Here some great must-have geek points you should know about them. When you enter in this online world you've great resources to read easily to get updated with tech. For any field like science, photography, electronics, computers, media, or any other field as a geek you must know these basics and other facts. Read them here.
A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you're that type of person and are looking for a few extra skills to pick up, or if you're a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.
1. The Meaning of Technical Acronyms
USB - Universal Serial Bus
GPU - Graphics Processing Unit
CPU - Central Processing Unit
SATA - Serial ATA
HTML - Hyper-text Markup Language
HTTP - Hypertext Transfer Protocol
FTP - File Transfer Protocol
P2P - Person to Person data sharing
2. How to Reset RAM
If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It's amazing how few people know how to do this. If you're unsure, hit up the link below to find out how:
http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133
3. Identify Keyloggers
Internet cafes are the most likely place you'll find them, followed by library, perhaps, and maybe even you own house if you've some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?
Here's what one looks like:
Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:
, http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/
4. Surf the Web Anonymously
We won't make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.
Aside from the safest method--which is using a connection that is not yours--you will need the ultimate in proxies...Tor. Tor is an onion-routing system which makes it 'impossible' for someone to find out who you actually are.
5. Bypass a Computer Password on All Major Operating Systems
Obviously you shouldn't use this to gain unlawful access to a computer. If you're a geek, however, you'll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.
See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/
6. Find a Users IP Address on AIM
Knowing someones IP address is actually pretty useless in this case, but most people don't realize that. If someone is harassing you via AIM and you can't get them to stop, discovering their IP and sending it to them--with a nicely worded threat of law enforcement involvement should they not stop--is likely enough to send them scamping away with tail between legs.
http://www.elitehackers.info/forums/archive/index.php/t-2827.html
7. Hide a File Behind a JPEG
So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there's always the chance of them being discovered. A password protected RAR is the best choice, but it's a bit obvious despite the most boring title you could give it.
A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.
http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/
8. Crack a Wifi Password
This is one of those things you don't need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people don't want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.
A good overall tutorial on wifi and cracking can be found here: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks
9. Monitor Network Traffic
The Internet is a vast place with a bit of everything. Whether you're curious about what your roommate is downloading, your kid is getting into, or any leeches living around you who've unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.
Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html
10. Recover Master Boot Record
A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.
Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm
11. Retrieve Data off Hard Drive
There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasons--physical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
To find out how to retrieve data off a damaged hard drive, read here: http://laptoplogic.com/resources/5-ways-to-retrieve-data-off-a-crashed-hard-drive
12. Load Rockbox onto an MP3 Player
The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If you're an audiophile--or simply frustrated with the lack of control over your music settings--Rockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.
http://rockbox.org
13. Unbrick a Smartphone
No geek can resist the allure of flashing the newest beta firmware onto their shiny smartphone. The byproduct of that is sometimes a bricked phone, which would leave many sobbing into their pillow at night. To avoid rendering your $400 gadget into a door stopper, learn the fine art of unbricking and then flash away.
As the method used to fix a phone will vary, this is the best place to start looking for answers: http://www.howardforums.com/
14. Replace a Laptop Keyboard
Keyboards get gummy after awhile. If you use yours a lot (aka: all day), then you probably eat over it at some point. Crumbs get into the keys and things are sticking, and before you know it, you need a new keyboard.
http://www.refurbished-laptop-guide.com/how-to-remove-a-laptop-keyboard.html
15. Rip Streaming Videos
Streaming videos are officially in vogue. We're not going to make any assumptions about what type of videos you are streaming and may want to keep, but no matter what it is, any geek could rip them while sipping a Red Bull and watching the latest episode of BSG.
Here's a hint to get you started: http://applian.com/download-videos/
16. Strip Windows DRM
DRM is incredibly annoying. With many online stores now offering DRM-free mp3 audio files, it would seem it's not as big of an issue as it used to be. That is not not the case, however, with all videos bearing a DRM as well as music of a higher-quality than MP3.
Stripping Windows DRM is not legal. If you're a geek, your probably don't care: http://undrm.info/remove-DRM-protection/FairUse4WM-freeware-DRM-removal-Windows-software-Strip-copy-protection-from-WMV-ASF-WMA-Windows-Media-Player.htm
17. Homebrew Hack Game Systems
Gaming consoles are notorious for having features you can't use simply because the manufacturer decided to lock them down. As a geek, you can't just be satisfied with the features they decided to give you. No, you have to crack that case open and take a peek inside. Every geek should know how to homebrew hack their system and unlock it's full potential.
18. Find a Website IP Address Without Web/Command Prompt Access
Some school admins think they're being sneaky when they lock down the command prompt and block all major IP search websites and block all the websites you actually want to visit. Of course, that is child's play for any geek.
First, to get a new command prompt, open Notepad and type: command.com. Then, save as "cmd.bat". You now have a command prompt.
Now, open the command prompt and type "ping http://www.website.com/" to find the IP address of that website.
Enter the website into the browser and you will officially have impressed all your friends.
19. Bypass School or Work Website Blocks
What is a horrific situation for an average computer user is a simple irritation for an everyday geek. To bypass a website block/filter, simply enter that websites IP address in instead of the actual site address.
20. Screw with Wifi Leeches
Nobody likes a wifi leech. At best, they're simply using up your valuable bandwidth. At the worst--and far more likely, they're stealing your identity and watching your activities. After watching your network and identifying the leech, use this trick to flip their browser upside down and let them know you don't appreciate the intrusion.
http://tech.nocr.at/hacking-security/baffle-wifi-leeches-with-an-upside-down-ternet-2/
Read more at source:laptoplogic.com (thanks to StuPot82 for info)
Tweet |
|
You have a very good blog, thank you. You may extend here with: http://phpforms.net/tutorial/tutorial.html
ReplyDeleteYou have a very good blog, thank you.
ReplyDeleteHey, you have a great blog here! I'm definitely going to bookmark you! Thank you for your info.
ReplyDelete