academic

Anything professionally oriented or of academic value.

WARNING - links on this page are DANGEROUS. Do NOT click any of them. This page is created for malware research. If you don't know what that is then you should not be here. This page is not linked to from the rest of the site, and I've asked search engines to stay away (also enforced through an IP whitelist). Nevertheless if you are here you are advised to be careful.

http://globalbagproject.org/flash/en/
http://zeriikosoves.org

"marrage licenses should be 2 years [so they need renewal]" (overheard conversation among coworkers today)

...and I use Linux!

click the screenshot for a full version

Life without walls.
---Microsoft

(my response to recent Microsoft ads)

I wanted a line-in for my car, so I bought a LineX transmitter (on right) because a friend had one and it works respectably well. The problem is that it has to be turned off when not in use because it uses batteries. It's easy to forget if stored in the glove compartment, and more easily stolen if left in plain sight.

Introduction

Before I begin, understand that it's illegal to break into computers without authorization. Laws vary by location, but it's at least a third degree felony in Florida, and it's a second degree felony if you cause harm. Don't do it. That said, there are plenty of legitimate reasons to reset a password, and the same approach can also be used for data recovery and making other configuration changes when normal access methods fail. I actually messed up my boot config yesterday and had to do something like this to fix it. Just don't be an idiot because you can lose data or worse - I'm not responsible for how you use this information.

I'll start with some pictures. Please note that these aren't scaled, so you can't compare thickness. Also note that these images were pulled from other websites. Each has been converted into a clickable link to give credit.

If you really have a problem with this though just let me know and I'll remove it.

Syndicate content