BOFH excuse generation table.
How to build various types of etherkiller.
A wiki devoted to explanation and analysis of FISMA (Federal Information Security Management Act) standards and requirements.
security reference infosec books computer tech ebooks military e-books standards it series rainbow 31337
Infosec related podcasts by the best known and respected professionals of the field.
security hacking networking infosec blog tech video podcast engineering it
How to bypass the BIOS boot passwords on a number of models of Toshiba laptop. This technique is really only applicable to older laptops, not many these days have parallel ports built in.
howto laptop toshiba password bios it sysadmin
How to install Sun/Oracle Java on an Ubuntu system. Some apps just aren't happy unless they can find Sun's trademark somewhere in the .jar files, I guess...
sun oracle java ubuntu linux debian sysadmin it software development
Stefan Ossowskis Schatztruhe has just uploaded a four disk archive of MODs, S3Ms, XMs, and other tracker music files to archive.org. If you're into chiptunes (Amiga MODs, in particular) this is at least a year's worth of music to listen to.
A silly page that has lots of useful stuff about unix, infosec, hacking, it, scripts, permissions, regexp, CLI tools, and other geek stuff. sysadmin reference
howto use ansible to configure and maintain a workstation. it git github management setup
How to hack a copy of memtest32 onto a USB key without having to install a whole copy of Linux onto the key to make it work. Uses syslinux and the pre-compiled memtest32 executable.