(best viewed at 800 x 600)


http://www.shambles.net
 
  Maintenance & Security


Software Cracks
http://softwarecracks.net/
Software Cracks
PLEASE stay legal and respect copyright.
Down arrowUp arrow
grey line
WiFi password hack
http://onhax.co/category/mobile-apps/
Wifi password hack v5 Apk free download Wifi password hack v5 Apk is software for hacking the WiFi password.
It is a small program which will show you all stored passwords to your wireless (WiFi) networks.
Down arrowUp arrow
grey line
3 Ways To Reset Windows Admin Password
http://bit.ly/1h283aE
3 Ways To Reset Windows Admin Password
"I frequently pick up used computers from yard sales, flea markets and such. The problem is…the password, of course. Is there a simple, easy and inexpensive way to log on and change the admin password or remove it?"
Down arrowUp arrow
grey line
Shamblesguru's Live Twitter Stream
https://twitter.com/shamblesguru
Down arrowUp arrow
grey line
Remote desktop feature added to Google Hangouts
http://bit.ly/12KNClE
Google has added a new remote desktop feature to Hangouts. This means you can video chat, troubleshoot, and control a friend's computer right in the same window.
Down arrowUp arrow
grey line
Is A DOS Attack A Weapon? | Idea Channel | PBS
http://youtu.be/rLX1x9fVYHI
Is A DOS Attack A Weapon? | Idea Channel | PBS
Down arrowUp arrow
grey line
How to Block Undesirable stuff on Your Apple Devices
http://ti.me/12Vp9g8
How to Block Undesirable stuff on Your iPhone, iPad and iPod Touch
Thinking about letting your child or teen borrow your iPad or giving them your hand me down iPhone? Just like with a PC, your big concern is probably keeping them away from inappropriate content. But an Apple product is a great choice because of their solid parental controls and the company’s strong stance against pornography — Steve Jobs once suggested that the company had a “moral responsibility to keep it off the iPhone.”
We’ll walk you through where your youngster might be able to find inappropriate content on an Apple iOS device, as well as the tools Apple provides to keep them out of it.
Down arrowUp arrow
grey line
Out of Your Password Minder .. Special Offer
http://youtu.be/Srh_TV_J144
Down arrowUp arrow
grey line
Apple adds two-step authentication option
http://bit.ly/14MzJsP
Apple adds two-step authentication option for iCloud, Apple IDs
Two-factor authentication requires that you not only know your password to log in to a service; you also need access to something else that’s linked to you. Many times, this is a cell phone; that’s precisely how Google’s two-step authentication works.
Down arrowUp arrow
grey line
Google : Webmasters help for hacked sites
https://www.google.com/webmasters/hacked/
Google : Webmasters help for hacked sites
Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner. For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions.
In this first step, we explain how and why hacks happen, and review options for recovery.
Down arrowUp arrow
grey line
How Safe Is Your PIN? [Infographics]
http://www.backgroundcheck.org/how-safe-is-your-pin/
How Safe Is Your PIN? [Infographics]
Down arrowUp arrow
grey line
VirusTotal
https://www.virustotal.com/
VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
Down arrowUp arrow
grey line
Everywhere You Should Enable 2-step Authentication
http://lifehacker.com/5938565
Here’s Everywhere You Should Enable Two-Factor Authentication Right Now
Two-factor authentication is one of the best things you can do to make sure your accounts don't get hacked.
We've talked about it a bit before, but here's a list of all the popular services that offer it, and where you should go to turn it on right now.
Down arrowUp arrow
grey line
LastPass : For Password Management (Recommended)
http://youtu.be/r9Q_anb7pwg
Down arrowUp arrow
grey line
AVG offers a Do Not Track feature
http://www.avg.com/ww-en/do-not-track
AVG offers a Do Not Track feature that lets you articulate your decision not to be tracked by some websites, applications and advertising networks.
AVG Do Not Track helps you identify websites that are collecting data about your online activities.
An icon in your browser shows the websites or advertisers collecting data about your activity and gives you the choice to allow or disallow it. The supported web browsers are Internet Explorer, Mozilla Firefox and Google Chrome.
Down arrowUp arrow
grey line
iFixit
https://www.ifixit.com/
iFixit is the free repair manual that you can edit.
We make it easy for you to fix things yourself with our online step-by-step repair guides, troubleshooting tips, and thriving community of repair technicians who want to help. Or, check out our teardowns — sneak-peeks inside the latest gadgets.
Down arrowUp arrow
grey line
PassCreator
http://passcreator.com/
PassCreator is an online tool that creates passwords with many options (lowercase,uppercase,…) Just select options then generate password with create password button.
Nowaday, we use a lot of differents passwords when we surf on the internet. There are email account, social network account, forum account, game account, blog account, ….. when you don’t have inspiration, you can use PassCreator that creates randomly passwords.
Down arrowUp arrow
grey line
What is my IP address
http://whatismyipaddress.com/
What is my IP address
Down arrowUp arrow
grey line
How to Avoid the most common passwords [infographic]
http://bit.ly/rkPEAG
How to Avoid the most common passwords [infographic]
Down arrowUp arrow
grey line
Ghostery
http://www.ghostery.com/
Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
After showing you who's tracking you, Ghostery also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where we've found them are just a click away.
Down arrowUp arrow
grey line
Computer Viruses and Threats Explained by Common Craft
http://www.commoncraft.com/virus-video
Computer Viruses and Threats Explained by Common Craft
Down arrowUp arrow
grey line
A guide to free antivirus applications on the Mac
http://bit.ly/eDt1sM
A guide to free antivirus applications on the Mac
Down arrowUp arrow
grey line
Soluto
https://www.soluto.com/
Frustrated by your sluggish and unresponsive PC?
Soluto is bringing an end to PC user frustration with transparency, killer technology, and your help
"Everything we saw suggests that Soluto is likely to go on to do amazing things. And they have a terrific business model."
Soluto’s goal is to bring an end to the frustrations PC users encounter.
Down arrowUp arrow
grey line
Password Recovery Speeds
http://www.lockdown.co.uk/?pg=combi
Password Recovery Speeds
How long will your password stand up
This document shows the approximate amount of time required for a computer or a cluster of computers to guess various passwords.
The figures shown are approximate and are the maximum time required to guess each password using a simple brute force "key-search" attack, it may (and probably will) be possible to guess correctly without trying all the combinations shown using other methods of attack or by having a "lucky guess".
Down arrowUp arrow
grey line
Secure Websites in Plain English
http://www.commoncraft.com/secure-websites-video
Secure Websites in Plain English
These days websites make security a priority, but it is hard to know when a website is secure, or what makes it so. This video teaches the basics of website security and how to recognize a secure site.
* An overview of the most common security threats
* How SSL encryption works
* How to recognize a secure connection
* In which situations security is most important
Down arrowUp arrow
grey line
CleanAfterMe
http://www.nirsoft.net/utils/clean_after_me.html
CleanAfterMe allows you to easily clean files and Registry entries that are automatically created by the Windows operating system during your regular computer work.
With CleanAfterMe, you can clean the cookies/history/cache/passwords of Internet Explorer, the 'Recent' folder, the Registry entries that record the last opened files, the temporary folder of Windows, the event logs, the Recycle Bin, and more.
CleanAfterMe is a portable application. This means that you can run it without any installation and without leaving any trace in the Registry.
You can also run this program from a USB flash drive: In order to do that, simply copy the executable file of CleanAfterMe (CleanAfterMe.exe) into the USB flash drive, and run it from there.
Down arrowUp arrow
grey line
Roboform
http://news.bbc.co.uk/2/hi/programmes/click_online/7843134.stm
Roboform
As I use more and more sites and online applications my capacity to remember passwords, and to be honest my patience in filling out lengthy forms, has become eroded. Enter Roboform - my new online best friend.
Roboform.com is the URL - and after a quick download and install you'll be asked to set a master password to protect all your data and then launched onto a webpage containing both video & online tutorials for all the aspects of this utility.
One of the features is password manager. You need to set up a passcard for all the sites you log in to - this is super easy as the form opens up automatically the first time you perform the login process.
www.roboform.com/
Down arrowUp arrow
grey line
5 Free Tools to Password-Protect Your Website
http://mashable.com/2008/05/03/5-free-tools-to-password-protect-your-sites/
5 Free Tools to Password-Protect Your Website
It’s rare that we would want to lock up our website with a password. However, there might be few occasions when we need to protect a few pages of our site (or whole) from the general public and made accessible to a selected group of users.
For such times, here are 5 neat free tools that will help you get started.
Down arrowUp arrow
grey line
Ip Address Lookup Locator
http://www.ipaddresslocation.org
Find location of any ip address and ip ranges for any country. Useful if you need to find proxy from specific country.
Down arrowUp arrow
grey line
Password Generator
http://www.safepasswd.com/
Password Generator
This is just a simple way to generate good secure passwords for use on various websites, business systems, or any other place where you may need a password. It allows you to choose various characteristics of a good password.
Down arrowUp arrow
grey line
How to use CAPTCHA
http://www.captcha.biz/
How to use CAPTCHA
How to understand, use and implement captcha to protect your web site against spam and form spamming.
A recommended site to start learning about captchas
Down arrowUp arrow
grey line
Comparisons of Captcha Software
http://www.softwaredevelopment.ca/captchas.shtml
Comparisons of Captcha Software ... Open Source
A captcha (an acronym for "completely automated public Turing test to tell computers and humans apart") is a type of challenge-response test used in computing to determine whether or not the user is human. The term was coined in 2000 by Luis von Ahn, Manuel Blum, and Nicholas J. Hopper of Carnegie Mellon University, and John Langford of IBM. A common type of captcha requires that the user type the letters of a distorted and/or obscured sequence of letters or digits that appears on the screen. Because the test is administered by a computer, in contrast to the standard Turing test that is administered by a human, a captcha is sometimes described as a reverse Turing test.
A number of open source (free) captcha solutions are available -- some of which are listed below for comparison. Please check with the developer's web site for software updates and more detailed information.
Down arrowUp arrow
grey line
3 Steps to Protect a Web Form From Spam with Captchas
http://www.protectwebform.com/howprotect
3 Steps to better protect a web form from spam
Down arrowUp arrow
grey line
Drupal : captcha
http://drupal.org/project/captcha
Drupal : captcha for Drupal, an open source content management platform.
Down arrowUp arrow
grey line
Captchas (video explanation online)
http://tinyurl.com/pe87y
Captchas (video explanation online)
Tasks like image recognition are trivial for humans, but continue to challenge even the most sophisticated computer programs. This talk introduces a paradigm for utilizing human processing power to solve problems that computers cannot yet solve.
Human Computation | Luis von Ahn | online security |
Down arrowUp arrow
grey line
McAfee Site Advisor
http://www.siteadvisor.com/
McAfee Site Advisor
We test the Web to help keep you safe from spyware, spam, viruses and online scams.
To get a security report on a particular website then just enter the URL on this page.
Down arrowUp arrow
grey line
ComputerTime
http://www.softwaretime.com/
ComputerTime is parental-control software that lets parents set limits on the amount of time and the time-of-day when their children can use the computer.
SoftwareTime believes that the computer is an amazing tool for children, both for educational and social purposes.
You no longer have to keep track of the time your children spend on the computer. ComputerTime does that for you! It takes just a few minutes to set limits for each child.
Free trial ... then US$40
Down arrowUp arrow
grey line
Sandra : P.C. diagnostic utility
http://www.sisoftware.co.uk/
SiSoftware Sandra (the System ANalyser, Diagnostic and Reporting Assistant) is an information & diagnostic utility. It should provide most of the information (including undocumented) you need to know about your hardware, software and other devices whether hardware or software.
It works along the lines of other Windows utilities, however it tries to go beyond them and show you more of what's really going on. Giving the user the ability to draw comparisons at both a high and low-level. You can get information about the CPU, chipset, video adapter, ports, printers, sound card, memory, network, Windows internals, AGP, PCI, PCIe, ODBC Connections, USB2, 1394/Firewire, etc.
Down arrowUp arrow
grey line
The captchas.net CAPTCHA-Service
http://captchas.net/
The captchas.net CAPTCHA-Service
This server provides CAPTCHA images you can use in your web page. CAPTCHA images can prevent html-forms or web pages to be used by robots.
A CAPTCHA image shows a random string which the user has to type to submit a form. This is a simple problem for (seeing) humans, but a very hard problem for computers which have to use character recognition, especially, because the displayed string is alienated in a way, which makes it very hard for a computer to decode. For more information see http://en.wikipedia.org/wiki/Captcha.
Down arrowUp arrow
grey line
Compare Anti Virus Software
http://www.reviewcentre.com/products2167.html
Compare Anti Virus Software
Avast | AVForce | CAT | ClamAV | Computer Associates | Eset | Grisoft | iDownload.com | Kaspersky | McAfee | Norton (9) OfficeScan | Panda | Safeworld | Select | Softwin | Zero-Knowledge | Zonelabs |
Down arrowUp arrow
grey line
Microsoft Shared Computer Toolkit for Windows XP
http://tinyurl.com/c7ylb
Microsoft Shared Computer Toolkit for Windows XP
Shared computers are commonly found in schools, libraries, Internet and gaming caf?, community centers, and other locations. Often, non-technical personnel are asked to manage shared computers in addition to their primary responsibilities. Managing shared computers can be difficult, time-consuming, and expensive. Without restrictions, users can change the desktop appearance, reconfigure system settings, and introduce spyware, viruses, and other harmful programs. Repairing damaged shared computers costs significant time and effort.
The Microsoft Shared Computer Toolkit for Windows XP provides a simple and effective way to defend shared computers from untrusted users and malicious software, safeguard system resources, and enhance and simplify the user experience.
Disk changes made are cleared with each restart unless the administrator chooses to save them.
Down arrowUp arrow
grey line
The Network Box
http://www.network-box.com/
The Network Box is a complete Internet Threat Protection appliance. It includes all the essential components required for computer security (firewall, intrusion detection and prevention, anti-virus, anti-spam, virtual private networking, web content filtering and company policy) - as standard - at an affordable price.
Computer security is a process, not just a box. Network Box experts install, configure and remotely maintain every single Network Box around the world. Network Box Data Centres also keep you updated by continually installing new virus signatures and security patches for you - currently, an average of eleven updates each day.
Down arrowUp arrow
grey line
What did your staff do today?
http://www.3ami.com/
What did your staff do today?
3ami Monitoring & Audit System : For continuously monitoring your employees activity and tracking changes to hardware and software throughout your organisation now captures and securely stores all incoming and outgoing emails and attachments.
Down arrowUp arrow
grey line
Is Your Computer Under Attack?
http://www.zone-h.org/
Check here to see if your server has been hacked ... or is under attack ...
Down arrowUp arrow
grey line
BootDisks - PC Support - Essential Utilities
http://www.bootdisk.com/
BootDisks - PC Support - Essential Utilities
TuneUp Your Computer | Get Scandisk And Defrag To Work | Drivers | Windows | Updates | networking |
Down arrowUp arrow
grey line
Drive Vaccine PC & Mac
http://www.drivevaccine.com
Drive Vaccine is the first Desktop Security solution to provide cross-platform protection of both PC and Mac workstations. Regardless of what any user does?ncluding erasing files, installing software, downloading viruses, or deliberately tampering with desktop settings?orkstations will rollback to their desired configuration upon restart. And the workstations will be perfectly configured and available for the next user... Without the need for any IT troubleshooting whatsoever.
Drive Vaccine is designed for organizations that demand optimal availability and functionality of thier public access computers.
Down arrowUp arrow
grey line
Welcome to Kelly's Korner
http://kellys-korner.com/
Welcome to Kelly's Korner
Windows Troubleshooting & Support
windows | maintenance | troubleshooting | devide ID | reg/VB files | DLL | DLL's | VXD | multi-booting | XP from A to Z | setup | conflicts | XP Tweaks | Registry Edits | XP Drivers |
Down arrowUp arrow
grey line
SC Online: Security Magazine
http://www.scmagazine.com/
SC Magazine is the largest circulation information security magazine and is read in more than 50 countries around the world. It is also published in three separate editions - choose the edition which is located in your region. SC On-Line contains a wealth of additional articles. Information Security News contains daily news. These web sites contain a wealth of useful information including articles, product reviews, test results, white papers, useful links to solution providers.
IT | ICT | security | magazine | online | virus | viruses | firewalls | network | networks | cybersecurity | telecommuters | soho | internet | network | LAN | UPS | VPN |
Down arrowUp arrow
grey line
Belarc
http://www.belarc.com/
Belarc, Inc. develops and licenses Web based products which help make personal computers easier to use and maintain by both large and small business users and individual consumers.
Check the configuration of your computer, including a list of software installed... with serial numbers .. impressive and useful free utility. Belarc Advisor - Free Personal PC Audit | BelManage - Intranet product |
Down arrowUp arrow
grey line
Cyveillance : Put an End to Online Piracy
https://www.cyveillance.com/
For companies whose digital assets are core to their businesses, online piracy has become a very real and costly issue that requires a proactive and comprehensive solution. Cyveillance helps companies prevent revenue leakage from online piracy.
Cyveillance's Digital Asset Protection Solution helps companies proactively prevent revenue leakage by identifying unauthorized use and distribution of their digital assets.
Brand Protection | Digital Asset Protection | Copyright | Watermarks | Watermark |
Down arrowUp arrow
grey line
CLICK for PAGE 2more links to websites on this topic



use this box to search more on Shambles (powered by Google) : safe filtering is ON
Google  
Custom Search
Use this form to submit links to add to the list above (the webmaster will check the link before publication)
 Heading:
 Address:
 Please copy
 Security Code:
    
 Description:
grey line
webkeeper: Chris Smith csmith@csmith.info Shambles RSS Feed :
(50 entries) | Click here to report broken links or problems |
grey line
Custom Search


webpage with others

Forward to ...

Forward to ...


Forward to ...

Take a guided tour of the Shambles website

Web 2.0 in Teaching and Learning on the Shambles website

The Shambles 'Forest of Theme Blogs'

Podcasts and Podcasting on Shambles

Shambles newsletter

Workshops offered by Chris Smith

Chris Smith's Personal Learning Network

chat live online

Second Life ... 3D online virtual world

International Schools Island in Second Life

Shamblesguru on YouTube ... video online

ShamblesPAD (built on Etherpad) .. Collaborate on documents in really real-time


Follow me on Twitter : Shamblesguru


 
© copyright
The Education Project Asia
Support Shambles with a donation (through PayPal) if you feel suitable ...  many thanks if you do  .... Chris

QR Code Shambles mobile


QR Code leading to a Shambles mobile web page




niXtech Solutions is The Boutique Data Center offering dedicated IT facilities along with cloud based computing with a full array of appliances and services. Located near Copenhagen, Denmark, with secure infrastructure, state-of-the-art equipment, privately financed, debt free.




The Shambles.NET Home Page: curating and sharing - teaching and learning experiences ... managed by Chris Smith (Shamblesguru)

| Shambles Home | Brunei Schools : bn | Burma/Myanmar Schools : mm | Cambodia Schools : kh | China Schools : cn | Hong Kong Schools : hk | India Schools : in | Indonesia Schools : id | Japan Schools : jp | Laos Schools : la | Macau Schools : mo | Malaysia Schools : my | Philippines Schools : ph | Singapore Schools : sg | South Korea Schools : kr | Taiwan Schools : tw | Thailand Schools : th | Vietnam Schools : vn | email webmaster (Chris Smith) |

Pause
Resume