Links
Add
The Pyrex Glass Controversy That Just Won't Die
https://gizmodo.com/the-pyrex-glass-controversy-that-just-wont-die-1833040962
n the glass formula and flocked to th
Added 9 months ago
The Python GTK+ 3 Tutorial — Python GTK+ 3 Tutorial 3.4 documentation
https://python-gtk-3-tutorial.readthedocs.io/en/latest/index.html
The Real Nancy Botwin From 'Weeds'? - YouTube
https://www.youtube.com/watch?v=Ret9c0d_PAg
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
The Ross Sisters - Solid Potato Salad (DVD Quality) Full Video - YouTube
https://www.youtube.com/watch?v=d1J3NLNWAPU
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
https://sso.tax/
A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
Added 4 months ago
The Sandbox | Understanding CyberForensics
http://cwsandbox.org/
We need to get some definitions out of the way so we all know what we are talking about. WHAT IS A SANDBOX: A "sandbox", as it relates to computer security, is a designated, separate and restricted environment (or "container", with tight control and permissions, where computer code can run without the ability to cause damage or infection. Just like in a real playground where children can play in the sandbox -- but are not allowed to play anywhere outside of the sand box. And the box around the "sand box" is designed to keep the sand in and not make a mess all around. At that moment, the sandbox is their "virtual world". WHAT IS VIRTUALIZATION and VIRTUAL MACHINES / VIRTUAL WORLD: "Virtualization" provides a separate environment within a computer that can function independently from all other environments on the computer. One virtual container cannot change or modify another virtual container. A "sandbox" and a "virtual machine" are not the same. When you run an application in a sandbox, it has access to run as if it were not in a sandbox. Anything the application attempts to create or change, however, is lost (or NOT saved) when the application stops running. In a "virtual machine", anything created or changed by the application is allowed, and everything that happens stay within the virtual machine. Similar to the "Las Vegas" theory; "What happens in Las Vegas stays in Las Vegas". Once testing is completed, the virtual machine in use can be deleted without concern for anything that was done to it by the running of the questionable application. WHAT IS A HONEYPOT? As it relates to computer security, a "honeypot" is typically a computer, network or a data system that appears to be part of a larger system, but is actually a controlled, standalone "bait" vehicle, designed to attract those wanting to infect and abuse. If you watch US television, you will most likely be familiar with the police action show "Bait Car". The difference being that the criminals get caught immediately in the tv show. Real life "honeypots" don't necessary lead to that same outcome. There are different types of "honey pots". For years, anti-spam companies "baited" forums, and web sites, and Usenet, and every source they could find, with email addresses in order to received spam. The spam received researched to identify where the spam comes from as well as other general patterns. The type of honeypot we utilize in this discussion applies to the collection, research, identification and analysis of "MalWare". Virus prevention software can't act on infections until it is taught about specific threats and Malware. WHAT IS MALWARE: "Malware" is a shortened form of "malicious software". Malicious software is used to gain control of your computer, allowing the malware creator to do whatever he wants. The ultimate goal of gaining control is to disrupt the normal operations of the target; obtain sensitive or secret information; or gain access to private computer networks and system for other purposes. Malware includes Trojans, viruses, ransom ware, spy ware, and yes, adware! In order for "malware" to be caught, classified, added to virus protection software, etc., it has to be "caught". So the web is full of "spider webs for malware", or "honeypots"! Honeypot creation can be as simple as placing an old computer (or server that is too old or too slow for any valid purpose), install honeypot software, and connect it to the network. (Honeypot software is available as an open source product by the way). It won't take long before your system sees malicious activity, as hackers begin scanning for weaknesses, and attempting to break in. In a test this year, a security blogger leased server space in various countries and created honeypots. Within five minutes of being active, some of the machines had already been "hit" or scanned more than nineteen times! These were unknown machines, without any public awareness of their name, location, or status. The number of hacking attempts increased exponentially over the next few days! Once hackers gain access to our system, they spend time looking around, searching for anything they can find. Since these systems are honeypots, they won't find anything. The next step is for the hacker to upload his malware to our system. At this point, the hacker will attempt to run his malware, but our system ignores him, and eventually he moves on or uploads other malware. Either way we have now harvested copies of malware being used in real-life. SO WHERE DOES THE SANDBOX FIT IT? Honeypots are equipped with a "sandbox" in order to contain and prevent the code or malware from wreaking havoc. Sandboxes are also used to analyze and learn about the specific malware threat. From a press release dated November 19, 2013, "Threat Track" (which is the new name for "CWSandbox"), bills itself as the complete "malware analysis solution". To maintain congruity, we will continue to refer to "Threat Track" and "CWSandbox" simply as the "sandbox". The main job of the sandbox is to enable "users to automate the sample submission process; completely analyze any threat; and quickly act to protect sensitive data". Once the sandbox gets the malware, it is able to analyze and evaluate the actions and processes of the malicious software. This allows system administrators to evaluate the potential exposure of their networks and take the appropriate action to secure against the latest threats. Although malware authors are trying to stay ahead of sandbox technology, sandbox has managed to implement new features and controls that mimic the actions required by the malware. For example, some malware "stalls" or as kids like to say, "plays possum", waiting for a period of time to pass or a particular action to occur – such as a system reboot. As part of the analysis, sandbox mimics a system reboot and then looks to see how the malware responds to the fake reboot. Need more proof? The Federal Bureau of Investigation (FBI) bid on the public market looking to use sandbox on "any machine owned or controlled by the FBI". The knew the value of the software. One final comment about why we need sandbox. "Automated malware must be analyzed (1) automatically, (2) effectively, and (3) correctly. … This is important to realistically assess the threat posed by the malware sample." For more information, go to http://www.threattracksecurity.com/
Added 10 years ago
The Sea Dreamer Project: The Boat Shed
http://www.seadreamerproject.com/p/the-boat-shed.html
Added 6 years ago
The Secret Revolution | It's Really Not Much of a Secret… or a Revolution
http://secretrevolution.us/
Added 5 years ago
The Shit-Sandwich Generation | sand·wich gen·er·a·tion noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
https://theshitsandwichgeneration.wordpress.com/
sand·wich gen·er·a·tion; noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
Added 10 years ago
The Shit-Sandwich Generation | sand·wich gen·er·a·tion noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
https://theshitsandwichgeneration.wordpress.com/
sand·wich gen·er·a·tion; noun: a generation of people, typically in their thirties or forties, responsible for bringing up their own children and for the care of their aging parents.
Added 10 years ago
The Single Doggie Den™ Indoor Rustic Dog Kennel Crate
https://bbkustomkennels.com/product/single-doggie-den/
Discover handcrafted wooden dog kennels that blend impeccable style & ultimate comfort for your beloved pet, crafted by James+James.
Added 6 years ago
The So So Glos - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/The_So_So_Glos
Added 9 years ago
The Speckers, Finger Lakes Grassroots Festival of Music & Dance, Trumansburg, New York, July 17, 2015 | Flickr - Photo Sharing!
https://www.flickr.com/photos/amosperrine/sets/72157656271925932
Added 10 years ago
The Steely Damned | San Diego Reader
https://www.sandiegoreader.com/bands/steely-damned/
The Steely Damned is a Steely Dan tribute band (duh) originally featuring Rockola's Bob Tedde, Four Eyes guitarist Marc Decerbo, and several other local players. Guitarist Hank Easton frequently performs a medley reproducing the guitar solos from several Steely Dan guitarists, including Larry Carlton, Denny Diaz, Elliott Randall, Rick Derringer, and Jeff "Skunk" Baxter.
The original Steely Dan songs were so meticulously arranged and brilliantly played that it's a thrill to hear Walter Becker and Donald Fagen's musical fussiness copied so faithfully. Tedde doesn't sound exactly like Fagen, but he's got the laconic inflections down. And the hands of guitarist Easton channel original Jeff "Skunk" Baxter's licks so well it's scary -- to say nothing of his rock-solid copy of Jay Graydon's lead on "Peg," 12 bars of the most innovative rock guitar ever recorded. It says something that it takes several dedicated people to imitate the sound of a band that consisted of two guys. But that's the beauty of the Dan -- and the duty of the Damned.
A new incarnation of the group was launched in 2016, Steely Damned II, featuring Hank Easton and Marc Decerbo alongside longtime members Kevin Esposito (trombone), Chuck Phillips (sax), Etoile Presnell aka Ruby (vocals), Gary Taylor (drums), as well as Rob Gironda (keyboard), Doug Meeuwson (trumpet), Jim Reeves (bass), Tripp Sprague (sax, EWI, keys, percussion), and Doug Booth (guitar, keys, vocals).
Added 4 years ago
The Story of Dwayne Richard Hipp and the Development of SQLite in 1999 | HackerNoon
https://hackernoon.com/the-story-of-dwayne-richard-hipp-and-the-development-of-sqlite-in-1999-yc4v356q
hundred mi
Added 9 months ago
The Strange Story of DC's Lost AM Radio Station Still Transmitting Inauguration Road Closures From 2013
https://www.thedrive.com/tech/39549/the-strange-story-of-dcs-lost-am-radio-station-still-transmitting-inauguration-road-closures-from-2013
"Strong 'Fallout 3' vibes," says the man who discovered it.
The Strange Story of DC's Lost AM Radio Station Still Transmitting Inauguration Road Closures From 2013
https://www.thedrive.com/tech/39549/the-strange-story-of-dcs-lost-am-radio-station-still-transmitting-inauguration-road-closures-from-2013
"Strong 'Fallout 3' vibes," says the man who discovered it.
The TCP/IP Guide - DHCP Lease Allocation Process
http://www.tcpipguide.com/free/t_DHCPLeaseAllocationProcess-2.htm
Added 6 years ago
The TV that's not: NEC's Pi-powered 55" Display | Jeff Geerling
https://www.jeffgeerling.com/blog/2022/tv-thats-not-necs-pi-powered-55-display
Added 9 months ago
The Technical Guide to CMDB Best Practices
https://www.device42.com/cmdb-best-practices/
Learn the essential CMDB best practices and delve deep by reading our in-depth chapters covering CMDB visualization, discovery, and service mapping.
The Traders' Den
http://www.thetradersden.org/
The Traders' Den is a team of avid music collectors dedicated to the free trading of lossless unofficial (aka bootleg) musical audio and video recordings.
The Ultimate List of Hobbies for Men: 75+ Ideas For Your Free Time | The Art of Manliness
http://www.artofmanliness.com/2016/01/25/the-ultimate-list-of-hobbies-for-men-75-ideas-for-your-free-time/
Explore the importance of hobbies for men that bring joy, keep your mind sharp, improve your eye for detail and help you meet new friends.
Added 9 years ago
The Way Of The SEO Master [Infographic] - Word-of-Mouth and Referral Marketing Blog
http://www.referralcandy.com/blog/way-seo-master-infographic/
Added 9 years ago
The Well-Organized Carpenter
https://www.jlconline.com/tools/the-well-organized-carpenter_o?utm_source=newsletter&utm_content=&utm_medium=email&utm_campaign=JLC_TUE_070825&&oly_enc_id=1672I7149845G6F
ace in each box. I love most of my
Added 5 months ago
The Well-Tempered Computer
https://www.thewelltemperedcomputer.com/KB/Flac.htm
An introduction to computer based audio
The Woodworks Library | Evenfall Studios
http://www.evenfallstudios.com/woodworks_library/woodworks_library.html
Welcome to evenfallstudios.com
Added 6 years ago
The accidental journey to TrueNAS Scale
https://nickb.dev/blog/the-accidental-journey-to-truenas-scale/
Last month I found myself in the unenviable position of having just executed the most dangerous command on the boot drive of a NAS. At first there was panic, but I decided to look on the bright side and take this opportunity for a fresh start with TrueNAS Scale.
Added 8 months ago
The bow roof shed made of white pine and greenhouse plastic
http://www.farreachvoyages.com/thebowroofshed.html
Added 6 years ago
The chemical secrets that help keep honey fresh for so long
https://www.bbc.com/future/article/20250701-the-chemical-secrets-that-help-keep-honey-fresh-for-so-long
Honey is a natural sweetener, and bacteria loves to feast on sugar. But honey is remarkably resistant to spoilage. What's behind its ability to beat the bugs?
Added 5 months ago
The girl in the Kent State photo and the lifelong burden of being a national symbol - The Washington Post
https://www.washingtonpost.com/magazine/2021/04/19/girl-kent-state-photo-lifelong-burden-being-national-symbol/?utm_source=pocket-newtab
The girl in the Kent State photo and the lifelong burden of being a national symbol - The Washington Post
https://www.washingtonpost.com/magazine/2021/04/19/girl-kent-state-photo-lifelong-burden-being-national-symbol/?utm_source=pocket-newtab
The moral contract
https://virtualize.sh/blog/the-moral-contract/
Balancing openness and revenue: navigating the moral contract in the evolving world of free software.
Added 9 months ago
The morning habits of successful tech executives - Business Insider
http://www.businessinsider.com/morning-habits-successful-tech-executives-2015-9
The entire flow of your day can all depend on how you start it. Here's how some of the most successful people in the tech industry do each morning.
Added 10 years ago
The official WebSite of H.R.Giger-Biography
https://www.hrgiger.com/music/korn.htm
Added 5 months ago
The prevalance of productivity porn | Jannes on the web
https://jannestimm.com/posts/productivity-porn/
Productivity porn is becoming ever more prevalent in our lifes.
Added 9 months ago
The primitive tortureboard – Aresluna
https://aresluna.org/the-primitive-tortureboard/
Untangling the myths and mysteries of Dvorak and QWERTY
Added 3 months ago
The problem with bringing your “whole self” to work | by The Daily Edition | Apr, 2024 | The Medium Blog
https://blog.medium.com/the-problem-with-bringing-your-whole-self-to-work-0e116385393b
The strange world of Node.js design patterns | Mario Casciaro - Entrepreneur, Author, Engineer
https://mario.fyi/the-strange-world-of-node-js-design-patterns/
Besides the classical design patterns we all have studied and used with other languages and platforms, Node.js developers recurrently seem to implement some very specific patterns/techniques in their
Added 8 years ago
The ultimate OpenBSD router | BSD Now
http://www.bsdnow.tv/tutorials/openbsd-router
Added 11 years ago
The ultimate OpenBSD router | Hacker News
https://news.ycombinator.com/item?id=9482696
Added 10 years ago
The war on Internet advertising goes Raspberry Pi - Salon.com
http://www.salon.com/2013/09/16/the_war_on_internet_advertising_goes_raspberry_pi/
Added 10 years ago
The world's greatest internet troll explains his craft - YouTube
https://www.youtube.com/watch?v=us4Eti0UmDI
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 7 years ago
The-SIEM-Evaluators-Guide.pdf
https://cdn-cybersecurity.att.com/docs/guides/The-SIEM-Evaluators-Guide.pdf
TheEssentialHandTools-ChrisSchwarz.pdf
https://static1.squarespace.com/static/52e953e8e4b04e8cd686746b/t/54b4a19ae4b0355fe54d112f/1421123994250/TheEssentialHandTools-ChrisSchwarz.pdf
Added 7 years ago
TheNetworkGuy (Twan K.) · GitHub
https://github.com/TheNetworkGuy
Networking, security, infra, monitoring, coding. TheNetworkGuy has one repository available. Follow their code on GitHub.
TheStonedCraftsmen - Etsy
https://www.etsy.com/shop/thestonedcraftsmen/?etsrc=sdt
Their Secret: Mom's Body - tribunedigital-thecourant
http://articles.courant.com/2008-07-27/news/simmeck0727.art_1_mom-s-body-state-police-new-hampshire-law-enforcement
Added 8 years ago
These 4 Gmail alternatives put your privacy first
https://www.fastcompany.com/90392612/these-4-gmail-alternatives-put-your-privacy-first
Added 6 years ago
These 6 Pipe Shelf Ideas Are Plumb Cool
http://makezine.com/2015/06/08/6-pipe-shelf-ideas-plumb-cool/
Pipes are such a versatile material, especially for furniture. Re-energize your home storage with these easy shelf projects.
Added 10 years ago
These Quotes Will Struck You Hard. Real Hard.
http://www.edgement.com/these-quotes-will-struck-you-hard-real-hard
Added 9 years ago
Things to do after installing Debian Jessie - Daily Linux News
http://www.dailylinuxnews.com/blog/2014/09/things-to-do-after-installing-debian-jessie/
Added 10 years ago
This Band Just Finished A 28 Day Tour And Made How Much?! - Digital Music NewsDigital Music News
http://www.digitalmusicnews.com/permalink/2014/11/25/band-just-finished-28-day-tour-made-much
After 28 days on tour, the members Pomplamoose counted up every receipt, every check, and figured out how much they really made.
Added 10 years ago
This Is Your Priest on Drugs | The New Yorker
https://www.newyorker.com/magazine/2025/05/26/this-is-your-priest-on-drugs
Religious leaders took psilocybin—the compound in magic mushrooms—in a Johns Hopkins and N.Y.U. study. Many are now evangelists for psychedelics. Michael Pollan, the author of “How to Change Your Mind,” reports.
Added 6 months ago
This Old Building – The Closing of Winterland
https://theclosingofwinterland.com/
The Closing of Winterland
This fake Target account has been attacking transphobes…and it’s great · PinkNews
http://www.pinknews.co.uk/2016/05/01/this-fake-target-account-has-been-attacking-transphobes-and-its-great/?utm_source=ET&utm_medium=ETFB&utm_campaign=portal&utm_content=inf_10_60_2&tse_id=INF_199fd99773c345ea9e0aa1f169f2e22c
A fake customer service account, pretending to be US superstore Target, has been putting transphobic people in their place.
Added 9 years ago
This tiny cabin boasts a stunning timber domed interior - Living in a shoebox
https://www.livinginashoebox.com/this-tiny-cabin-boasts-a-stunning-timber-domed-interior/
For city-dwellers trying to break away from digital pollution and life’s hustle and bustle, this natural and mobile cabin is the answer. Designed by The Way We Build – an Amsterdam architecture studio – it takes serenity, peace, and nature to a whole new level.
Added 5 years ago
Thomas E. Dickey's software development projects
https://invisible-island.net/
Added 7 years ago
Thoughts and Research – Bazyli Brzóska - An inventor's portfolio
https://invent.life/blog/
Added 10 years ago
Through the Interface: Raspberry Pi
http://through-the-interface.typepad.com/through_the_interface/raspberry-pi/
Added 9 years ago
Thulium-Drake/ansible-role-request_tracker: Request Tracker, powered by Ansible
https://github.com/Thulium-Drake/ansible-role-request_tracker
Request Tracker, powered by Ansible. Contribute to Thulium-Drake/ansible-role-request_tracker development by creating an account on GitHub.
Added 2 months ago
Tib3rius/AutoRecon: AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
https://github.com/Tib3rius/AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. - Tib3rius/AutoRecon
Added 9 months ago
Tickets Are for Remembering - Public Books
https://www.publicbooks.org/tickets-are-for-remembering/
Playbills, programs, tickets: such physical documents are no longer part of seeing a show on Broadway. Does it matter? Playbills, programs, tickets: such physical documents are no longer part of seeing a show on Broadway. Does it matter?
Tickets | Dead & Company - Saratoga Springs, NY at Live Nation
https://concerts1.livenation.com/event/00005573B33C1D03?_ga=2.127051149.1867440571.1556068169-1093331399.1556068169
Added 6 years ago
Tiger Style
https://tigerstyle.dev/
Tiger Style is a coding philosophy focused on safety, performance, and developer experience.
Added 1 month ago
Tim Wise - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Tim_Wise
Added 10 years ago
Tim Wise Speech Racism, Eric Gardner, Mike Brown, Ferguson Systematic Racism - YouTube
https://www.youtube.com/watch?v=3PFDyZQVge4
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Timber Framing Hand Tools for Sale in For Sale
http://forestryforum.com/board/index.php?topic=50674.0
Timber Framing Hand Tools for Sale
Added 7 years ago
Timber frame mailbox post - household items - by owner - housewares sale
https://nh.craigslist.org/hsh/d/belmont-timber-frame-mailbox-post/6871961194.html
Added 6 years ago
Timber framing with beetle killed pine questions : timberframe
https://www.reddit.com/r/timberframe/comments/4j8tgp/timber_framing_with_beetle_killed_pine_questions/
Added 7 years ago
Tin Can in action - eFront Blog
http://www.efrontlearning.net/blog/2013/02/tin-can-in-action.html
Introduction to the Tin Can API: The Tin Can API is a brand new learning technology specification that offers a simpler and more flexible way of capturing learning activities and sharing them with a variety of other systems – opening up an entire world of experiences (online and offline). A wide range of systems can […]
Added 10 years ago
TingPing’s blog | Development blog of TingPing
https://blog.tingping.se/
Development blog of TingPing
Added 4 years ago
Tinkers Bubble an Off-Grid community in Somerset, England.
http://naturalhomes.org/tinkersbubble.htm
Tinkers Bubble is an off-grid community where they grow their own food and press apple juice.
Added 9 years ago
Tiny Houses:Small Spaces
http://tinyhousesmallspace.tumblr.com/post/62432755585
A place to share my love of tiny houses and small spaces...
<br>
<br>
<script type="text/javascript"><!--
google_ad_client = "ca-pub-6821266315164954";
/* Google Recommended */
google_ad_slot = "1747729440";
google_ad_width = 180;
google_ad_height = 150;
//-->
</script>
<script...
Added 10 years ago
Tips For Documenting IT Infrastructure - McLean IT Consulting Inc.
http://www.mcleanit.ca/blog/tips-for-documenting-it-infrastructure/
Tips for IT pros on how to start documenting IT infrastructure for clients. All small business IT pros should offer this service as part of their contract.
Added 10 years ago
Tips on Adding JSON Output to Your CLI App
https://simonwillison.net/2024/Apr/20/json-output-cli/
Kelly Brazil - also the author of jc, the neat CLI tool that converts the output of common Unix utilities such as dig into JSON - provides some useful do's …
Added 5 months ago
Tmux Config: A Guide | Built In
https://builtin.com/articles/tmux-config
Tmux is a tool for Unix that allows multiple terminal sessions to be opened within one window. Make it your own with this tmux config guide.
Added 6 months ago
To keep a Boeing Dreamliner flying, reboot once every 248 days
http://www.engadget.com/2015/05/01/boeing-787-dreamliner-software-bug/
The 787 Dreamliner has been plagued with battery woes since its early days, to the point where the Federal Aviation Administration kept it from flying the skies in the past. And while those technical difficulties are apparently taken care of, Boeing's flagship airliner could be on the way to more trouble soon. According to the FAA, there's a software bug in the 787 Dreamliner that can cause its electrical system to fail and, as a result, lead to "loss of control" of the plane. But why? The FAA says this is triggered by the aircraft's electrical generators, which could give out if they have been powered on continuously for over eight months.
Added 10 years ago
Too Close for Comfort (Act 1, Part 1) | Full Frontal with Samantha Bee | TBS - YouTube
https://www.youtube.com/watch?v=urMYjS97omY
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 6 years ago
ToolsMisc - SqueezeboxWiki
https://wiki.slimdevices.com/index.php/ToolsMisc.html#Miscellaneous_Tools
Top 10 Programming Fonts
http://hivelogic.com/articles/top-10-programming-fonts/
Dan Benjamin's personal website.
Added 8 years ago
Top 10 tricks you didn't know Asterisk could do - Inside the Asterisk
http://blogs.digium.com/2011/10/03/top-10-tricks-you-didnt-know-asterisk-could-do/
Added 10 years ago
Broken
Top 19 tools for hardware hacking with Kali Linux | Infosec
https://www.infosecinstitute.com/resources/hacking/top-19-tools-for-hardware-hacking-with-kali-linux/
Added 10 months ago
Torrent Tracker List December 2019 (160+ Trackers) to Increase Download Speed
http://www.torrenttrackerlist.com/torrent-tracker-list/
Torrent Tracker help Torrent client like ( uTorrent, BitTorrent, Transmission,) to communicate with additional seeds and peers for increasing the Downloading speed of the torrent file Wondering how? The speed of torrent downloads depends on the number of seeds and peers and quality bandwidth it has. Let Me Explain in Detail about Torrent Trackers Torrent […]
Added 6 years ago
Torrent downloads and distributions for IP 69.53.97.47
https://iknowwhatyoudownload.com/en/peer/
Detailed statistic for torrent downloads and distributions for IP address 162.19.242.151
Torrent downloads and distributions for IP 69.53.97.47
https://iknowwhatyoudownload.com/en/peer/
Detailed statistic for torrent downloads and distributions for IP address 162.19.242.151
Torrenting • freemediaheckyeah
https://fmhy.pages.dev/torrentpiracyguide#aggregators
Torrent Clients, Torrent Sites, Trackers
Toshiba E-Studio Default Administrator Username and Password — danblee.com
http://danblee.com/toshiba-e-studio-default-administrator-username-and-password/
Added 9 years ago
Touring with the Dead, Donna Godchaux, Betty Cantor Jackson 004 - YouTube
https://www.youtube.com/watch?v=hR7w5soIC8M
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 6 years ago
Toyota yaris wrc on the snow with JM Latvala - YouTube
https://www.youtube.com/watch?v=kbwVWSlKUnA
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 9 years ago
Tracking Malicious IP & Users with OSSEC - /dev/random
https://blog.rootshell.be/2011/02/02/tracking-malicious-ip-users-with-ossec/
A few months ago I blogged about Active Lists in OSSEC. Active lists are common in SIEM environments to store temporary sensitive data like IP addresses, user names or any other relevant information. Once stored in active lists, data can be reused in rules and the security of an infrastructure
Added 10 years ago
TracklistGrabber/TracklistGrabber.py at main · xannythepleb/TracklistGrabber · GitHub
https://github.com/xannythepleb/TracklistGrabber/blob/main/TracklistGrabber.py
A Python script using the MusicBrainz API to return a numbered track list for any given album. - TracklistGrabber/TracklistGrabber.py at main · xannythepleb/TracklistGrabber
Added 2 months ago
Tractors vs Riot Police - YouTube
https://www.youtube.com/watch?v=Xv-5rAkh6VI
Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.
Added 10 years ago
Training and support | Le Goût du Libre - Understanding and obtaining IT freedom
https://legoutdulibre.com/en/training/
Added 10 years ago
Translation of round hive pages at JF Dardenne site.PDF
https://warre.biobees.com/round_warre_hives.pdf
Added 6 years ago
Transparent Tor-ifying VLAN (separated WLAN SSID) with OpenWRT | René Mayrhofer
https://www.mayrhofer.eu.org/post/transparent-tor-wlan-ssid/
Why Tor allows to anonymize Internet traffic through onion routing, typically via 3 separate hops. At INS, we run one of the fastest Tor exit nodes in Austria, and provide statistical data on its usage.
Added 1 year ago
Tricks to Weigh Heavy Things w/o a Big Scale – as Weigh a Trailer
https://mechanicalelements.com/tricks-to-weigh-trailer-or-heavy-things/
How do you weigh heavy things without an industrial scale? Like to Weigh a Trailer? Here is a DIY trick using common home and shop tools.
Tricks to debug Captivate SCORM 1.2 content | BeezNest Open-Source specialists
https://beeznest.wordpress.com/2014/11/26/tricks-to-debug-captivate-scorm-1-2-content/
If you have to make Captivate-generated SCORM 1.2 content in your (web) platform and you want *more* information about what's going on, this guide might help. One of the trickiest things about Captivate and SCORM is that Captivate doesn't handle the credit/no-credit (cmi.core.credit) very well. This parameter, in combination with cmi.core.lesson_mode should let you retake…
Added 8 years ago
Tripp-Lite-Owners-Manual-753271.pdf
file:///home/kurth/Downloads/Tripp-Lite-Owners-Manual-753271.pdf
Added 7 years ago
TrippingDelightFantastic
https://www.trippingdelightfantastic.com/
Trix.py – Metadata/Converter for Hunter’s Trix – scot hacker's foobar blog
https://blog.birdhouse.org/2015/05/09/trix/
Hunter's Trix is an incredible (and very large) collection of "matrix" recordings of some of the best Grateful Dead shows. The series is produced and mixed by J
Added 6 years ago
Trojan Documentation | trojan
https://trojan-gfw.github.io/trojan/
An unidentifiable mechanism that helps you bypass GFW.
Added 8 months ago
Troubles with creating a config template for HP Aruba switch · netbox-community/netbox · Discussion #16242
https://github.com/netbox-community/netbox/discussions/16242
Troubles with creating a config template for HP Aruba switch
Added 4 months ago
Troubleshooting IKEv2 VPN Connections | Microsoft Docs
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941612(v=ws.10)
Added 7 years ago
Truck Navigation App | CoPilot Truck
https://copilotgps.com/en-us/truck-navigation/
Added 8 years ago
Truckin' With The Dead
https://gdlistening.blogspot.com/
Truckin' With The Dead
https://gdlistening.blogspot.com/
True Audio Checker - Downloads - Tau Projects
http://tausoft.org/wiki/True_Audio_Checker_Downloads
True Audio Checker - Downloads - Tau Projects
http://tausoft.org/wiki/True_Audio_Checker_Downloads