Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

Thursday, July 1, 2010

A GUIDE TO MEDITATION

A GUIDE TO MEDITATION - AMITAKH CHIAPPALONE

I entered Silence
a thousand times
before I saw the face of
True Silence.

Meditation is a natural state of mind.
It is purely a mental activity.
The main goal in meditation is to establish

Read

Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection

Abstract

Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler,
Wellenreiter and others is an increasingly popular technique for network penetration. The discovery of a wireless LAN might be used for seemingly innocuous Internet access, or to be used as a “backdoor” into a network to stage an attack. This paper reviews some of the tactics used in wireless LAN network discovery and attempts to identify some of the fingerprints left by wireless LAN discovery applications, focusing on the MAC and LLC layers. This fingerprint information can then be incorporated into intrusion detection tools capable of analyzing data-link layer traffic.

Read

CIA – PSYCHOLOGICAL OPERATIONS IN GUERRILLA WARFARE

A tactical manual for the revolutionary. First published by the Central Intelligence Agency and distributed to the Contras in Central America.

Read

PAY NO FINE – A User Guide to Successfully Fighting Traffic Tickets

PAY NO FINE – A User Guide to Successfully Fighting Traffic Tickets

Welcome to PAYNOFINE’S User Guide to Successfully Fighting Traffic Tickets. Since you are reading this, it can be presumed that you are one of the approximately 35 million people who received a traffic ticket this year. That actually breaks down to about 100,000 tickets a day! Our hope is that you will be one of the small and silent minority who successfully fight the system each year.

Read

Twenty-Five Ways To Suppress Truth: The Rules of Disinformation



Twenty-Five Ways To Suppress Truth: The Rules of Disinformation
by
H. Michael Sweeney

Built upon Thirteen Techniques for Truth Suppression by David Martin, the following may be useful to the initiate in the world of dealing with truth, lies, and suppression of truth when serious crimes are studied in public forums. Where the crime involves a conspiracy, or a conspiracy to cover up the crime, there will invariably be a disinformation campaign launched against those seeking to uncover and expose the conspiracy. There are specific tactics which disinfo artists tend to apply, as revealed here. Also included with this material are seven common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive
Read