Pinboard bookmarks for May 2006
u:onekThe Perfect Setup - CentOS 4.3 (64-bit) | HowtoForge - Linux Howtos and Tutorials
2006-05-02
This is a detailed description how to set up a CentOS 4.3 based server that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/IMAP, Quota, Firewall,
linux centos server howto sysadmin install lazysheep
2006-05-02
No Pants Day is TODAY!
2006-05-06
e are hundreds of celebrations going on. Send pictures to PICS AT NOPANTSDAY.CO
lazysheep
2006-05-06
EFF: What Peer-to-Peer Developers Need to Know about Copyright Law
2006-05-06
"[O]ne who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties."
lazysheep
2006-05-06
BitTorrent.org » For Developers » Protocol Specification
2006-05-07
protocol refers to pieces of the file by index as described in the metainfo file, starting at zero. When a peer finishes downloading a piece and checks that the hash matches, it announces that it has that piece to all of its peers.
Connections contain
bittorrent protocol programming lazysheep
2006-05-07
Hack Attack: Automatically download your favorite TV shows - Lifehacker
2006-05-10
Hack Attack: Automatically download your favorite TV shows
bittorrent howto tv television download lifehacks lazysheep
2006-05-10
PingMag - The Tokyo-based magazine about "Design and Making Things" » Archive » 5 Steps to CSS Heaven
2006-05-19
is very useful when you need to have various colours / strengths of text on your site, but want to keep things streamlined.
Posted by: Administrator on May 19th, 2006 at 5:38 pm
css webdesign tutorial development howto tip lazysheep
2006-05-19
Cracking WEP and WPA Wireless Networks - Docupedia
2006-05-24
# sing -k N (where N=1..17) or -y to vary your attack method.
# Increase the fudge factor. By default it is at 2, by specifying -f N (where N>=2) will increase your chances of a crack, but take much longer. I find that doubling the previous fudge factor
wireless security hacking howto wep networking
2006-05-24