tutorial about web security computer networking
tutorial about web security computer networking
Home
Business
Internet
Market
Stock
Downloads
Dvd
Games
Software
Office
Parent Category
Child Category 1
Sub Child Category 1
Sub Child Category 2
Sub Child Category 3
Child Category 2
Child Category 3
Child Category 4
Featured
Health
Childcare
Doctors
Uncategorized
Jumat, 04 Februari 2011
Fake Depth of Field in Gimp - DOF Explained
09.26
Depth of Field
,
DOF
,
Flower
,
Gimp
,
Photography
No comments
Before Fake DOF
After Fake DOF
This tutorial will be discussing depth of field and how to create this effect in the Gimp.
Read article »
Kirimkan Ini lewat Email
BlogThis!
Bagikan ke X
Berbagi ke Facebook
Bagikan ke Pinterest
Posting Lebih Baru
Posting Lama
Beranda
0 komentar:
Posting Komentar
Langganan:
Posting Komentar (Atom)
Popular
Tags
Blog Archives
Get-Winevent Part IV: Querying the Event Log for 'Filtering Platform Connection' Information (Part A)
The command: ' auditpol /set /subcategory:"Filtering Platform Connection" /success:enable /failure:enable ' enables the &q...
Turbobit Premium Link Generator - Working
Hello readers here is latest Turbobit premium link generator. Which works very smoothly. It is tested by us and we found it is working perfe...
Vodafone 3G Trick - July 2013
Hello visitors it's almost one week that I haven't posted any trick. So today I'm back with new vodafone 3g trick working almost...
Thoughts on New Lab
I'm building a new test lab. To start, I needed a lot of Cat 5 cables of specific lengths and colors. Cat5Net.com 's handy order f...
Reliance Front Query Trick - July 2013
As we know Reliance is offering free access to twitter services. So DMtricks.in tweaked this for using free internet in Reliance. To access ...
Airtel High Speed TCP VPN Config - 14 July 2013
Dear visitors today I'm back with new high speed TCP config which is working in many States. This TCP config is consists of high speed p...
Cisco 802.1x Voice VLAN Authentication Bypass Vulnerability
Ok, last night i blogged about VoIP enumeration techniques and well it made me want to find exploits for Cisco products. I was reading at ja...
Airtel Premium TCP Configs Pack - July 2013
Hello visitors today DMtricks.in is going to share premium TCP config for Airtel default APN (also known as free apn because it connects wit...
Laaptu Auto Guessing Script
Hello Readers, today we are back with new trick on Laaptu. Using this trick you easily earn free recharge from laaptu. Many of you might kno...
Hacking Old Skoolz Windows
Port 135 (client-server communications) Port 139, 445 (authentication and file sharing) Port 137,138 (NetBIOS browser, name and lookup funct...
Label
'Get-WinEvent' ETL Providers Event Logs
(2)
'Get-WinEvent' Logons
(1)
"One Page Checklist for Securing and Cleaning a Malware Infected Windows PC"
(1)
"Security by Isolation"
(1)
"The Cloud"
(1)
"universal privelege"
(1)
*NIX find
(1)
2013
(1)
2014
(1)
3g tricks
(59)
500D
(1)
accesschk
(1)
Adf.ly Hacks
(1)
Adobe
(1)
Adsense
(2)
Advanced Persistent Threat;
(1)
afcert
(31)
after you format your computer sometimes you find that sound does not work videos ... games to solve that you need this program to make a backup for your drivers
(2)
Air Force
(18)
Aircel tricks
(4)
Airtel tricks
(36)
aix
(1)
alternative to tap; tcpdump; syslog;FVS318
(1)
Amazon
(1)
analysis
(1)
Android
(4)
Anniversary
(1)
announcement
(2)
App
(1)
appsec
(4)
apt
(56)
APT;Snort;Data Protection
(1)
Argus
(1)
Astrill
(3)
attribution
(4)
Audacity
(1)
Automatic
(1)
Automobile hacking...
(1)
avast
(1)
Background
(2)
Backup
(3)
Bacon
(1)
banana bread
(3)
bananas
(2)
Bands
(1)
Bank Fraud;Money Mules;Small Business
(1)
Bank of America
(1)
Banner
(1)
Bash 4.0;awk;geoiplookup;pcregrep;
(1)
Basketball
(3)
batch
(1)
Beginner
(1)
Best
(1)
Best Way To Get Back a Stolen/lost Computer/phone
(1)
bestbook
(7)
bike
(1)
Bing
(1)
BINGO
(1)
Bittorrent
(1)
Black and white
(1)
blackhat
(30)
blender
(3)
Blog
(7)
Blogger
(8)
blogging
(1)
Blur
(1)
books
(5)
Bot Hunter;SRI; APT;
(1)
Bowling
(1)
bread
(3)
breakers
(4)
bro
(6)
Browser
(2)
bruins
(1)
Brush
(1)
Brushes
(1)
BSNL Tricks
(3)
bulk
(1)
business
(24)
Business Card
(1)
button
(1)
BYU
(2)
cake
(1)
Camer
(1)
Camera
(1)
Candle
(1)
Canon
(2)
Capitol One
(1)
Car
(1)
Card
(2)
Card Making
(1)
Cards
(1)
ccna
(6)
celebrity
(1)
Cell Phone
(3)
Cell Tracking
(1)
Censorship
(1)
certification
(26)
Change
(1)
Chase bank
(1)
Cheap
(5)
Check-TCPUDPClient.ps1
(1)
cheesecake
(2)
china
(87)
Chinese
(1)
Christmas
(3)
Chrome
(3)
Chrome OS
(2)
cisco
(30)
cissp
(7)
Classifieds
(1)
Clipart
(2)
Clker
(1)
Clone
(2)
cloud
(4)
clowns
(12)
Coke
(1)
Cola
(1)
Color
(1)
Color Code
(1)
Color Enhancement
(2)
Color Palette
(1)
Colorize
(1)
Combining logparser.exe with cmd.exe
(1)
commodore
(6)
Comparison
(1)
Computer
(1)
computers
(1)
conferences
(34)
Conficker C; Syslogd; Firewall Blocking
(1)
controls
(5)
cooking
(2)
correlation
(5)
counterintelligence
(18)
CR-48
(2)
Craft
(1)
create
(1)
crime
(13)
Crystal Light
(1)
CV
(1)
Cyber Security Review;"The Shadow Government";"McMafia"
(1)
cybercommand
(3)
cyberwar
(21)
dan geer
(1)
Dapper
(1)
Darkroom
(1)
Darktable
(4)
data breaches; ITRC;2010
(1)
databases
(1)
Delete
(1)
Depth of Field
(1)
Design
(3)
detection
(16)
dfm
(1)
Diffuser
(1)
DigiKam
(3)
disasters
(10)
Disc Golf
(1)
Discover
(1)
Disruptive Mnemonic
(1)
DIY
(16)
dns
(1)
Docomo tricks
(2)
Documents
(1)
dod
(7)
DOF
(1)
Drawing
(3)
drink
(2)
DSLR
(3)
dumbbells
(1)
Dynamic
(1)
Earthquake
(1)
EarthVPN
(2)
easy
(2)
Eddie Kohler; ipsumdump
(2)
Editing
(3)
education
(9)
Effort
(1)
Email
(2)
engineering
(11)
English Learning
(1)
Enhancement
(1)
Excel
(1)
exercise
(1)
Exercise Equipment
(1)
exploits
(15)
Explorer
(1)
Exposing Shell Paths with Powershell
(1)
F-Spot
(1)
Face
(2)
Facebook
(9)
Facebook Killer
(1)
Faces
(1)
Favicon
(1)
favorites
(261)
feds
(17)
Feed Reader
(1)
Feeds
(2)
File
(2)
File Host
(1)
FileVersionInfo
(2)
finance
(2)
Firefox
(1)
Firewall
(3)
fisma
(21)
Fix
(2)
Flag
(1)
Flash
(3)
Flier
(3)
Flower
(2)
Flyer
(2)
Font
(2)
Fonts
(1)
food
(10)
forensics
(6)
fraud
(2)
free
(4)
Free recharge
(3)
Freebies
(11)
freebsd
(433)
FreeFileSync
(1)
Freegate
(1)
Friends
(1)
Frisbee
(1)
frosting
(1)
Frugal
(1)
Fruit
(1)
Fun
(3)
Fun Disc
(1)
Game
(1)
gawk;SrcIP;DstIP;sort;uniq;Cygwin
(1)
gci
(1)
GE
(11)
ge-cirt
(2)
Geeky News
(1)
GeoIP
(1)
geoiplookup;tcpdump;firewall logs
(1)
get
(1)
get-acl
(1)
Get-WinEvent Logon
(3)
Get-WinEvent Logon Windows Filtering Platform
(1)
get-wmiobject win32_networkadapter;XP and Vista network interfaces
(1)
GetOwnerModuleFromTcpEntry Powershell iphlpapi.dll
(1)
Getting Things Done
(1)
gfwvpn
(2)
Gimp
(24)
Giveaways
(1)
Glue
(1)
Gmail
(3)
gnuplot
(1)
goal setting
(1)
goals
(1)
Gold's Gym
(1)
Golf
(1)
Google
(13)
Google Docs
(4)
Google Shopping
(1)
Google Voice
(1)
Google+
(1)
Graphic Design
(5)
Great Firewall of China
(4)
Grunge
(3)
GTD
(1)
Hack
(1)
hacking tool
(3)
hakin9
(11)
Hallmark
(1)
hardware
(19)
Hartman Personality
(1)
HDR
(2)
head
(1)
Headlights
(1)
Heal
(1)
Heal Selection
(1)
Heal Transparency
(1)
health
(2)
Hello Kitty
(1)
High Quality
(1)
Hiking
(1)
history
(2)
Hotspotshield
(1)
HTML
(1)
Hydrogen Peroxide
(1)
ICBC
(1)
Ice
(1)
ice cream
(1)
ICF;Cygwin;Microsoft's Firewall
(1)
icon
(2)
idea tricks
(7)
Illustrator
(1)
impressions
(18)
Improve
(1)
incidents
(35)
Info
(23)
information warfare
(1)
infrastructure
(1)
ingredients
(1)
ingress snort logs
(1)
Inkscape
(19)
insiders
(10)
insurance
(2)
Internet
(1)
interviews
(5)
iPod
(1)
ips
(9)
ipsumdump
(3)
ipv6
(61)
ir
(16)
Is Digital Security Possible
(1)
Istanbul
(1)
ITL
(1)
Japan
(1)
javascript hack
(2)
Jimmer Fredette
(3)
Joanna Rutkowska;metaphysics of network security
(1)
Job
(1)
Job application
(1)
JPG
(1)
junk mail
(1)
Kazam
(1)
Kdenlive
(1)
key
(1)
Kool-Aid
(1)
Kubuntu
(1)
Landscape
(3)
Laptop
(1)
law
(19)
layers
(1)
leadership
(2)
legal
(1)
Liberkey
(2)
Liberkey.com
(1)
Libreoffice
(1)
licence
(1)
Life Hack
(2)
Lighting
(2)
Lightroom
(3)
Link of the Day
(3)
linux
(15)
LinuxFest Northwest
(2)
List
(2)
LMMS
(1)
LoadCapAndFilter;NCSI.txt;
(1)
LocateIP.sh;tcp/IDS analysis;
(1)
logging
(1)
Logo
(3)
Logon screen error;
(1)
lsof for Powershell
(1)
lsof for Windows
(1)
lsof tcpdump
(1)
Luminance
(2)
Make money online
(4)
Making Money
(1)
malware
(15)
mandiant
(6)
Mass Text
(1)
Memory
(1)
mergecap
(1)
Messaging
(1)
metasploit
(5)
metrics
(2)
microsoft
(31)
microwave
(1)
Mnemonic
(1)
Modules
(2)
Moiré
(1)
Money
(4)
Mother's Day
(1)
Movie
(2)
mssp
(1)
Music
(2)
Music Video
(1)
Myers Briggs Type Indicator
(1)
native tail.exe; cmd.exe;
(1)
Nature
(1)
Navigation
(1)
net helpmsg;Windows Error Messages;Silliness
(1)
net optics
(14)
Netbook
(1)
NetGear Firewall;Syslog output;Parsing Logs;LinuxFest Northwest
(1)
netmon captures
(1)
netsh ETL tracing
(1)
netstat
(1)
Networ Monitor 3.3;VSC++ Express;WDDK;Visual Studio;OpenSource Parsers;logparser;
(1)
network
(5)
Networking
(1)
new
(1)
Nikon
(1)
Ninja Turtles
(1)
novasec
(3)
nsm
(308)
offense
(19)
official
(1)
oisf
(2)
one year anniversary
(1)
open source
(1)
openfiles
(1)
openpacket
(12)
Operating System
(1)
opt out
(1)
Organization
(3)
other
(4)
packetstash
(1)
Parsing Netstat
(1)
Pattern
(1)
pcregrep
(1)
People
(1)
philosophy
(73)
Phone Charger
(1)
Photivo
(1)
Photo
(1)
Photo Editing
(3)
Photo Management
(6)
Photo Storing
(1)
Photography
(24)
Photoshop
(8)
Picasa
(4)
pirates
(5)
pizza
(1)
Plant
(1)
Pockets
(1)
Pop
(1)
Pop-up
(1)
popcorn
(1)
Port 6000;X11;FVS318;Syslog
(1)
portable
(1)
Portableapps
(3)
portableapps.com
(1)
Portrait
(3)
Poster
(2)
powerpoint
(4)
Powershell
(1)
Powershell LSOF
(1)
pre-review
(51)
predictions
(3)
Premium Accounts
(5)
Present
(1)
press
(10)
Pro and Con
(1)
Process
(1)
Productivity
(1)
Profile
(1)
Project
(1)
promo
(1)
proxy
(3)
ps;fstat;lsof;Linux;Windows;OpenBSD;DEP
(1)
psirt
(5)
Pumpkin
(1)
quick
(2)
RAW
(6)
Raw Studio
(1)
RawTherapee
(3)
reading
(12)
reasonable steps to safeguard sensitive digital content
(1)
recipe
(3)
Record
(1)
recordmydesktop
(1)
redteam
(3)
Reflector
(1)
regulations
(1)
Reliance tricks
(1)
Relief
(1)
Remember
(1)
remove
(4)
Remove Background
(1)
reports
(6)
research
(1)
Restoration
(1)
Resume
(1)
Resynthesize
(2)
Resynthesizer
(2)
Rethynthesizer
(1)
Review
(2)
reviews
(250)
risk
(13)
roi
(14)
routing
(1)
RSS
(2)
rtime.cmd
(1)
russia
(1)
sans
(34)
Saturation
(1)
save money
(1)
scada
(1)
Scene
(1)
Screen Casting
(1)
Screencasting
(1)
screenshot
(1)
Search
(1)
sec
(1)
Security
(3)
Security;Hotmail;Microsoft
(1)
sguil
(189)
Shotwell
(1)
Silhouette
(1)
Simple
(5)
Sipdroid
(1)
Sleeve
(1)
Slurpee
(1)
Small Business Owners
(1)
Smart
(1)
SMS
(4)
snorby
(1)
snort
(51)
Snort Report
(22)
Social Networking; EFF;Privacy
(1)
Soda
(1)
Soda Pop
(1)
Software
(2)
Softwares
(6)
solaris
(2)
sorting ingress source IPs
(1)
Sorting/Searching for Events by UserID
(2)
Spreadsheet
(3)
spying
(3)
Stand
(1)
standards
(8)
start up
(1)
steam
(1)
Storage
(1)
Subcribe
(1)
Sun
(2)
Sunset
(1)
svchost
(2)
Sync
(1)
sysadmin
(16)
System.Diagnostics.Process with System.Security.AccessControl
(1)
Taobao
(1)
Task List
(1)
tasklist
(1)
tcpslice
(2)
Tech Updates
(3)
Template
(1)
Test
(1)
Test Harness;Vista;work needed
(1)
text
(6)
Text Message
(1)
texture
(3)
Thanksgiving
(1)
The Security Process
(1)
Threads
(1)
threat model
(11)
threats
(97)
threats; attack vectors; sniffers;firewalls
(1)
Thumb Drive
(1)
Tip
(1)
Tip of the Day
(25)
Tips
(1)
To-Do List
(1)
Tonemapping
(1)
tools
(43)
Toothpaste
(1)
trace
(1)
Traffic Talk
(10)
training
(50)
Transfer
(1)
Tree
(3)
TrendMicro;Sophos;PC Tools;DEP;AV;
(1)
Trick
(1)
Tsunami
(1)
TTP
(9)
tubing
(1)
tufte
(8)
Tutorial
(13)
Tutorials
(3)
tv
(1)
ubuntu
(5)
UFRaw
(1)
Ultoo hacks
(2)
Unboxing
(1)
updates
(1)
USB Drive
(1)
usenix
(1)
Valentine
(2)
Valentines day
(2)
Vector
(7)
verizon
(5)
video
(2)
virtualization
(32)
virus protection
(1)
Vista Firewall;Parsing Logs;cmd.exe;Windump;nmap
(1)
Vista Firewall;Parsing Logs;logparser.exe
(1)
Vista Firewall;Parsing Logs;Powershell
(1)
Vodafone tricks
(15)
Voip
(1)
VPN
(4)
vpnning
(1)
VPNs
(1)
vulnerabilities
(36)
Wallpaper
(4)
warranties
(1)
wassail
(1)
Waterer
(1)
watermark
(3)
WD-40
(2)
Web Design
(2)
Website
(2)
weight lift
(1)
weight lifting
(1)
weight loss
(2)
Wells Fargo
(1)
whipped cream
(1)
whipping cream
(1)
Win32:SQLSlammer;Malware detection;Snort;Traceroute
(1)
Windows
(10)
Windows 7 Firewall;Parsing Logs;Powershell;logparser.exe
(1)
Windows TCP/IP Address information
(1)
windows times-stamping
(1)
Windshield
(1)
Wireless
(1)
wisdom
(13)
Wordpress
(1)
workout
(1)
writing
(44)
xvidcap
(1)
Yahoo Pipes
(1)
year
(1)
years
(1)
Youtube
(1)
Zoom
(1)
Arsip Blog
►
2013
(132)
►
Juli
(5)
►
Juni
(14)
►
Mei
(11)
►
April
(16)
►
Maret
(23)
►
Februari
(29)
►
Januari
(34)
►
2012
(115)
►
Desember
(19)
►
November
(28)
►
Oktober
(3)
►
September
(13)
►
Agustus
(5)
►
Juli
(6)
►
Juni
(8)
►
Mei
(9)
►
April
(3)
►
Maret
(10)
►
Februari
(8)
►
Januari
(3)
▼
2011
(187)
►
Desember
(8)
►
November
(7)
►
Oktober
(11)
►
September
(11)
►
Agustus
(23)
►
Juli
(22)
►
Juni
(9)
►
Mei
(9)
►
April
(15)
►
Maret
(25)
▼
Februari
(27)
Collating and parsing netmon capture files
Portrait Photography in Linux - An Extensive Guide
How to Add Watermarks in batch to Your Photos in L...
How to Create A Watermark for Your Photos Using In...
How to Edit RAW Photos in Linux Using RawTherapee
Best Software for Editing RAW photos in Linux
Organizing your photos in Linux
10 Tips for Portrait Photography
Tip of The Day - Backing up files using external m...
Tip of The Day - Use Your Email Client To Send and...
Tip of The Day - Your Best Options for File Sharin...
Getting Familiar with Chrome OS - Google's CR-48
Parsing Windows 7 Firewall Logs
Happy Valentines's Day!
Ten Years After Leaving the Air Force
Why I switched from Firefox to Google Chrome (And ...
Create a Celebrity Wallpaper using Inkscape - Jimm...
Create a Celebrity Wallpaper using the Gimp - Jimm...
Jimmer Fredette/BYU Basketball Wallpapers - Free, ...
Comparing Microsoft's Communication Methods
The Best Way to Download Free Textures for your De...
Bacon Candle; Fact of Fiction? How to Make a bacon...
Fake Depth of Field in Gimp - DOF Explained
Get-WinEvent, EventLogs, ETL, Providers on Win7 Pa...
How to make a DIY Phone Charger Stand using Tennis...
Geeky News - Bing copies Google. Just one more rea...
Make your Designs Better by having better fonts
►
Januari
(20)
►
2010
(262)
►
Desember
(41)
►
November
(22)
►
Oktober
(10)
►
September
(17)
►
Agustus
(15)
►
Juli
(27)
►
Juni
(18)
►
Mei
(19)
►
April
(23)
►
Maret
(20)
►
Februari
(25)
►
Januari
(25)
►
2009
(247)
►
Desember
(12)
►
November
(18)
►
Oktober
(21)
►
September
(15)
►
Agustus
(23)
►
Juli
(28)
►
Juni
(31)
►
Mei
(33)
►
April
(8)
►
Maret
(18)
►
Februari
(21)
►
Januari
(19)
►
2008
(259)
►
Desember
(25)
►
November
(28)
►
Oktober
(25)
►
September
(21)
►
Agustus
(18)
►
Juli
(19)
►
Juni
(22)
►
Mei
(17)
►
April
(20)
►
Maret
(26)
►
Februari
(11)
►
Januari
(27)
►
2007
(507)
►
Desember
(14)
►
November
(28)
►
Oktober
(41)
►
September
(51)
►
Agustus
(35)
►
Juli
(35)
►
Juni
(37)
►
Mei
(41)
►
April
(58)
►
Maret
(103)
►
Februari
(28)
►
Januari
(36)
►
2006
(492)
►
Desember
(33)
►
November
(26)
►
Oktober
(29)
►
September
(54)
►
Agustus
(83)
►
Juli
(52)
►
Juni
(32)
►
Mei
(16)
►
April
(37)
►
Maret
(41)
►
Februari
(31)
►
Januari
(58)
►
2005
(501)
►
Desember
(45)
►
November
(33)
►
Oktober
(32)
►
September
(36)
►
Agustus
(61)
►
Juli
(54)
►
Juni
(42)
►
Mei
(36)
►
April
(45)
►
Maret
(41)
►
Februari
(45)
►
Januari
(31)
►
2004
(348)
►
Desember
(49)
►
November
(38)
►
Oktober
(24)
►
September
(28)
►
Agustus
(29)
►
Juli
(17)
►
Juni
(27)
►
Mei
(30)
►
April
(17)
►
Maret
(25)
►
Februari
(38)
►
Januari
(26)
►
2003
(375)
►
Desember
(25)
►
November
(36)
►
Oktober
(58)
►
September
(20)
►
Agustus
(60)
►
Juli
(31)
►
Juni
(34)
►
Mei
(18)
►
April
(42)
►
Maret
(9)
►
Februari
(23)
►
Januari
(19)
Recent Posts
0 komentar:
Posting Komentar