This is the execution flow for the Wannacry malware. This ransomware can encrypt all of your files and then demand payment in bitcoins to decrypt the files. The virus was recently remade into a 2.0 with no killswitch. But the older version is this one that had a killswitch that contacted a website that did …

Funny and cool Linux tips 1337 or Leet in the UNIX time. -01:44:57– [email protected] [~]$ date +%s 1337096699-01:44:57– [email protected] [~]$ date +%s 1337096699 The missing days in 1752. I have mentioned this before, but it is worth mentioning again. -01:45:31– [email protected] [~]$ cal 9 1752 September 1752 Su Mo Tu We Th Fr Sa 1 …

Add a user to the sudoers file on Linux easily If you need to add your user on a Linux system to the /etc/sudoers file, this is how to do it properly. I am adding a new UNIX user to my system. This user will have sudo access. [email protected]:~$ sudo adduser adler Adding user `adler’ …

Security tips for staying safe online—Start of medium level security——Measures that cost money——Start of physical access measures——Start of high level security——Start of deterrent measures—Further reading Security tips for staying safe online Level 1: Avoid using your real name online and avoid giving away any personal information. You can use The Random Identity Generator (rig) to …

MATE tweak tool for fixing the MINT desktop The MATE tweak tool is used to easily tweak the Linux Mint MATE desktop. Install this easily with the command below. [email protected] ~ $ sudo apt install [email protected] ~ $ sudo apt install mate-tweak Now we can tweak our desktop. Here, this is how to disable desktop …

Index of /hscmaths 1416709685_2004_Mathematics_Trial_Paper.pdf 1416710294_2013_Mathematics_Trial_Paper.pdf 1425787865_2015_Mathematics_Trial_Paper.pdf 2003 James Ruse Trial Exam.pdf 2003 James Ruse Trial Solutions.pdf 2004 James Ruse Term 2 Exam.pdf 2004 James Ruse Term 2 Solutions.pdf 2005 James Ruse Term 1 Exam.pdf 2005 James Ruse Term 1 Solutions.pdf 2005 James Ruse Term 2 Exam.pdf 2005 James Ruse Term 2 Solutions.pdf 2005 James Ruse …

Complete pack of Windows wallpapers from every release of Windows, even hidden and promotional wallpapers. I previously had linked to a forum post that had this file, now it has 404 post not found. So I uploaded it to Google drive. https://drive.google.com/open?id=0B-W1m-kHGr03RVJ4ZjU3dnRHVjg. 506 megabytes. Download Windows 7 Wallpapers Pack (RTM Build 7600.16385). Here are some …

https://slowsoulburn.files.wordpress.com/2014/02/hr-giger_003406131.jpg This looks like a bunch of strange beetles crawling around. http://cache.gawkerassets.com/assets/images/8/2011/10/space-jockey—enclosure.jpg The alien Space Jockey in his seat. As seen in the movie Prometheus. http://wallpaperbackgrounds.com/Content/wallpapers/dark/occult/205915-22087.jpg This wallpaper is very dark and strange indeed. With Baphomet at the top of the image and a woman with a Xenomorph head, this is one strange picture. http://www.meh.ro/original/2010_04/meh.ro3828.jpg Strange creatures loaded as …

Computing in the 1990`s was much different to the experience we have today. The software we used like Internet Explorer and Netscape was not very secure. Running Windows `95 or `98 did not give a great deal of security compared to a modern operating system. The Internet was the wild west before Google came along, …

The ls command for Linux may be used to list more than one thing at a time. These examples demonstrate this. [email protected] ~ $ ls -p /opt/ /bin/rm /bin/rm   /opt/: firefox/ [email protected] ~ $ ls -p /opt/ /bin/rm /bin/rm /opt/: firefox/ mint-flashplugin-11/ Here is a more verbose version of this command. With human readable …

The massive treasure trove of spying tools from the CIA has been released by the CIA. This contains many tools and documents that involve Samsung Smart TV devices, Android and Apple iPads. Nothing is safe it seems. The key for the archive is. SplinterItIntoAThousandPiecesAndScatterItIntoTheWindsSplinterItIntoAThousandPiecesAndScatterItIntoTheWinds This is the MD5 hash. b7220044795824900ace025184df8b2cb7220044795824900ace025184df8b2c Get this while you can, …

This useful VIM tutorial PDF will teach you how to use the VIM editor on a UNIX or Linux system. http://www.securitronlinux.com/arma3/vim_revisited.pdf. This one has information about the VI editor. http://www.securitronlinux.com/arma3/why-why-vi.pdf. The above image contains the VI movement commands, allowing the user to move around the text file using the keyboard quickly. And this image is …

This theme pack is an archive of the hidden themes in Windows 7. These are extra regional themes. http://www.securitronlinux.com/maps/hiddenthemes.zip. Go here to find these extra themes. C:\Windows\Globalization\MCTC:\Windows\Globalization\MCT This archive might be useful to Linux users who would want the wallpapers. Below is an archive of all of the wallpapers and images from the Windows `98 …