Bruteforcing encrypted Excel documents. Document also shows how to download, compile and run John The Ripper using a specific wordlist. Thanks for the info Andy. https://t.co/8cojn4FcEc
22 Mar 2019
Just added a free online DNS tool to my list of DNS tools. @dmarcian provides a free SPF record checker. Read more : https://t.co/C1TtTzKbv2 (sorry, this tweet contains the correct url) https://t.co/FJzueMs5UX
17 Mar 2019
@PrivacyPros Would be great if the carreer center has 1 - an option to filter or sort by region/country 2 - an e-mail service with the filtered results for iapp members.
09 Mar 2019
Dutch Supervisory Authority provided guidance today about #GDPR and the use of #CookieWalls. "Under the GDPR (#AVG), a cookiewall is not allowed. This is because you cannot get a valid permission from your visitors with a cookiewall" (Dutch) https://t.co/JPFvLPGU4Q @privacypros https://t.co/oygqKZHmZe
07 Mar 2019
Donít bet on anything happening for at least a couple of years on U.K. adequacy post-Brexit, advised European Data Protection Supervisor Giovanni Buttarelli https://t.co/T9V9mnFSyn via @DailyDashboard @PrivacyPros
04 Mar 2019
Free "Batch Icon Extractor"Get all the Icons out of applications. This easy to use application by RealWorld Graphics creates icon files for every icon in a Windows application. This free program can be a great help to create icons for your Citrix XenApp / XenDesktop environments.
How to use "Batch Icon Extractor"?
Example how the program works on the rw-designer site.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.3 : Tuesday 26-3-2019
© Copyright 1995-2019 Johan van Soest