120 private links
The most visited humor site on the web, the smart and irreverent CRACKED.com was created as an online extension of the long-running American humor magazine Cracked, which was founded way back in 1958. The articles and funny videos are made almost entirely by CRACKED.com's highly talented editorial team, individual content creators and fans, giving them an audience in the millions with fresh content daily.
Have you ever had a moment, when you wanted to recommend a coleague, but did not have appropriate words in mind? Now it's not a problem anymore! This page is a recommendation generator (usefull on LinkedIn for example). Your new perfect endorsement for is just a click away!
A free and open Icon collection. Over 10,000 Unique Icons. Free for anyone to use on you computer, website or any other project. The library is not a theme. Its a centralized source for icons to cover all your needs. The goal is to cover all common apps, operating systems, mimetypes, devices, and country flags.
http://openiconlibrary.sourceforge.net/gallery2/open_icon_library-full/icons/
Google docs hacked in seconds.
How secure is the information on this platform used by millions of users and companies? To know it I made a fast and simple test on my own files.
The result was that the information was compromised in seconds.
Ethical hack test:
Creation of a new account to start a blank attack: 1 minute aprox.
Silent wait time: 1 minute.
Duration of the smart attack: less than 5 seconds.
Social networking website LinkedIn is investigating claims that over six million of its users' passwords have been leaked onto the internet.
Hackers posted a file containing encrypted passwords onto a Russian web forum.
Conservapedia is a clean and concise resource for those seeking the truth. We do not allow liberal bias to deceive and distort here. Founded initially in November 2006 as a way to educate advanced, college-bound homeschoolers, this resource has grown into a marvelous source of information for students, adults and teachers alike. Our courses are ongoing and open to all here: Conservapedia:Index. We have received over 250 million page views!
A conservative approach to education is powerful and helpful in many ways. It equips students and adults to overcome inevitable obstacles, such as addiction and depression, and it guides learners to lasting insights. There are few, if any, conservative schools, and Conservapedia freely provides this unique approach for the benefit you and those around you. Conservapedia was on the Colbert Report on December 8, 2009.
Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers in the Middle East. (It does not replicate and spread automatically, which is certainly so that its controllers can target it better and evade detection longer.) And its espionage capabilities are pretty impressive. We'll know more in the coming days and weeks as different groups start analyzing it and publishing their results.
In this article, we are going to set up our first domain controller using Windows Server 2008, that is to set up Active Directory Domain Services
This post is again in response to requests from customers who want to know how to configure Database Mirroring between instances of SQL Server 2005 in a WORKGROUP.
As you might have noticed, while configuring Database Mirroring using the GUI, it requires us to enter FQDNs of the servers; hence using the GUI, we can configure Database Mirroring between instances of SQL Server in a domain environment.
The complexity of the code within this threat is at par with that seen in Stuxnet and Duqu, arguably the two most complex pieces of malware we have analyzed to date. As with the previous two threats, this code was not likely to have been written by a single individual but by an organized, well-funded group of people working to a clear set of directives. Certain file names associated with the threat are identical to those described in an incident involving the Iranian Oil Ministry.
select
'' + char(13) + char(10)
- 'go' + char(13) + char(10)
- 'if ((select count(*) from ' + sys.schemas.name + '.[' + sys.tables.name +'])>0) '+ char(13) + char(10)
- 'begin' + char(13) + char(10)
- ' print ''---------------------'' ' + char(13) + char(10)
- ' print ''' + sys.schemas.name + '.' + sys.tables.name + ''' ' + char(13) + char(10)
- ' delete from ' + sys.schemas.name + '.[' + sys.tables.name +']'+ char(13) + char(10)
- 'end' + char(13) + char(10)
FROM sys.tables INNER JOIN sys.schemas ON sys.tables.schema_id = sys.schemas.schema_id
ORDER BY sys.schemas.name, sys.tables.name
Backed by stunning illustrations, David Christian narrates a complete history of the universe, from the Big Bang to the Internet, in a riveting 18 minutes. This is "Big History": an enlightening, wide-angle look at complexity, life and humanity, set against our slim share of the cosmic timeline.
Entenda sobre a crise dos EUA com "A Pequena Grande Crise", finalista do Nave Awards e Oi Futuro.
Euro NCAP provides motoring consumers - both drivers and the automotive industry - with a realistic and independent assessment of the safety performance of some of the most popular cars sold in Europe.
FireShot is an extension for Firefox, Internet Explorer, Chrome, Seamonkey and Thunderbird that captures, edits, annotates, organizes, exports, uploads and prints screenshots of your web pages.