensics, and criminal justice. Top 25 Startups Revolutionizing Computer Forensics & Security. June 29, 2010. Venture capitalists have become vastly interested in security-related startups that offer a range of services, from computer security, forensics. To Web sites that offer more privacy than larger social network sites. The leading provider of Legal Enterprise Management solutions, implements systems in the areas of electronic discovery, matter and case management, electronic invoic...
mastersinforensicscience.com
Blog-O-Forensics – Discussing law, forensics, and criminal justice
http://mastersinforensicscience.com/blog
Discussing law, forensics, and criminal justice. Top 25 Startups Revolutionizing Computer Forensics & Security. June 29, 2010. Venture capitalists have become vastly interested in security-related startups that offer a range of services, from computer security, forensics. To Web sites that offer more privacy than larger social network sites. The leading provider of Legal Enterprise Management solutions, implements systems in the areas of electronic discovery, matter and case management, electronic invoic...
infosec1.blogspot.com
InfoSec 101: May 2006
http://infosec1.blogspot.com/2006_05_01_archive.html
Infosec 101 - Computer Security, Electronics, Malware Analysis, Exploit Analysis, Hardware, Rootkits, Penetration Testing and the lastest News. View my complete profile. Australian Security and Privacy. Infosec 101 Site Feed. Google Indexing EXE files. News: Firefox 1.5.0.4 Released. News: Microsoft mhtml: URI Buffer Overflow Vulnera. Next Gen Kernel Object Hooking Rootkits. Article: Non eXecutable Stack Lovin on OSX86. News: Spammers stop Blue Security. Hardware: Xbox 360 DVD Firmware Hack. Generic Brow...
compualertsnlinks.blogspot.com
Computer Alerts And Links: COMPUTER ALERTS AND LINKS: FRONT PAGE
http://compualertsnlinks.blogspot.com/2007/01/computer-alerts-and-links-front-page.html
Computer Alerts And Links. Friday, January 12, 2007. COMPUTER ALERTS AND LINKS: FRONT PAGE. Emergency Alerts will be posted here with as current as possible information for dealing with new threats. Useful and informative site to facilitate safe and secure computing will be found in the side panel. If you have questions, commentary or suggestions to offer feel free to comment here or write to:. Dickaued@yahoo.com or ed.dickau@gmail.com. JUST FOR COMPUTIST FUN IN MOMENTS OF FRUSTRATION! MacIntosh.com ...
hackbuzz.blogspot.com
Hack to Learn: 5/4/08 - 5/11/08
http://hackbuzz.blogspot.com/2008_05_04_archive.html
Thursday, May 8, 2008. Security and Open Source Content Management Systems (CMS). 21 April 2008 - By Sean Fishlock. It is every IT manager's nightmare. Your website has been hacked, defaced, private and sensitive information has possibly been compromised, possibly even exposing gateways to internal systems. This can happen to any business and due to the rapid expansion of the open source software industry is particularly effecting small business. Subscribe to: Posts (Atom). Enter your search terms. Hacki...
SOCIAL ENGAGEMENT