Wastholm.com

This guide describes how to create encrypted directories. These can come in handy for laptop users, password lists and the like.

Matt Knox, a talented Ruby instructor and coder, talks about his early days designing and writing adware for Direct Revenue. (Direct Revenue was sued by Eliot Spitzer in 2006 for allegedly surreptitiously installing adware on millions of computers.)

ASCII art is nothing new, but this takes it one step further by allowing you to embed another data file within the image!

The resulting ASCII art remains printable (i.e. no special unicode symbol) - this means you can print the image out, hang it on your wall, and have it look like an innocent ASCII art when it's hiding a secret document of your choice.

The following examples show how to use the mysql client program to set up new users.

Home Office has quietly adopted a new plan to allow police across Britain routinely to hack into people’s personal computers without a warrant.

Here are snippets from my Flex code, and my Acegi configuration. If you notice, what we did, was set up Acegi, so it's successful and unsucessful authentication url's point to XML documents that contains the result of the login.

This chapter will show you how to use sendmail to create a mail server that will relay your mail to a remote user's mailbox or incoming mail to a local mail box. You'll also learn how to retrieve and send mail via your mail server using a with mail client such as Outlook Express or Evolution.

Remote searches of suspect computers will form part of an EU plan to tackle hi-tech crime.

We have seen the future of botnets, and it is a distributed, low-key affair. Are sites running free software finally becoming malware targets?

So how did this otherwise lucid, intelligent woman end up sending nearly half a million dollars to a bunch of con artists running what has to be one of the best-known Internet scams in the world?

|< First   < Previous   181–190 (222)   Next >   Last >|