This will totally give new meaning to the term auto-pilot: GM will be launching a vehicle with an actual self-driving system in its 2008 Opel Vectra.
read more | digg story
Saturday, August 27, 2005
Thursday, August 25, 2005
Wednesday, August 24, 2005
Apply Custom Views to All Folders in Outlook 2003
I just have to say that ever since this client asked me to change the folder view on all their users I was searching everywhere for a solution. It would appear to be all too easy, but I guess it didn't make sense enough to become an actual feature. I pretty much followed this article and got it working.... Minus the creating the shortcut with the special "/cleanviews". I just started up Outlook and began making the changes as it said. View the article here.
Tuesday, August 23, 2005
Hacking Related Videos and Demos
...and other fun stuff
The videos can be found at Remote Exploit, Iron Geek, Crime Machine, The Tech Domain, and Hacking Defined.
CiscoRemote Router Traffic Sniffing
Wireless
WPA CrackingVoid11 Mass De-Authentication128 bit WEP Cracking
Bluetooth
Bluesnafing a Bluetooth Enabled Mobile Phone
Network & Vulnerability Scanning
Basic Introduction to Nessus Security ScannerBasic Introduction to Network Mapping using nmapPenetration Test Reconstruction
Link Encryption Analysis
Exploiting Weaknesses of PPTP VPNDecrypting SSL Traffic using Man In The Middle Techniques (MITM)Tunneling Exploits via SSH
Password Recovery
Cracking Syskey and the SAM on Windows Using Samdump2 and JohnLocal Password Cracking Presentation
Hardware ModificationsNetgear WG511 External Antenna Modification
The videos can be found at Remote Exploit, Iron Geek, Crime Machine, The Tech Domain, and Hacking Defined.
CiscoRemote Router Traffic Sniffing
Wireless
WPA CrackingVoid11 Mass De-Authentication128 bit WEP Cracking
Bluetooth
Bluesnafing a Bluetooth Enabled Mobile Phone
Network & Vulnerability Scanning
Basic Introduction to Nessus Security ScannerBasic Introduction to Network Mapping using nmapPenetration Test Reconstruction
Link Encryption Analysis
Exploiting Weaknesses of PPTP VPNDecrypting SSL Traffic using Man In The Middle Techniques (MITM)Tunneling Exploits via SSH
Password Recovery
Cracking Syskey and the SAM on Windows Using Samdump2 and JohnLocal Password Cracking Presentation
Hardware ModificationsNetgear WG511 External Antenna Modification
Subscribe to:
Posts (Atom)