recentpopularlog in

rtopitt : hack   82

« earlier  
Rails SQL Injection Examples
This page lists many query methods and options in ActiveRecord which do not sanitize raw SQL arguments and are not intended to be called with unsafe user input. Careless use of these methods can open up code to SQL Injection exploits. The examples here do not include SQL injection from known CVEs and are not vulnerabilites themselves, only potential misuses of the methods.

Please use this list as a guide of what not to do.
rails  ruby  sql  injection  bug  hack  active_record  how-to  boa_prática  security  compilation  database 
june 2013 by rtopitt
Install Mountain Lion on As Many Macs As You Want Without Purchasing Additional Copies
One of the upsides of OS X Mountain Lion's already low purchase price of $20 is that one copy can be re-downloaded and installed on any other Macs that you own for free. The downside, of course, is that if another Mac in the household doesn't share the same Apple ID as you, the buyer, you have to get another copy. As it turns out, there's a very simple solution so you can just reinstall from the same copy as many times as you need to.
apple  mountain_lion  10.8  instalação  hack  apple_id  app_store  mac_os_x  tip 
june 2013 by rtopitt
Real Business - How I got a blank book to the top of the Amazon charts
Here's how I published a bestseller in just nine days (and made a million authors instantly hate me)
hahaha  hack  troll  amazon  livro  história  sacanagem  inspiração 
april 2012 by rtopitt
How to Install Android on an iPhone in Six Easy Steps
If you've got an iPhone, are a little bored with iOS, and you're interested in moonlighting with Google's Android operating system, you can dual boot Android and iOS side-by-side on your iPhone in a few relatively simple steps.
android  iphone  how-to  geek  hack  dual-boot  jailbreak  google  linux  celular 
november 2010 by rtopitt
Sidejack Prevention - GitHub
GitHub was susceptible to this attack, but we have now taken measures to protect you and your data. The basic approach revolves around setting a second cookie (in addition to the normal session cookie) that is marked as secure. Cookies marked secure, are sent only over SSL requests and are omitted on non-SSL requests.
cookie  sessão  hijack  hack  geek  webapp  http  importante  inspiração  ssl  security 
october 2010 by rtopitt
ROM Customizada para o Milestone baseada no Froyo 2.2.1
android  froyo  2.2  rom  motorola  milestone  celular  google  hack  diy  geek 
october 2010 by rtopitt
How to Access Hulu and Other U.S.-Only Services Using Squid
We're going to set up the U.S. server to run a proxy (alongside Apache, because my server is a web server, too). Then we're going to tell our computer to use that proxy for the web, but only if the URL is or
hulu  pandora  how-to  proxy  squid  hack  internet  ip  geo  linux  geek  server  tip 
october 2010 by rtopitt
How to Build a Hackintosh Mac and Install OS X in Eight Easy Steps
Building a Hackintosh from scratch—that is, installing Mac OS X on non-Mac hardware—has never been easier, and the final product has never performed better. Here's how it works.
apple  hack  hackintosh  how-to  os  sistema_operacional  os_x  mac  pc  instalação  geek  configuration 
october 2010 by rtopitt
Firesheep - Eric Butler - Software Developer in Seattle WA
HTTP session hijacking is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy. Today at Toorcon 12 I announced the release of Firesheep, a Firefox extension designed to demonstrate just how serious this problem is.
cookie  firefox  https  http  webapp  hack  extensão  ssl  xsrf  sessão  importante  security 
october 2010 by rtopitt
CSS3 support in Internet Explorer 6, 7, and 8
IE-CSS3 is a script to provide Internet Explorer support for some new styles available in the upcoming CSS3 standard.
css3  css  ie  javascript  script  webdesign  hack  internet_explorer 
october 2010 by rtopitt
Using Geokit with Searchlogic - Binary Logic
Como integrar buscas via Searchlogic com georeferenciamento via GeoKit
geokit  georeferenciamento  geo  busca  active_record  searchlogic  importante  hack  patch  rails  tip 
june 2010 by rtopitt
How I Built a Working Poker Bot, Part 1
Several years ago, a client asked me to come up with a prototype for a real-money online poker bot. That's right: a piece of software you park on your computer while it goes out to a site like PokerStars or Full Tilt and plays no-limit Holdem for you, at 4 or 14 different tables, for real-money stakes. Well, I'm here to tell you that online poker bots are 100% real, and I know this because I've built one. And if I can build one, well. Anybody can build one. What's more, over the course of this multi-part article, I'll show you how.
c++  bot  hack  poker  online  software  windows  geek  how-to  api  algorithm  tip  programming 
may 2010 by rtopitt
Top 25 Most Dangerous Programming Errors - CWE - 2010 CWE/SANS
The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.
top10  software  bug  hack  invasão  importante  proteção  security  programming 
march 2010 by rtopitt
How To Hack Your Brain, Part 1: Sleep | Dustin Curtis
I discovered that what I probably have is called non-24-hour sleep-wake syndrome. There’s a way to fix it using a hack called polyphasic sleep, which is really fascinating and can be used by anyone. It can shave 6 hours off your normal sleeping time (with a catch, of course).
sono  dormir  artigo  bizarrice  cérebro  descanso  how-to  hack  rem  science 
march 2010 by rtopitt
Image Forensics : Error Level Analysis
If you’ve ever wondered just how much editing goes into a particular photograph, there’s now a super easy way to find out for yourself. Image Error Level Analyser is a simple web application that takes a URL to a JPEG photo and returns an image showing differing “error levels” in the image. Thus, you can now investigate any JPEG you find on the Internet to see roughly how much the photograph has been edited or manipulated. The app even gives you a permalink to the resulting image comparison.
hack  photoshop  online  python  jpg  ferramenta  edição  fake  comparação  forense  falso  inspiração  webapp  url  analysis 
february 2010 by rtopitt
Pack a Gun to Protect Valuables from Airline Theft or Loss - Security - Lifehacker
If you don't like your bags being out of your sight and it makes you uncomfortable to think that airline workers are rifling through your stuff, you can take advantage of the TSA's own security rules by—eek—packing a gun.
bizarrice  viagem  eua  regra  subversão  tsa  aeroporto  mala  hack  security  weapon  gun 
january 2010 by rtopitt
Hacked STOP Signs (Photos) - Urlesque
While it may be illegal to deface traffic signals for a variety of reasons (violent car crashes), these stop signs feature a clever line or cliché that includes the word stop.
hahaha  hack  graffiti  intervenção  arte  stop  placa  trânsito  sinal  photo  gallery 
january 2010 by rtopitt
What the Internet knows about you
This page checks your browser history and determines which of the 5000 most popular Internet websites you've recently visited.
internet  hack  navegador  feature  bug  histórico  javascript  html  importante  privacidade  security 
september 2009 by rtopitt
How To: Hackintosh a Dell Mini 9 Into the Ultimate OS X Netbook - Dell mini 9 hackintosh guide - Gizmodo
I am typing this on a 9-inch, 3G-equipped, almost-pocketable computer, running the best consumer OS money can currently buy. It costs around $400. Do you want one too? Here's how to get yours.
apple  dell  mini  netbook  how-to  instalação  mac_os_x  hack 
july 2009 by rtopitt
How to Store/Load Wii Games via USB Hard Drive on System Menu 4.0 [Slick Tricks Part 2]
All you need for the hack is a Wii you don't mind mucking around in, a blank SD card, an external USB 2.0 hard drive that will be totally dedicated for the project, and a handful of software tools freely available online. Check out Mike's excellent and updated tutorial at the link below for more details.
wii  nintendo  hack  videogame  usb  hd  sd  how-to  importante 
june 2009 by rtopitt
Top 40 Arduino Projects of the Web | Hack N Mod
ince we love the ever-popular Arduino, we’ve scoured the vast reaches of the interweb and unearthed the best Arduino projects just for you. The Arduino is an open source programming platform which allows you to easily control electronics with a microco
arduino  eletrônica  geek  hack  software_livre  top10 
may 2009 by rtopitt
philosecurity » Blog Archive » Interview with an Adware Author
Entrevista com cara que escrevia adwares para Windows, e conta seus truques
adware  entrevista  geek  hack  vírus  windows  tip  programming 
may 2009 by rtopitt
Coding Horror: Dictionary Attacks 101
If you're a moderator or administrator it is especially negligent to have such an easily guessed password. But the real issue here is the way Twitter allowed unlimited, as-fast-as-possible login attempts.
ataque  dicionário  hack  senha  twitter  webapp  analysis  security  tip 
may 2009 by rtopitt
Secret Geek A-Team Hacks Back, Defends Worldwide Web
"Oh shit," he mumbled. "I just broke the Internet."
artigo  bug  dns  dnssec  geek  hack  internet  reportagem  security 
may 2009 by rtopitt
20ksw89.gif (imagem GIF, 640x480 pixels)
Bypassando a senha de um computador windows sem usar nenhum software externo (gif animado)
bizarrice  geek  hack  microsoft  senha  windows  security  tip 
may 2009 by rtopitt
An Illustrated Guide to the Kaminsky DNS Vulnerability
This paper covers how DNS works: first at a high level, then by picking apart an individual packet exchange field by field. Next, we'll use this knowledge to see how weaknesses in common implementations can lead to cache poisoning.
artigo  dns  geek  hack  security 
may 2009 by rtopitt
CCC - Chinese Wall
Especially for people with little experience it is important to have simple solutions to break through walls. For this reason we present the FreedomStick. The FreedomStick is an ordinary USB stick with the TorBrowser and Torprojects software preinstalled.
china  criptografia  firewall  hack  onion  pendrive  tor  usb  security 
may 2009 by rtopitt
CCC - Chinese Wall
China has built a wall. These days, walls are not only built upon hills and fields, but in the internet as well. The people living in China live behind a wall, and only officially approved content may pass this wall. Since thousands of reporters are enter
china  firewall  hack 
may 2009 by rtopitt
Schneier on Security: Hacking Mifare Transport Cards
Hackeando o chip dos cartões de transporte público do Rio (Riocard)
artigo  chip  geek  hack  riocard  security  bus 
may 2009 by rtopitt
Targeting IE7 with CSS rules at Daniel Bergey
Como fazer regras CSS serem aplicadas apenas sobre IE6 ou apenas sobre IE6 e IE7
css  hack  ie6  ie7  internet_explorer  microsoft 
may 2009 by rtopitt
iplist is a list based packet handler which uses the netfilter netlink-queue library (kernel 2.6.14 or later). It filters by IP-address and is optimized for thousands of IP-address ranges. to protect your privacy while sharing with others
banimento  bittorrent  geek  hack  ip  linux  lista  p2p  privacidade  network  security 
may 2009 by rtopitt
My Webapplication Firewall - 0x000000 # The Hacker Webzine
It basically is a miniature webapplication firewall that can help secure your server and applications too.
apache  firewall  hack  htaccess  webapp  security 
may 2009 by rtopitt
Here we are now, entertain us » Fun with Amazon S3 in Ubuntu Hardy
Como montar um bucket no Amazon S3 como um sistema de arquivos local no Ubuntu (Hardy)
amazon  backup  geek  hack  hardy  how-to  montar  s3  sistema_de_arquivo  ubuntu 
may 2009 by rtopitt
Gtk Wiimote Whiteboard
This is the homepage for my version of the WiiWhiteboard ( written in Python and ported to Linux.
geek  gtk  hack  linux  python  whiteboard  wii  wiimote 
may 2009 by rtopitt
Camera Hacks: Turn Your Point-and-Shoot into a Super-Camera
If you're using a consumer grade point-and-shoot Canon digital camera, you've got hardware in hand that can support advanced features way beyond what shipped in the box. With the help of a free, open source project called CHDK, you can get features like R
canon  câmera  digital  diy  firmware  hack  how-to 
may 2009 by rtopitt
Bug site magazine luiza WII = R$30 / PS3 = R$170 (entregaram!!!) - Fórum hardMOB
Bug no site da loja Magazine Luiza permitiu vender Wii a 30 reais, PS3 a 170 reais...
bizarrice  bug  desconto  fórum  hack  ps3  wii 
may 2009 by rtopitt » Archive » Poor Man’s Earbud Cord Wrap
Construindo um prendedor de fio de fone de ouvido baratinho, de papel
diy  fone  hack  how-to  prendedor 
may 2009 by rtopitt
Johnny Chung Lee - Projects - Wii
Projetos do chinês maluco com Wiimote
diy  geek  hack  nintendo  projetor  software  wii 
may 2009 by rtopitt
Hack into a Windows PC - no password needed - Security - Technology
A security consultant based in New Zealand has released a tool that can unlock Windows computers in seconds without the need for a password, via the FireWire port.
bizarrice  falha  firewire  hack  microsoft  security 
may 2009 by rtopitt
WEBtudinho v. 2.0 - » PNG transparente no Internet Explorer com PainlessPNG
O PainlessPNG cria um helper que mostra as imagens PNG de forma normal se o seu browser for qualquer um, exceto no IE5 e no IE6, onde ele utiliza o filtro AlphaImageLoader, método recomendado pela Microsoft.
hack  ie  microsoft  plugin  png  rails  transparência  tip 
may 2009 by rtopitt
Secure Passwords Keep You Safer
For years, I have said that the easiest way to break a cryptographic product is almost never by breaking the algorithm, that almost invariably there is a programming error that allows you to bypass the mathematics and break the product. A similar thing is
artigo  brute_force  criptoanálise  criptografia  hack  senha  security 
may 2009 by rtopitt
iPod Touch: Depois de um mês | Meio Bit
Análise de uso do iPod Touch, e instalação de 51 aplicações extras
apple  geek  hack  ipod  jailbreak  review  touch  application 
may 2009 by rtopitt
how to crack your wifi passphrase (wpa) - video - Sclipo
this video shows you how to crack a wpa wifi passphrase with an Ubuntu (linux).
crack  hack  how-to  ubuntu  wireless  wpa  network  security  video 
may 2009 by rtopitt
Change displayed column name in Rails validation messages - The Pug Automatic
Maneira de alterar o nome humanizado dos atributos de um model em Rails
hack  model  rails  tip  programming 
may 2009 by rtopitt
A coisa mais insanamente impressionante que um ser humano já conseguiu fazer com um Wii Remote - Continue »
Projetar uma interface numa parede e interagir com ela na parede. Ou melhor: já que o Wii Remote tem capacidade para até quatro pointers, nada impede de se fazer interfaces multitouch, que respondem a dois “pontos” ao mesmo tempo.
bizarrice  diy  geek  hack  infravermelho  led  multitouch  remote  wii  wiimote  youtube  video 
may 2009 by rtopitt
DIY head-tracker takes Wiimote hacking to dizzying new heights - Engadget
Johnny Chung Lee ataca novamente, com um sistema de visão 3D usando tvs normais, o wii remote e leds infravermelhos na cabeça!
3d  diy  geek  hack  nintendo  realidade_virtual  tv  wii  wiimote 
may 2009 by rtopitt
24 ways: Conditional Love
Maneiras de implementar CSS condicional, dependendo do browser do visitante
css  hack  html  javascript  webdesign  tip 
may 2009 by rtopitt
24 ways: Transparent PNGs in Internet Explorer 6
Dica para usar PNGs com transparência no IE6
css  hack  ie6  javascript  png  webdesign  tip 
may 2009 by rtopitt
5min - How To Hack a Soda Machine - Video
Como pegar 2 refrigerantes pelo preço de 1 em uma máquina de vender refrigerantes
cheat  geek  hack  how-to  refrigerante  video 
may 2009 by rtopitt
Hack Attack: Build a Hackintosh Mac for Under $800
Como instalar o Mac OS X 10.5 (Leopard) em um PC comum não-Apple
apple  geek  hack  how-to  instalação  leopard  mac  pc 
may 2009 by rtopitt
Expulsador de crianças com jato d'água automático, controlado por computador e reconhecimento de movimento
bizarrice  geek  hack  reconhecimento  visual 
may 2009 by rtopitt
Flo Control
Porta de gato com reconhecimento facial para não deixar o gato entrar se estiver com um bixo na boca (ou se não for o gato)
animal  eletrônica  gato  geek  hack  hardware  porta 
may 2009 by rtopitt Bringing Down the House: How Six Students Took Vegas for Millons: Books: Ben Mezrich
A Massachusetts Institute of Technology professor teaches a group of students to use mathematics to count cards and increase their odds of winning at Las Vegas casinos. The students are able to bring home millions as a result.
21  blackjack  cassino  geek  hack  livro  matemática 
may 2009 by rtopitt
Free Iphone Unlock - The Free Iphone Software Unlock!
Software livre para destravar o iPhone e poder usá-lo com qualquer operadora GSM
apple  celular  destravamento  hack  iphone  software_livre 
may 2009 by rtopitt
PNG transparente no Internet Explorer
Um simples tutorial que ensina como corrigir o problema de transparência do PNG no Internet Explorer.
css  hack  how-to  ie  png  transparência  webdesign  tip 
may 2009 by rtopitt
Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK Graphical User Interface and runs on Windows, Mac OS X (Intel CPU), Linux.
criptografia  geek  hack  rainbow_table  senha  windows  security 
may 2009 by rtopitt
Coding Horror: Rainbow Hash Cracking
Artigo sobre cracking de senhas do Windows usando rainbow tables, via Ophcrack
artigo  criptografia  geek  hack  how-to  rainbow_table  senha  windows  security 
may 2009 by rtopitt
Como ampliar o alcance / potência de antenas wi-fi usando papel alumínio
antena  geek  hack  wi-fi  youtube  aluminium  network  video 
may 2009 by rtopitt
Como ampliar o alcance / potência de antenas wi-fi usando papel alumínio
antena  diy  geek  hack  how-to  wi-fi  aluminium  network 
may 2009 by rtopitt
CSS - Clearing floats
A common problem with float-based layouts is that the floats' container doesn't want to stretch up to accomodate the floats. If you want to add, say, a border around all floats (ie. a border around the container) you'll have to command the browsers someho
css  div  float  hack  how-to  webdesign  tip 
may 2009 by rtopitt
Utilizando o tcpdump e o wireshark « InFog
Monitorar o tráfego de rede é algo fundamental para a solução de problemas. Um programa muito bom para fazer isso é o tcpdump. O tcpdump é um conhecido sniffer do mundo GNU/Linux, um sniffer é um programa que faz com que a placa de rede entre em mo
geek  hack  linux  tcp/ip  network  tip 
may 2009 by rtopitt
Single line of HTML crashes IE 6 - I’m Mike
A Japanese blogger who goes by the name Hamachiya2 has discovered a single line of HTML and CSS that crashes IE 6.
bug  geek  hack  ie  microsoft  navegador 
may 2009 by rtopitt
Scuttle/Redirector - DreamHost
Fix para problemas com Scuttle 0.72 e PHP 5.2 na Dreamhost
dreamhost  hack  php  scuttle 
may 2009 by rtopitt
First Ever Wii Modchip REVIEW - CycloWiz for Wii!!! - MAXCONSOLE
Review de um modchip funcional para Wii, supostamente o primeiro lançado
hack  modchip  nintendo  review  wii 
may 2009 by rtopitt
» Create a software box Photoshop Tutorial
Como criar uma "caixa" de software no photoshop
hack  how-to  photoshop 
may 2009 by rtopitt
Ubuntu sem a tecla “win” | Andre Noel
Como trocar a tecla "Windows" do teclado por uma tecla Ubuntu
geek  hack  how-to  teclado  ubuntu  windows 
may 2009 by rtopitt Wii Linux - Main Page
Projeto dedicado a rodar Linux no Wii, e usar o Wiimote e Nunchuck no PC
geek  hack  linux  nintendo  wii  wiimote 
may 2009 by rtopitt
« earlier      
per page:    204080120160

Copy this bookmark:

to read