WARNING: This is a very dry and dull article, reading this could cause bordom to the point of coma, read at your own risk!!
Ok, well after I got Ubuntu up and running I had a little problem, Ubuntu didn't recognize my wireless card! So what was a guy to do? Of course I got on another computer and googled it, I came across many different tutorials and other documents on installing the drivers but they were so confusing, I wound up spending all day and night trying to get it working, then I finnaly figured it out (no thanks to the readme), so to try and save you all the hassle I decided to write this little "tutorial".
Here we go...
Ok, first thing's first, you have to download the drivers and make sure you have all the build essentials to install them. The drivers that I managed to get working, and the drivers this tutorial is based on are the madwifi drivers for Atheros cards.
Open up a console and type in the following:
It should ask for your root password, and t... View In Full
PHP as you all know is a very powerful and yet fairly loose language, however one of it's very usefully abilities is the ability to upload files. PHP can upload literally any type of file you allow it to. However this can also open up many holes for many exploits, which is why we'll also cover some basic security along with uploading the files.
Where shall we start? How about at the very beginning, how are you going to upload files without a form to upload them from?
First I'll show you an example:
Now, I'm assuming you have basic knowledge of HTML, however one of the parts of this you may not have yet seen is:
enctype="multipart/form-data"
This part, although rather large and seemingly unnecessary, is required to upload files as it tells the View In Full
Note: Examples used in this article are in PHP
Many developers believe in the practice of securing passwords and other financial data using a hash function (a function of turning some kind of data into a small number that may serve as a digital "fingerprint"). However just hashing a password isn�t enough it may still be bruteforced and as usernames and passwords are determined by the users not all will meet minimum secure levels so it is up to the developer to pick up where they leave off.
Many developers use hashes such as MD5 however very good this also has it�s flaws as it is only a 128-bit digest (encryption) it is far less secure then say the SHA1 hash which is a 160-bit digest. To cover for this many use something called �salts� which are random characters appended to the data before it is encrypted which would make it harder to brute-force. Even though salting the data is a great method of protection there is still more we can do.
Combining different message digest... View In Full
Displays a text file with a bunch of network configuration details, I used this one a few days ago when I was having trouble with my wlan card (kept me from having to keep going back in command prompt
This is one of my first ASM programs :) I made it after a friend showed me this hoax that asks if you need a cupholder and upon answering yes it opens your CD/DVD drive.
I will NOT include the ex
Lol, i'm loving Ubuntu. Great operating system, and no viruses (well... there are estimated to be around 40 in total, but none are in the wild due to linux's security measures)! Compared to Windows 100,000+ :-P
Well it looks like your doing well in life! Aren't you a little annoyed though that you won't be able to spend a lot of time with your future wife with being in the forces?
No, they abuse their power & get away with rubbish software at high costs No, they pick on smaller companies They're no different that other businesses Yes, some of their software is good Yes, i love microsoft, they do everything so well
please login to cast your vote and see the results of this poll