120 private links
The purpose of this thread is to provide a list of desktop apps which have been recompiled to run on hacked Windows RT devices. A secondary purpose is to request or discuss such ports. Listing apps which run without recompilation (.NET 4.x) and providing libraries which are ported and/or known to work are also good uses of the thread. However, major apps, or those expected to lead to significant discussion, should probably get their own thread.
Nao sei porque mais eu pensei em voces.
A notorious hacker who claims to “fight for the dignity of Muslims” though peaceful means attacked Twitter on Tuesday, publishing private information online from the accounts of thousands of the social-media company’s users.
http://www.techworm.in/2013/08/twitter-hacked-thousand-of-account.html
http://www.theregister.co.uk/2013/08/20/twitter_oauth_token_hack/
Do you like pacman?
C'est l'image la plus emblématique du massacre de la place Tiananmen.
L'une des images les plus taboues en République populaire de Chine. "Tank man" ("L'homme au tank") a été immortalisé par un photographe d'AP le 5 juin 1989 alors qu'il s'efforçait de bloquer symboliquement la progression d'une colonne de chars fonçant sur les manifestants. Cette image, depuis, est officiellement interdite, malgré quelques détournements sur les réseaux sociaux chinois.
En 2005, le "Center for Disease Control" aux USA a publié les statistiques suivantes:
1 chance sur 126 de mourir d’une crise cardiaque
1 chance sur 169 de mourir d’un cancer
1 chance sur 400 d’avoir une malade cardiaque
1 chance sur 520 d’attraper un cancer
1 chance sur 1 245 de vous faire assassiner si vous viviez dans une grande ville dans les années 1990
1 chance sur 2 900 de mourir dans un accident
1 chance sur 7 000 de mourir dans un accident de voiture
1 chance sur 9 200 de vous suicider
1 chance sur 12 400 d’attraper la maladie d’Alzheimer
1 chance sur 18 100 de mourir assassiné
1 chance sur 21 004 de mourir du SIDA
1 chance sur 43 000 d’attraper une hernie
1 chance sur 88 000 de mourir dans un attentat terroriste
1 chance sur 1 500 00 d’être victime d’un attentat terroriste contre un centre commercial, partant du principe qu’il y aurait un attentat par semaine et que vous consacrez deux heures par semaine à faire vos courses.
1 chance sur 55 000 000 d’être victime d’une attaque terroriste contre un avion de ligne, partant du principe qu’il y aurait une attaque par mois et que vous prenez l’avion une fois par mois.
Loin de la terminologie spécifique à l'informatique, ce terme énigmatique provient du langage courant et signifie canular. A titre d'exemple, les anglophones diront : "bomb hoax" pour une fausse alerte à la bombe.
Démocratisation de l'informatique oblige, les canulars prennent aujourd'hui une forme électronique et se jouent des frontières et de la distance pour parvenir directement sur vos écrans.
Fausses alertes aux virus ; fausses chaînes de solidarité ; fausses promesses ; fausses informations ; les hoax prennent toutes les formes. Apprenez à les repérer dans notre rubrique "Variétés".
L'appareil à porter au bras qui permet de contrôler ordinateurs et appareils électroniques à distance, en effectuant des flexions musculaires, est aujourd'hui disponible à la précommande.
You can see two files with same file name!
Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks the hosts “vk.com” and “vkontakte.ru” (both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way.
Covoiturage.ca, carpoolingnetwork.com et leurs sites affiliés sont opérés par une entreprise privée à caractère social qui est établie à Montréal (Québec, Canada). Covoiturage.ca a vu le jour en novembre 2005 grâce à l’initiative de deux jeunes entrepreneurs désireux d’apporter leur contribution à la cause environnementale en offrant une solution efficace qui permet de faciliter les déplacements des usagers de la route.
The purpose of this guide is to prepare a USB Flash Drive with the installation files of Windows Vista™ or Windows 7™. Most Netbook does not come with a CD/DVD drive and therefore installing or upgrading to a new operating system is always a challenge. The guide is divided into two parts, the first part talks about the preparation of the Flash Drive and the later talks about how to copy the installation file content on to the Drive for installation.
Secure video calls, conferencing, chat, desktop sharing, file transfer, support for your favorite OS, and IM network. All this, and more, in Jitsi - the most complete and advanced open source communicator.
Use all your networks from the same application. Jitsi lets you connect to Facebook, GoogleTalk, XMPP, Windows Live, Yahoo!, AIM, and ICQ so that you can chat to all your friends in the simplest possible way.
Desktop Sharing
http://wiki.openstreetmap.org/wiki/Openstreetview
OpenStreetView (openstreetview.org) is a project talked about at State Of The Map 2009 by John McKerrell and launched in September 2009. The aims of the project are to create a large open licensed database of street level photography. Photos can be uploaded into the system by anyone who signs up for an account. All photos must then be moderated by a number of people (currently 3) to ensure that they are appropriate for the project. Once a photo has been moderated it will then show up in API queries and appear on the site to anyone, whether signed in or not.
SERVICES DE COURRIEL À ADRESSES JETABLES. _____
http://mailhazard.com/
http://www.guerrillamail.com/
http://mytempemail.com/
http://www.saynotospams.com/
http://www.tempemail.co.za/
http://www.mailinator.com/
http://www.mytrashmail.com/
http://www.mailexpire.com/
http://www.maileater.com/
http://www.jetable.org/en/index
http://www.spambox.us/
http://www.guerrillamail.com/
http://10minutemail.com/10MinuteMail/index.html
http://www.dontreg.com/
http://www.tempomail.fr/creation.php
http://spamfree24.org/
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
PRISM is a clandestine mass electronic surveillance data mining program operated by the United States National Security Agency (NSA) since 2007.[1][2][3][Notes 1] PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[8][9]
PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[10][11] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[citation needed] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[12] The disclosures were published by The Guardian and The Washington Post on June 6, 2013.
A document included in the leak indicated that PRISM was "the number one source of raw intelligence used for NSA analytic reports."[13] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls on an ongoing daily basis.[14][15]
U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[16][17] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people
Turn your computer into a telephone, with ePhone™ by Comwave. Log In to ePhone from your desktop or laptop computer from anywhere around the world to make and receive free calls with your own phone number. ePhone uses your data connection or Wi-Fi so there is no need to worry about expensive fees while traveling.