Search
Results
TIME - Nation
Washington Post - Technology
Yahoo! News - Technology
Slashdot
O'Reilly Network
BBC News - Technology
Roku
ShopperTrak
SIP Forum
Jalaya Networks
Warchalking
Wireless Hacks - wk
[file:///Volumes/R&D%20Server/~DownOSX/Docs%20&%20Training/Training/~Other/Wireless%20Hacks/eBook%20-%20Wireless%20Hacks%20100%20Industrial%20Strength%20Tips%20and%20Tools%20-%20OReilly/0596005598_toc.html] - - public:mfuse
Welcome to Heron Fidelity - [Heron Fidelity]
dupeGuru - Duplicate file scanner
Duplicati
Copy.com
Creating audit trails - Logging commands on Linux with Snoopy
[http://linux-audit.com/creating-audit-trails-logging-commands-linux-snoopy/] - - public:jeffreydbrowngmail.com
How to Turn An Old Android Phone into a Networked Security Camera
[http://www.howtogeek.com/139373/how-to-turn-an-old-android-phone-into-a-networked-security-camera/] - - public:jeffreydbrowngmail.com
Linux System Integrity Explained: Ensure Data, Logging and Kernel Integrity - Linux Audit
[http://linux-audit.com/linux-system-integrity-explained-ensure-data-logging-and-kernel-integrity/] - - public:jeffreydbrowngmail.com
Managing Linux Logs - Ultimate Guide to Logging
[https://www.loggly.com/ultimate-guide/logging/managing-linux-logs/] - - public:jeffreydbrowngmail.com
Personal Drive | The Bitcasa Cloud Storage Platform
Process Accounting | Linux Journal
systemd
The Engine
Image-to-Image Demo - Affine Layer
[http://affinelayer.com/pixsrv/index.html] - - public:Trinsec
The pix2pix model works by training on pairs of images such as building facade labels to building facades, and then attempts to generate the corresponding output image from any input image you give it. The idea is straight from the pix2pix paper, which is a good read.
Paper Space
Have I Been Pwned
20 Linux System Monitoring Tools Every SysAdmin Should Know - nixCraft
Configuring LXDE/Openbox - debian install notes
How to Connect the Samsung Galaxy Android to Linux or OpenBSD
How to sync RSS feeds to a Kindle
How to Unroot My Android Phone
[http://paiva25.hubpages.com/hub/How-to-unroot-your-Android-Phone] - - public:jeffreydbrowngmail.com
How-to: Easily root and unlock your Verizon Galaxy Note II with "No You Verizon"
[http://www.phonearena.com/news/How-to-Easily-root-and-unlock-your-Verizon-Galaxy-Note-II-with-No-You-Verizon_id43590] - - public:jeffreydbrowngmail.com
Install I605VRUFND7 Verizon Galaxy Note 2 4.4.2 KitKat Firmware | Android Firmware Update
[http://androidromupdate.com/2014/06/20/i605vrufnd7-verizon-galaxy-note-2-4-4-2-kitkat-firmware/] - - public:jeffreydbrowngmail.com
List of Chromium Command Line Switches « Peter Beverloo
Manage your extensions - Chrome Help
Mount MTP device on Debian 7 wheezy | Roger Steneteg
[http://roger.steneteg.org/299/mount-mtp-device-on-debian-7-wheezy/] - - public:jeffreydbrowngmail.com
Odin Back Verizon Galaxy Note 2 SCH-I605 to Stock Original Firmware
[http://www.androidayos.com/2013/04/12/unroot-restore-back-verizon-galaxy-note-2-sch-i605-original-firmware-stock-rom/] - - public:jeffreydbrowngmail.com
Unlock external SD Card writing for all apps in Android 4.4 KitKat | Winaero
[http://winaero.com/blog/unlock-external-sd-card-writing-for-all-apps-in-android-4-4-kitkat/] - - public:jeffreydbrowngmail.com
Which tomato firmware should i install on linksys E2500 V3?
[https://answers.yahoo.com/question/index?qid=20140727204148AA6ipGc] - - public:jeffreydbrowngmail.com
Best Backup and Recovery - CMS Products. CE Secure Vault FIPS Flash Drive
Cloudfogger - Free File Encryption for Dropbox and the Cloud
CryptSync - Stefan's Tools
Imation Enterprise Corp. Online Store - Encrypted Flash Drives
Imation Mobile Security Online Store – Buy Imation IronKey Products
[http://store.ironkey.com/store/imation/html/pbPage.landing_page/ThemeID.29942900] - - public:jeffreydbrowngmail.com
List of the best Tor email hidden services | Hacker 10 - Security Hacker
[http://www.hacker10.com/internet-anonymity/list-of-the-best-tor-email-hidden-services/] - - public:jeffreydbrowngmail.com
One year review of anonymous email service Countermail | Hacker 10 - Security Hacker
[http://www.hacker10.com/internet-anonymity/one-year-review-of-anonymous-email-service-countermail/] - - public:jeffreydbrowngmail.com
Secure File Transfer Software for the Enterprise | GoAnywhere MFT
GPG, Strong Encryption And Digital Signing Made Easy | Kaspersky Lab Official Blog
[http://blog.kaspersky.com/gpg-strong-encryption-and-digital-signing-made-easy/] - - public:jeffreydbrowngmail.com