A PHP Error was encountered

Severity: Warning

Message: session_start(): open(/tmp/sess_tvhol0p27hofjsh461re498kq0, O_RDWR) failed: Disk quota exceeded (122)

Filename: facebook/Facebook.php

Line Number: 61

Indianeers | Nikola Tesla! Here is to what the World doesn’t know about you…

Terms and Conditions:

  • This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio ursus a sit amet mauris. orbi accumsan ipsum velit. Nam nec tellus a odio tincidunt uctor a ornare odio. Sed non mauris vitae erat consequat uctor eu in elit. Class aptent taciti ociosqu ad ora torquent per conubia nostra, per inceptos himenaeos. Mauris in erat sto. Nullam ac urna eu felis dapibus condimentum sit amet a augue. Sed non neque elit. Sed ut imperdiet nisi. Proin condimentum fermentum nunc. Etiam pharetra, erat sed fermentum feugiat, velit mauris as quam, ut aliquam massa nisl quis neque. Sus his is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi iconsequat ipsum, nec sagittis sem nibh id elit. This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio sit amet nibh vulputate.
  • This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio ursus a sit amet mauris. orbi accumsan ipsum velit. Nam nec tellus a odio tincidunt uctor a ornare odio. Sed non mauris vitae erat consequat uctor eu in elit. Class aptent taciti ociosqu ad ora torquent per conubia nostra, per inceptos himenaeos. Mauris in erat sto. Nullam ac urna eu felis dapibus condimentum sit amet a augue. Sed non neque elit. Sed ut imperdiet nisi. Proin condimentum fermentum nunc. Etiam pharetra, erat sed fermentum feugiat, velit mauris as quam, ut aliquam massa nisl quis neque. Sus his is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi iconsequat ipsum, nec sagittis sem nibh id elit. This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio sit amet nibh vulputate.
  • This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio ursus a sit amet mauris. orbi accumsan ipsum velit. Nam nec tellus a odio tincidunt uctor a ornare odio. Sed non mauris vitae erat consequat uctor eu in elit. Class aptent taciti ociosqu ad ora torquent per conubia nostra, per inceptos himenaeos. Mauris in erat sto. Nullam ac urna eu felis dapibus condimentum sit amet a augue. Sed non neque elit. Sed ut imperdiet nisi. Proin condimentum fermentum nunc. Etiam pharetra, erat sed fermentum feugiat, velit mauris as quam, ut aliquam massa nisl quis neque. Sus his is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi iconsequat ipsum, nec sagittis sem nibh id elit. This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio sit amet nibh vulputate.
  • This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio ursus a sit amet mauris. orbi accumsan ipsum velit. Nam nec tellus a odio tincidunt uctor a ornare odio. Sed non mauris vitae erat consequat uctor eu in elit. Class aptent taciti ociosqu ad ora torquent per conubia nostra, per inceptos himenaeos. Mauris in erat sto. Nullam ac urna eu felis dapibus condimentum sit amet a augue. Sed non neque elit. Sed ut imperdiet nisi. Proin condimentum fermentum nunc. Etiam pharetra, erat sed fermentum feugiat, velit mauris as quam, ut aliquam massa nisl quis neque. Sus his is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi iconsequat ipsum, nec sagittis sem nibh id elit. This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio sit amet nibh vulputate.
  • This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio ursus a sit amet mauris. orbi accumsan ipsum velit. Nam nec tellus a odio tincidunt uctor a ornare odio. Sed non mauris vitae erat consequat uctor eu in elit. Class aptent taciti ociosqu ad ora torquent per conubia nostra, per inceptos himenaeos. Mauris in erat sto. Nullam ac urna eu felis dapibus condimentum sit amet a augue. Sed non neque elit. Sed ut imperdiet nisi. Proin condimentum fermentum nunc. Etiam pharetra, erat sed fermentum feugiat, velit mauris as quam, ut aliquam massa nisl quis neque. Sus his is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. quis bibendum auctor, nisi iconsequat ipsum, nec sagittis sem nibh id elit. This is Photoshop's version of Lorem Ipsum. Proin gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auctor, nisi elit consequat ipsum, nec sagittis sem nibh id elit. Duis sed odio sit amet nibh vulputate. http://localhost/indianeers/events/eventlist
  •     Courses
  •     Jobs
  •     Books and Downloads
  •     Magazines
  •     Groups
  •     Events
  •     Forums
Thanks for subscribing to updates on Indianeers.
Now, discover our amazing updates in your mailbox too.
Since you've been such awesome Indianeer, we promise we won't spam.☺

Alert Confirmation


Subscribe Updates

Nikola Tesla! Here is to what the World doesn’t know about you…

   

On Nikola Tesla’s 158th Birth Anniversary, this is a tribute to his life, inventions and the unknown facts about him , the Man who invented the 20th Century…..

 

 

nikola tesla

Who’s Nikola Tesla?  

Nikola Tesla (July 10, 1856 – January 7, 1943), born in what is now Smiljan, Croatia, was a physicist, inventor, mechanical and electrical engineer of unusual intellectual brilliance and practical achievement. He was an important contributor to the birth of commercial electricity, and is best known for his many revolutionary developments in the field of electromagnetism in the late 19th and early 20th centuries.

Tesla’s patents and theoretical work formed the basis of modern alternating current (AC) electric power systems, including the polyphase system of electrical distribution and the AC motor. This work helped usher in the Second Industrial Revolution.Tesla is most famous for conceiving the rotating magnetic field principle (1882) and then using it to invent the induction motor together with the accompanying alternating current long-distance electrical transmission system (1888). His patents and theoretical work still form the basis for modern alternating current electric power systems.

He also developed numerous other electrical and mechanical devices including the fundamental principles and machinery of wireless technology, including the high frequency alternator, the Tesla coil, the blameless turbine, the spark plug, and numerous other inventions.In addition to his work on electromagnetism and electromechanical engineering, Tesla contributed in varying degrees to the establishment of robotics, remote control, radar, and computer science, and to the expansion of ballistics, nuclear physics, and theoretical physics.

He pioneered modern electrical engineering and many of his discoveries were of groundbreaking importance. In the United States during this time, Tesla’s fame rivaled that of any other inventor or scientist in history or popular culture. Tesla demonstrated wireless energy transfer to power electronic devices as early as 1893, and aspired to intercontinental wireless transmission of industrial power in his unfinished Wardenclyffe Tower project (1901-1917) also known as the Tesla Tower, located in Long Island, New York.

Nikola Tesla was fluent in eight languages – Serbian, Czech, English, French, German, Hungarian, Italian, and Latin.

Nikola Tesla had 700 patents in the US and Europe. Tesla’s discoveries include the Tesla Coil, fluorescent light, wireless transmission of electrical energy, radio, remote control, discovery of cosmic radio waves and use of ionosphere for scientific purposes.  

 

Nikola tesla with tesla coil

 

Facts you didn’t know about Nikola Tesla:

 

1. Tesla was influenced by Hindu saints and philosophies:  

Swami Vivekananda influenced Tesla’s work, an Indian Hindu monk and chief disciple of the 19th century saint Ramakrishna. Tesla was also influenced by other Vedic philosophies.

 

2.Tesla was born during a lightening storm:

Nikola Tesla was born around midnight, between July 9 and July 10, 1856 during a fierce lightning storm. According to family legend, midway through the birth, the midwife wrung her hands and declared the lightning a bad omen. This child will be a child of darkness, she said, to which his mother replied: “No. He will be a child of light.”

 

3. Tesla was a witty man:

Most people don’t know that Tesla had a great sense of humor. For instance, after dining with writer and poet Rudyard Kipling, he wrote this in a correspondence to a close friend:

April 1, 1901

My dear Mrs. Johnson,

What is the matter with inkspiller Kipling? He actually dared to invite me to dine in an obscure hotel where I would be sure to get hair and cockroaches in the soup.

Yours truly,

N. Tesla

 

4. Tesla envisioned the Smartphone technology in the year 1901:

  In the race to develop transatlantic radio, Tesla described to his funder and business partner, J.P. Morgan, a new means of instant communication that involved gathering stock quotes and telegram messages, funneling them to his laboratory, where he would encode them and assign them each a new frequency. That frequency would be broadcast to a device that would fit in your hand, he explained. In other words, Tesla had envisioned the smart phone and wireless internet.

He was the first to be thinking about the information revolution in the sense of delivering information for each individual use. He also conceived of, but never developed technology for radar, X-rays, a particle beam “death ray” and radio astronomy.

 

5. Nikola Tesla had a photographic memory: 

Tesla had what’s known as a photographic memory. He was known to memorize books and images and stockpile visions for inventions in his head. He also had a powerful imagination and the ability to visualize in three dimensions, which he used to control the terrifying vivid nightmares he suffered from as a child. It’s in part what makes him such a mystical and eccentric character in popular culture.

 

6. Nikola Tesla and Thomas Edison were rivals but not sworn enemies: 

Many have characterized Tesla and inventor Thomas Edison as enemies  but their relationship has been largely misrepresented. Early in his career, Tesla worked for Edison, designing direct current generators, but famously quit to pursue his own project: the alternating current induction motor. Sure, they were on different sides of the so-called “Current Wars,” with Edison pushing for direct current and Tesla for alternating current. They were indeed the Steve Jobs and Bill Gates of their time: one the brilliant marketer and businessman and the other a visionary and “tech guy.”

On a rare occasion, Edison attended a conference where Tesla was speaking. Edison, not wanting to be spotted, slipped into the back of the auditorium to listen to the lecture. But Tesla spotted Edison in the crowd, called attention to him and led the audience in giving him a standing ovation.

 At first Edison dismissed Tesla, but came to eventually respect him, he said. In-fact, when there were fires at Tesla’s laboratory, Edison provided him a lab, so clearly there was some mutual respect.

 

7. Nikola Tesla was an environmentalist:

Tesla was “very concerned about the fact that we were using up the Earth’s resources too quickly, and he wanted to make sure that we were using nonfossil, renewable fuels.” Thus, Tesla researched ways to harvest the natural energy in the ground and in the sky. He created artificial lightning in his lab, and probed electrical potential differences in the Earth and across tall objects.

 

8. Nikola Tesla rarely slept: 

Tesla claimed to have required only two hours of sleep a night, although he occasionally napped. 

 

9. Nikola Tesla had a fear of germs (suffered from obsessive compulsive disorder):

He was known for having excessive hygiene habits, born out of a near-fatal bout of cholera as a teenager. He was obsessed with the number three and polished every dining implement he used to perfection, using 18 napkins.

 

10. Pearls drove him crazy:

Tesla could not stand the sight of pearls, to the extent that he refused to speak to women wearing them. When his secretary wore pearl jewelry, he sent her home for the day. No one knows why he had such an aversion. He also loathed jewelry and round objects and wouldn’t touch hair.

 

11. Nikola Tesla has a Scientific Unit Named After Him:

Tesla Unit: A Unit for magnetic flux density equation “Tesla = Weber/m²”

Nikola Tesla’s name has been honored with the international unit of magnetic flux density called “Tesla”. One tesla equals one weber per square meter, or 10,000 gauss (hence, scientists often use gauss to measure weak magnetic fields, reserving tesla for stronger ones, like those used in MRIs). A weber is a unit of magnetic flux, which can be thought of as the amount of magnetic energy “flowing” over an area, such as the surface of a magnet.

 All magnetic resonance imaging (MRI) machines are calibrated with Tesla Unit (from .2 Tesla to 9 Tesla).  MRI machines work on the principle of a homogeneous magnet field.  Nikola Tesla discovered the Rotating Magnetic Field in Budapest, 1882.  The Tesla Unit for magnetism was established in 1956 in the Rathaus of Munich, Germany by the International Electrotechnical Commission Committee in Action.

Because of the tremendous importance of the MRI technology and widespread use of the MRI machines around the world, which are all calibrated in Tesla Units, Tesla’s name connected with the MRI will be known more and more in the future and the years to come.

Tesla unit was even printed on Serbian Money:

 

tesla unit on serbian money

 

12. Many of the Nikola Tesla’s inventions were classified:

 When Tesla died in 1943, during World War II, the Office of Alien Property took his belongings, Alcorn said. Most of his things were later released to his family, and many ended up in the Tesla Museum in Belgrade, which opened in the 1950s. But some of Tesla’s papers are still classified by the U.S. government.

 

13. Tesla died a broke humanitarian:

 “Tesla did what he did for the betterment of humanity, to help people have a better quality of life. He never was after the monetary gain. Tesla had famous friends, including Mark Twain and French actress Sarah Bernhardt, but he struggled financially. Edison and Westinghouse were much more successful businessmen, which partly explains the strength of their legacies.

4. Tesla envisioned the Smartphone technology in the year 1901:

  In the race to develop transatlantic radio, Tesla described to his funder and business partner, J.P. Morgan, a new means of instant communication that involved gathering stock quotes and telegram messages, funneling them to his laboratory, where he would encode them and assign them each a new frequency. That frequency would be broadcast to a device that would fit in your hand, he explained. In other words, Tesla had envisioned the smart phone and wireless internet.

He was the first to be thinking about the information revolution in the sense of delivering information for each individual use. He also conceived of, but never developed technology for radar, X-rays, a particle beam “death ray” and radio astronomy.

 

5. Nikola Tesla had a photographic memory: 

Tesla had what’s known as a photographic memory. He was known to memorize books and images and stockpile visions for inventions in his head. He also had a powerful imagination and the ability to visualize in three dimensions, which he used to control the terrifying vivid nightmares he suffered from as a child. It’s in part what makes him such a mystical and eccentric character in popular culture.

The term geek, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isnt satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If youre that type of person and are looking for a few extra skills to pick up, or if youre a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

 

 

geeks are sexy

 

 If you are passionate about computers and consider yourself a geek, or aspire to the honor of geekhood, heres an essential checklist of must-have geek skills:


1. The Meaning of Technical Acronyms

  • USB Universal Serial Bus
  • GPU Graphics Processing Unit
  • CPU Central Processing Unit
  • SATA Serial ATA
  • HTML Hyper-text Markup Language
  • HTTP Hypertext Transfer Protocol
  • FTP File Transfer Protocol
  • P2P Peer-to-peer sharing (See http://en.wikipedia.org/wiki/P2P)


 

 

2. How to Reset RAM

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. Its amazing how few people know how to do this. If youre unsure, hit up the link below to find out how:

http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

This tip is only really good for older machines running 9x based OSs. However if you are running Windows Vista this can have a problem with RAM so here is how to create a desktop shortcut to free up RAM.

1. Right-click on your desktop and select New > Shortcut.
2. Copy/paste the following into the box: %windir%system32 undll32.exe advapi32.dll,ProcessIdleTasks
3. Click Next, name it Clear Memory, and click Finish.Give it asuitable icon so it looks nice.


 

 

3. Identify Keyloggers

Internet cafes are the most likely place youll find them, followed by library, perhaps, and maybe even you own house if youve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?

Heres what one looks like:

Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:

http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/


 

 

4. Surf the Web Anonymously

We wont make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.

Aside from the safest methodwhich is using a connection that is not yoursyou will need the ultimate in proxiesTor. Tor is an onion-routing system which makes it impossible for someone to find out who you actually are.


 

 

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldnt use this to gain unlawful access to a computer. If youre a geek, however, youll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.

See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.

http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/


 

 

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people dont realize that. If someone is harassing you via AIM and you cant get them to stop, discovering their IP and sending it to themwith a nicely worded threat of law enforcement involvement should they not stopis likely enough to send them scamping away with tail between legs.

http://www.elitehackers.info/forums/archive/index.php/t-2827.html


 

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but theres always the chance of them being discovered. A password protected RAR is the best choice, but its a bit obvious despite the most boring title you could give it.

A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.

http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/


 

 

8. Crack a Wifi Password

This is one of those things you dont need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people dont want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.

A good overall tutorial on wifi and cracking can be found here:http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

 


 

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether youre curious about what your roommate is downloading, your kid is getting into, or any leeches living around you whove unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.

Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html



10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.

Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm


 

 

11. Retrieve Data off Hard Drive

There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasonsphysical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.

To find out how to retrieve data off a damaged hard drive, read here: http://www.ehow.com/list_7225818_5-off-crashed-hard-drive.html

 


 

 

12. Load Rockbox onto an MP3 Player

The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If youre an audiophileor simply frustrated with the lack of control over your music settingsRockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.

http://rockbox.org


The term geek, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isnt satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If youre that type of person and are looking for a few extra skills to pick up, or if youre a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

 

 

geeks are sexy

 

 If you are passionate about computers and consider yourself a geek, or aspire to the honor of geekhood, heres an essential checklist of must-have geek skills:


1. The Meaning of Technical Acronyms

  • USB Universal Serial Bus
  • GPU Graphics Processing Unit
  • CPU Central Processing Unit
  • SATA Serial ATA
  • HTML Hyper-text Markup Language
  • HTTP Hypertext Transfer Protocol
  • FTP File Transfer Protocol
  • P2P Peer-to-peer sharing (See http://en.wikipedia.org/wiki/P2P)


 

 

2. How to Reset RAM

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. Its amazing how few people know how to do this. If youre unsure, hit up the link below to find out how:

http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

This tip is only really good for older machines running 9x based OSs. However if you are running Windows Vista this can have a problem with RAM so here is how to create a desktop shortcut to free up RAM.

1. Right-click on your desktop and select New > Shortcut.
2. Copy/paste the following into the box: %windir%system32 undll32.exe advapi32.dll,ProcessIdleTasks
3. Click Next, name it Clear Memory, and click Finish.Give it asuitable icon so it looks nice.


 

 

3. Identify Keyloggers

Internet cafes are the most likely place youll find them, followed by library, perhaps, and maybe even you own house if youve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?

Heres what one looks like:

Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:

http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/


 

 

4. Surf the Web Anonymously

We wont make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.

Aside from the safest methodwhich is using a connection that is not yoursyou will need the ultimate in proxiesTor. Tor is an onion-routing system which makes it impossible for someone to find out who you actually are.


 

 

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldnt use this to gain unlawful access to a computer. If youre a geek, however, youll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.

See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.

http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/


 

 

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people dont realize that. If someone is harassing you via AIM and you cant get them to stop, discovering their IP and sending it to themwith a nicely worded threat of law enforcement involvement should they not stopis likely enough to send them scamping away with tail between legs.

http://www.elitehackers.info/forums/archive/index.php/t-2827.html


 

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but theres always the chance of them being discovered. A password protected RAR is the best choice, but its a bit obvious despite the most boring title you could give it.

A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.

http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/


 

 

8. Crack a Wifi Password

This is one of those things you dont need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people dont want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.

A good overall tutorial on wifi and cracking can be found here:http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

 


 

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether youre curious about what your roommate is downloading, your kid is getting into, or any leeches living around you whove unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.

Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html



10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.

Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm


 

 

11. Retrieve Data off Hard Drive

There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasonsphysical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.

To find out how to retrieve data off a damaged hard drive, read here: http://www.ehow.com/list_7225818_5-off-crashed-hard-drive.html

 


 

 

12. Load Rockbox onto an MP3 Player

The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If youre an audiophileor simply frustrated with the lack of control over your music settingsRockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.

http://rockbox.org


The term geek, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isnt satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If youre that type of person and are looking for a few extra skills to pick up, or if youre a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

 

 

geeks are sexy

 

 If you are passionate about computers and consider yourself a geek, or aspire to the honor of geekhood, heres an essential checklist of must-have geek skills:


1. The Meaning of Technical Acronyms

  • USB Universal Serial Bus
  • GPU Graphics Processing Unit
  • CPU Central Processing Unit
  • SATA Serial ATA
  • HTML Hyper-text Markup Language
  • HTTP Hypertext Transfer Protocol
  • FTP File Transfer Protocol
  • P2P Peer-to-peer sharing (See http://en.wikipedia.org/wiki/P2P)


 

 

2. How to Reset RAM

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. Its amazing how few people know how to do this. If youre unsure, hit up the link below to find out how:

http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

This tip is only really good for older machines running 9x based OSs. However if you are running Windows Vista this can have a problem with RAM so here is how to create a desktop shortcut to free up RAM.

1. Right-click on your desktop and select New > Shortcut.
2. Copy/paste the following into the box: %windir%system32 undll32.exe advapi32.dll,ProcessIdleTasks
3. Click Next, name it Clear Memory, and click Finish.Give it asuitable icon so it looks nice.


 

 

3. Identify Keyloggers

Internet cafes are the most likely place youll find them, followed by library, perhaps, and maybe even you own house if youve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?

Heres what one looks like:

Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:

http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/


 

 

4. Surf the Web Anonymously

We wont make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.

Aside from the safest methodwhich is using a connection that is not yoursyou will need the ultimate in proxiesTor. Tor is an onion-routing system which makes it impossible for someone to find out who you actually are.


 

 

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldnt use this to gain unlawful access to a computer. If youre a geek, however, youll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.

See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.

http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/


 

 

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people dont realize that. If someone is harassing you via AIM and you cant get them to stop, discovering their IP and sending it to themwith a nicely worded threat of law enforcement involvement should they not stopis likely enough to send them scamping away with tail between legs.

http://www.elitehackers.info/forums/archive/index.php/t-2827.html


 

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but theres always the chance of them being discovered. A password protected RAR is the best choice, but its a bit obvious despite the most boring title you could give it.

A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.

http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/


 

 

8. Crack a Wifi Password

This is one of those things you dont need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people dont want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.

A good overall tutorial on wifi and cracking can be found here:http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

 


 

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether youre curious about what your roommate is downloading, your kid is getting into, or any leeches living around you whove unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.

Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html



10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.

Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm


 

 

11. Retrieve Data off Hard Drive

There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasonsphysical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.

To find out how to retrieve data off a damaged hard drive, read here: http://www.ehow.com/list_7225818_5-off-crashed-hard-drive.html

 


 

 

12. Load Rockbox onto an MP3 Player

The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If youre an audiophileor simply frustrated with the lack of control over your music settingsRockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.

http://rockbox.org


The term geek, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isnt satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.

A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If youre that type of person and are looking for a few extra skills to pick up, or if youre a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

 

 

geeks are sexy

 

 If you are passionate about computers and consider yourself a geek, or aspire to the honor of geekhood, heres an essential checklist of must-have geek skills:


1. The Meaning of Technical Acronyms

  • USB Universal Serial Bus
  • GPU Graphics Processing Unit
  • CPU Central Processing Unit
  • SATA Serial ATA
  • HTML Hyper-text Markup Language
  • HTTP Hypertext Transfer Protocol
  • FTP File Transfer Protocol
  • P2P Peer-to-peer sharing (See http://en.wikipedia.org/wiki/P2P)


 

 

2. How to Reset RAM

If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. Its amazing how few people know how to do this. If youre unsure, hit up the link below to find out how:

http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

This tip is only really good for older machines running 9x based OSs. However if you are running Windows Vista this can have a problem with RAM so here is how to create a desktop shortcut to free up RAM.

1. Right-click on your desktop and select New > Shortcut.
2. Copy/paste the following into the box: %windir%system32 undll32.exe advapi32.dll,ProcessIdleTasks
3. Click Next, name it Clear Memory, and click Finish.Give it asuitable icon so it looks nice.


 

 

3. Identify Keyloggers

Internet cafes are the most likely place youll find them, followed by library, perhaps, and maybe even you own house if youve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?

Heres what one looks like:

Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:

http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/


 

 

4. Surf the Web Anonymously

We wont make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.

Aside from the safest methodwhich is using a connection that is not yoursyou will need the ultimate in proxiesTor. Tor is an onion-routing system which makes it impossible for someone to find out who you actually are.


 

 

5. Bypass a Computer Password on All Major Operating Systems

Obviously you shouldnt use this to gain unlawful access to a computer. If youre a geek, however, youll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.

See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.

http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/


 

 

6. Find a Users IP Address on AIM

Knowing someones IP address is actually pretty useless in this case, but most people dont realize that. If someone is harassing you via AIM and you cant get them to stop, discovering their IP and sending it to themwith a nicely worded threat of law enforcement involvement should they not stopis likely enough to send them scamping away with tail between legs.

http://www.elitehackers.info/forums/archive/index.php/t-2827.html


 

7. Hide a File Behind a JPEG

So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but theres always the chance of them being discovered. A password protected RAR is the best choice, but its a bit obvious despite the most boring title you could give it.

A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.

http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/


 

 

8. Crack a Wifi Password

This is one of those things you dont need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people dont want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.

A good overall tutorial on wifi and cracking can be found here:http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

 


 

9. Monitor Network Traffic

The Internet is a vast place with a bit of everything. Whether youre curious about what your roommate is downloading, your kid is getting into, or any leeches living around you whove unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.

Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html



10. Recover Master Boot Record

A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.

Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm


 

 

11. Retrieve Data off Hard Drive

There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasonsphysical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.

To find out how to retrieve data off a damaged hard drive, read here: http://www.ehow.com/list_7225818_5-off-crashed-hard-drive.html

 


 

 

12. Load Rockbox onto an MP3 Player

The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If youre an audiophileor simply frustrated with the lack of control over your music settingsRockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.

http://rockbox.org

IBM Solar Energy Collector: Soon they will power the whole Ear...

Post Your Comment

Give Rating :      

Reviews/Comments

  • Humble 3 years ago

    hiiiii

    1like
    • Humble 3 years ago

      hii

      Recommended Articles

      Related Articles