Raspberry Pi as a Network Monitoring Node
Using an inexpensive Raspberry Pi system for remote network troubleshooting
Credit: Raspberry Pi
The Raspberry Pi is an amazing little inexpensive Linux-based computer. It has been remarkably successful and there have been over 1 million Raspberry Pi systems sold. The Raspberry Pi can also be a useful tool in conventional IT environments and can be an inexpensive way to perform remote network monitoring. In this article we cover how to get a Raspberry Pi up and going and how to configure it for network monitoring purposes. For less than $50 you can have a remotely accessible network device for testing and troubleshooting up and working in less than 30 minutes.
How to Root the Google Nexus 4.
The Nexus 4, being a smartphone geared towards Android developers, is relatively easy to root; the whole process requires the use of some simple fastboot commands, which even novice users can master relatively quickly. Here’s how to get started.
To root your Nexus 4, you will first need to unlock the handset’s bootloader, which means wiping all of your data. With that being the case, make sure you’ve backed everything up first so that you can transfer it all back to your device when you’re done. Once that’s done, follow the steps below.
How-To: XBMC 11 the XBMCbuntu way
For all intents and purposes, the original Xbox, with its NVIDIA GPU, 8-10GB hard disk and custom Pentium III processor was a high-end PC for its time — albeit, one that connected to a television. What Microsoft didn’t realize back then, though, was that when you put that kind of hardware in the hands of hackers and enthusiasts, it’s only a matter of time before people start doing more than just playing Halo. Fast forward to 2003, the year the Xbox Media Center was born. Nowadays, it’s simply referred to as XBMC, since it runs on more than just your Xbox. In brief, XBMC is an open-source software solution that enables a plethora of media streaming capabilities on all sorts of devices. What once was limited to the original Xbox, can now be put to use on everything from a bare-bones Linux desktop to an Apple TV. In this how-to, we’ll show you how to build a simple XBMC setup using XBMCbuntu. Catch us after the break for the full step-by-step.
How to Create a Fake Identity and Stay Anonymous Online
You don’t need to have evil motives for wanting to fake your identity or go incognito online; for many people, it’s a matter of privacy and avoiding spammers and scammers. Thankfully, there are a great many tools for staying anonymous online. Here are a few of the best.
The Browser’s Incognito Mode
The private browsing mode in Google Chrome, Firefox, and other browsers records no information about your browsing, including form data you enter, files you download, or history of pages you visit. It’s handy for many things beyond porn. To launch a window in private browsing mode, use these keyboard shortcuts:
Hack Your Way Into Facebook’s New Timeline Featur
Facebook’s new Timeline view.Most users will have to wait a few weeks before they get to see Facebook’s most drastic changes to the service since the company was founded, but you can use a developers’ workaround to gain access to the Timeline feature right now.
Developers already have access to early beta versions of the new features. Luckily for users eager to try out the revamped Facebook, becoming a developer is a simple process that shouldn’t take you more than 5 or 10 minutes.
Facebook announced the updates Thursday at the company’s f8 developers’ conference.
Android App Turns Smartphones Into Mobile Hacking Machines
“We wanted to create a penetration testing tool for the masses, says Itzhak “Zuk” Avraham, founder of Tel-Aviv-based Zimperium. “It’s about being able to do what advanced hackers do with a really good implementation. In your pocket.”
Why Hackers Write Computer Viruses
Why do hackers hack?
Why create a worm that sends out an email to everyone in your contact list, or a Trojan that deletes your term papers? Is it mischief, malice, money, or something else entirely?
This is the question that was on my mind when I met with Mikko Hypponen, a legendary computer security heavyweight who has been hunting viruses for 25 years—since Brain.a, the first PC computer virus.
From the plaza, I walked out to a seat by the water facing the San Francisco Bay. Hypponen was there, waiting for me. I sat down next to him. I felt like we needed code phrases.
Rule Your Computer From Afar by Setting Up Wake-on-LAN
Wake-on-LAN isn’t a new technology, but with the increasing number of smartphones making their way to the market, it’s high time we looked at how you can make a home theater PC, or any hard-wired system in your house, wake up from anywhere with free tools and bit of tinkering. Here’s how to get started.
Music by Rappy McRapperson
Copyright © 2010-2024 I am G33K… All rights reserved.
This site is using the Desk Mess Mirrored theme, v2.5, from BuyNowShop.com.