Topic: COMPUTER - on August 26, 2002 at 12:03:00 AM CEST
Location: Home / Maya / Customer Gallery
Check out how CG artists use Maya software to create groundbreaking animation and visual effects for the film and video, games, interactive media, and Web3D markets. Like what you see? Check back soon, we have more customer stories in the works!
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 25, 2002 at 9:44:59 PM CEST
Windows RG (Really Good Edition)
If you are running Internet Explorer, clicking on the "Run WinRG Demo" button will run a FULLSCREEN demo of WinRG. :) (hehehe play a fun trick on a friend or coworker) If you are running something else, clicking on the "Run WinRG Demo" button will run a maximized-screen demo of WinRG.
<a href="www.deanliou.com"target="_blank">Take me 2 the DEMO
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 25, 2002 at 12:52:38 AM CEST
How to change the Windows XP Product Activation Key Code
Since the release of Windows XP Professional, Microsoft has discovered that the vast majority of illegitimate copies in use are using a small handful of leaked "corporate" keys. In an effort to thwart these illegitimate users, Windows XP Service Pack 1 (and possibly all future updates) will not install on systems using these keys, and it is unclear what additional steps Microsoft may take in the future. Microsoft claims that legitimate licensed users of XP Professional should be unaffected, however there are a number of different ways one of these leaked keys can find its way into an otherwise legal environment and cause serious deployment issues. (When a legitimate corporate key is not at hand during an installation process, it's a common practice for some administrators to simple search the web for a valid key.) Here's how to check if your systems are using a leaked key, and how to change the product activation key if they are.
<a href="www.labmice.net"target="_blank">Take me 2 LABMICE
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 7:00:59 PM CEST
Scientists find way to 'type with eyes'
Computer scientists have devised a method of "typing" without a keyboard using clever software that creates words and sentences using eye movements alone.

<a href="www.inference.phy.cam.ac.uk"target="_blank">Take me 2 the DASHER
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 6:53:11 PM CEST
braucht ihr einen neuen job ???
IT Specialist (Forensic Examiner) fürs FBI ?
Announcement Number: 02-18-1075
Salary Range: $50,021 - $81,090 (GS 11/12/13)
Duty Location: Washington, DC
Who May Apply
Current and former civilian federal employees serving under any type of appointment may apply.
All other qualified applicants may apply.
Expenses incurred may be borne by the FBI.
Selectee may be required to serve a one year probationary period for this position.
Travel is required by this position.
<a href="www.fbijobs.com"target="_blank">Take me 2 the JOB
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 6:41:09 PM CEST
Bushs Blaupause für den Cyberkrieg
Bis zum kommenden Monat will die Bush-Regierung ein nationales Strategiepapier erstellen, das die Abwehr von Cyber-Attacken und mögliche Gegenschläge regelt. Terrorgruppen wie al-Qaida, glaubt Washington, sind zwar ein gefährlicher Gegner, aber nicht der gefährlichste.
<a href="www.spiegel.de"target="_blank">Take me 2 the SPIEGEL
The Bush administration is stepping up an internal debate on the rules of engagement for cyberwarfare as evidence mounts that foreign governments are surreptitiously exploring our digital infrastructure, a top official said yesterday.
<a href="www.washingtonpost.com"target="_blank">White House Officials Debating Rules for Cyberwarfare
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 12:59:31 AM CEST
Sinclair Spectrum emulator
A brand new Sinclair Spectrum emulator has been released by SteveSnake (the author of KGen, KGen98 and Kega). I haven't been able to test it for myself but it seems pretty accurate (SteveSnake is known for making accurate emulators) and fast too (it should run at full speed on a P75). Here's what it currently supports:
Sinclair Spectrum 48K
Sinclair Spectrum 128K
Sinclair/Amstrad Spectrum +2
Sinclair/Amstrad Spectrum +2a
Sinclair/Amstrad Spectrum +3
Sinclair Interface 2
Cursor Joystick
Kempston Joystick
Currah µSpeech
Fuller Box
SpecDrum
Spectrum 128K sound on a Spectrum 48K
AY-3-8912 or YM2149 Sound Chip (selectable) with ABC or ACB Stereo support
NEC µPD765A Floppy Disk Controller (in +3 Mode)
You can get this emulator (really this time!) from our
<a href="www.zophar.net"target="_blank">Sinclair Spectrum/QL Emulators page
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 12:48:30 AM CEST
How to hack Windows XP Admin Passwords the easy way
This hack will only work if the person that owns the machine has no intelligence. This is how it works: When you or anyone installs Windows XP for the first time your asked to put in your username and up to five others. Now, unknownst to a lot of other people this is the only place in Windows XP that you can password the default Administrator Diagnostic Account. This means that to by pass most administrators accounts on Windows XP all you have to do is boot to safe mode by pressing F8 during boot up and choosing it. Log into the Administrator Account and create your own or change the password on the current Account.
This only works if the user on setup specified a password for the Administrator Account. This has worked for me on both Windows XP Home and Pro.
Now this one seems to be machine dependant, it works randomly(don't know why) If you log into a limited account on your target machine and open up a dos prompt then enter this set of commands Exactly: (this appeared on www.astalavista.com a few days ago but i found that it wouldn't work on the welcome screen of a normal booted machine)
cd *drops to root cdwindowssystem32 *directs to the system32 dir mkdir temphack *creates the folder temphack copy logon.scr temphacklogon.scr *backsup logon.scr copy cmd.exe temphackcmd.exe *backsup cmd.exe del logon.scr *deletes original logon.scr rename cmd.exe logon.scr *renames cmd.exe to logon.scr exit *quits dos
Now what you have just done is told the computer to backup the command program and the screen saver file, then edits the settings so when the machine boots the screen saver you will get an unprotected dos prompt with out logging into XP. Once this happens if you enter this command minus the quotes
"net user password"
If the Administrator Account is called Frank and you want the password blah enter this "net user Frank blah" and this changes the password on franks machine to blah and your in. Have fun p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks Any updates, Errors, Suggestions or just general comments mail them to either Estyle89@hotmail.com jaoibh@hotmail.com
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 22, 2002 at 12:22:28 AM CEST
Former MIT admin gets three year jail term for software piracy
A computer hacker has been sentenced to nearly three years in federal prison for using Massachusetts Institute of Technology computers to distribute stolen software programs, games, movies and music titles. Christopher Tresco, 24, of Boston, who prosecutors said was a ringleader in the international software piracy group DrinkOrDie, pleaded guilty Friday in U.S. District Court for the Eastern District of Virginia. Federal authorities in the Virginia court have prosecuted 13 people targeted in ``Operation Buccaneer,'' a U.S. Customs Service investigation into international copyright violations.
<a href="www.securitynewsportal.com"target="_blank">Take me 2 the report
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 21, 2002 at 9:48:15 PM CEST
Schneller Primzahltest
Kleine Zahlen lassen sich durch ein wenig systematisches Probieren noch relativ schnell als Primzahl überführen. Bei Größeren klappt es nur noch mit Tricks oder dem Computer. Aber selbst dieser kommt bei einigen Tausend Stellen gehörig ins Schleudern, es sei denn, er verwendet den neuen Algorithmus dreier indischer Informatiker.
<a href="www.wissenschaft-online.de"target="_blank">Take me 2 the report
... Link (0 comments) ... Comment
Topic: - on August 19, 2002 at 11:31:42 PM CEST
Amazon spart Millionen dank Linux
Der weltgrößte Online-Händler Amazon hat nach eigenem Bekunden 92 Prozent seiner Rechner von Unix auf das kostengünstigere Linux umgestellt.
<a href="www.pc-magazin.de"target=" blank">Hier gehts zur Geschichte
... Link (0 comments) ... Comment
Topic: COMPUTER - on August 19, 2002 at 11:21:09 AM CEST
Electronic Crime Scene
A Guide for First Responders
The Technical Working Group for Electronic Crime Scene
Investigation (TWGECSI) was a multidisciplinary group of practitioners and subject matter experts from across the United States and other nations. Each of the individual participants is experienced in the intricacies involved with electronic evidence in relation to recognition, documentation, collection, and packaging. To initiate the working group, a planning panel composed of a limited number of participants was selected to define the scope and breadth of the work. A series of guides was proposed in which each guide will focus on a different aspect of the discipline.
Take me 2 the PDF
... Link (0 comments) ... Comment








