FaxZero lets you send a fax to any fax machine in the United States (including Puerto Rico) or Canada for free. You don’t need a fax machine yourself, but you do need a valid e-mail address.
The easiest way to send a fax is to just type or paste the text of your fax into to the Enter Text to Fax box. Or, you can click the Browse… button to fax a file on your computer: you can send a PDF, Microsoft Word (.DOC or .DOCX or .RTF) file, or Excel spreadsheet (.XLS or .XLSX).
If you attach a file, do not enter text in the “add text” box. You can send one or the other but not both in the same fax.
Currently this service is free for U.S and Canada.The service also lets you send faxes to many other countries — international faxing isn’t free, but is inexpensive.
Try It Now
ROSE EDIS is a real time world disaster & emergancy map.you can see real tome accident and disasters.
The various icons on the map illustrate natural disasters and accidents – everything including floods, earthquakes, forest fires, volcanoes, airplane accidents, terror attacks, etc. – that are happening in various parts of the world right now.
Try It Now
WeTransfer is the latest free platform in transferring large files (up to 2Gb).
They cater for all kinds of files, such as presentations, photos, videos, music, documents and more. You can send any type of file.
It’s simple. Go to http://www.wetransfer.com and select the file(s) you want to send. Fill in the receiver’s email addresses (up to 20) and your own email address. Write a message to your recipients (not mandatory). Then hit the ‘Transfer’ button, and the files are uploaded to the WeTransfer servers. Once the file(s) have reached your intended recipients, you receive an email that confirms that we have received the file(s). In that email you will also find a link to our wetransfer.info website where you can find anything you want to know about WeTransfer. When the file(s) is downloaded, you get an email that notifies you that the recipient has received your files successfully.
Try It Now
A pastebin is a type of web application which allows its users to upload snippets of text, usually samples of source code, for public viewing.
It is very popular in IRC channels where pasting large amounts of text is considered bad etiquette. A vast number of pastebins exist on the Internet, suiting a number of different needs and providing features tailored towards the crowd they focus on most.
Although there are literally thousands of pastebins available, most have a common set of features. They may appear different or target a different user base, but at the core, they take an upload or text paste and provide a sharable HTTP URL which contains the body of text.
Try It Now
Google Spreadsheets has always
been one of my favorite tools. I
was an early adopter ( I quickly
switched to the tool shortly after
Google discontinued Google
Notebook) and since then I’ve
been happy to see all the hard
work and hundreds of
improvements the Google Docs
team have been introducing.
Despite the fact that there are a
few great alternatives, I have
never really thought about
switching. Google Docs ( and
Google Spreadsheets) have
always been the most reliable
tool for me and, like with any
really great tools , there are
plenty of (partially) hidden
features inside Google
Spreadsheet you may be
amazed to discover.
Today’s post is about two really
cool Google Spreadsheet
functions that allow you to
always display the current date
and time in your
spreadsheet. This will become
particularly useful if you use
Google Spreadsheets to monitor
your tasks and deliverables, plan
your work week , track your
=TEXT ( NOW())
=TEXT ( NOW()) is a highly-
customizable official Google
Spreadsheet function that
returns the computer system
date and time in a cell.
Important note: The function
value is updated when your
document “re -calculates ”
which means that, unless you
make any edits to the document,
you are not going to see the
current date and time. However
if you plan to edit your
document on a regular basis (to
update the task statuses , for
example) , this is not going to be
an issue .
The awesome thing about this
function is that it has plenty of
available parameters that allow
to format the date and time in
various ways ):
See the current day , month and
year: = TEXT ( NOW () ; “yyyy -M-d ” )
returns 2011- 2 -20
See the current time (with
seconds): = TEXT( NOW () ;
“HH :mm: ss” ) returns 13 :24: 56
See the current day of the week
(and the number of the week in
a month) : = TEXT ( NOW () ; “yyyy
‘week ’ w ” ) returns 2011 week 8
See the current time and time
zone: = TEXT( NOW () ; “ HH :mm
z” ) returns 13: 24 GMT +00 :00
Even see the current era ! =TEXT
( NOW () ; “yyyy G GGGG” )
returns 2011 AD Anno Domini
Here’s an awesome spreadsheet
listing all the available
parameters as well as the
examples of usage .
if you use the = GoogleClock ()
function in a spreadsheet, it will
automatically update live
whenever you view the
spreadsheet (including shared
viewing). Besides, if you publish
a spreadsheet as a webpage , it
will automatically update every 5
The function always returns the
current date and time in the
following format (unless there
are any parameters I am not
aware of) :
m/dd /yyyy hh:mm :ss
Note: Here are similar functions
for Microsoft Excel (also updated
Are you aware of any other time
management functions in
Google Spreadsheets? Please let
us know !
Ok I'm back up at 3 o'clock in the morning to bring you another article..
Many of us out there think of ourselves as hackers but what is a REAL
hacker....Well for those of you out there that play with college computers
and local schools.... you are nothing !! The making of a real hacker is
being able to find a 'virgin' system and breking in and really doing
someting to it...Hacking is not a term to be used lightly....Not only
that but hacking is also something not to be taking lightly and
flagrently....The reason for hacking....Well you don't hack into a
computer just to wreck it or to destoy it even though it is phun, the
reason to hack into a computer is to learn from it and conquer it... The
idea of actually entering a system, without authorization is life line
of hacking....those out there who know what hacking is knows what to do and
what not to do but what are the basic rules......Well... here's a short
more or less complete list of do's and don'ts on hacking:
I. Do not purposely destroy a system -- What's the use of destorying a
system anyone....after it's destruction a system is no good and can
serve you no real purpose
II. Do not leave real names or real handles anywhere on a system -- This is
the most important thing to remember....you might want to be recognized
for breaking a system but a signature or trademark can only mean your
III. Do not under no circumstance hack a system directly -- If you really
plan on hacking a system by running a program or script doing it
direct could be dangerous if someone see's you attempting to hack
your call be CAN be traced...The best thing to do in this situation is
to use a PBX or a outdial of some sort
IV. Do not mess with accounts or defaults -- No matter what kind of urge
you get , by messing with someones account or messing with the system
defaults will let the business notice the intrusion of an outside
presence which more or less means a termination of your access
V. Do not mess with anything you don't know -- Don't go around the system
trying junk you don't understand cause this can only lead to you messing
up the system or getting caught
VI. Hack during the out of work hours -- By hacking late at night or early
in the morning to can escape the chances of someone watching you
VII. Do not post your findings on local boards -- Do not post up new stuff
you find unless you really want swarms of people at it....A very
important thing to control is the urge to brag about systems you find
but this could lead to an abuse of the system which in turn leads to
the system shutdown....Don't get me wrong about not sharing knowledge
but you don't want to send something public unless you have made sure
that you have done all you wanted to do with the system
That's more or less what you don't what to do....things you might want
to do is:
I. Set up a account for yourself -- By setting up an account for yourself
it will elimanate the chores of finding a backdoor to the system
II. Leech files -- Another thing that should be done if possible is to
get as many 'interesting' files as you can since they could be useful
in later hacking quests
III. Fix the security -- If you get a system that has a 'drop' password
you should really try to fix it so there is none to make life easier
for the following hackers who attempt to infiltrate the system
IV. Keep track of the system -- No matter how dumg the system might be
or how impossible the security is you should always keep track of
all numbers you have
V. Look for interestin items in the system -- Keep an eye for stuff that
resembles passwords or other numbers since this could lead to new
systems or usable passwords
That more or less covers that....BUT how do you find 'virgin' systems? Well
this is a part of hacking that all hackers most do....scanning...Scanning
or wardialing was brought to life by the popular hacker movie 'Wargames'
which inspired the war games wardialer....what a wardial or scanner does
is it goes thru all the numbers in a specified prefix.....A good wardialer
or scanner should be able to go thru numbers and be able to store them in
a file which you can go thru later when you're bored....The idea is to find
system beloning to companies and business....it's a good idea to find out
a prefix to lets say your downtown area...
Another thing that most companies also have is frequecies hooked up to
computers... This is a lot tuffer to scan for since you would nee to set up
a HAM radio to go thru frequencies and collect infomation on what
frequencies have carriers on the other ends...This is a fairly difficult
thing to do but he rewards could be great....the most importan thing to
remeber is to scan with the HAM in you car or something.....scanning from
a fixed location will only cause police and FBI to show up at your doorsteps..
When you've located a system don;t get discouraged if you get no response...
many system think that if they set it up to connect at wierd parity's or
stop bits and baud rate it's all the security so it is very important to
find a communication program that will allow to do wierd things such as
connecting at 1100 bauds and 1800 bauds....also to be able to set the parity
to mark and space...
Well I hope this phile helps you starters...I'm going to crash now I've
done my good deed for the day....well keep hacking but remember to hack
formaly ThE gH0sT
formaly ThE gH0sT
Many people use Newspapers to find jobs , some Hi tech people also use internet to search jobs . There are some more advance persons who also use social media to find jobs .Mashable has released a Youtube video guide on how to use twitter advance search to hunt jobs in a better way .