Sokolov's twiter! RSS Лента
Scientists have found the key to recreating the human brain? Scientists have found the key to recreating the human brain?
If you want to build a computer on what that image and likeness, then in that case you have to copy it exactly.... [2017-03-12]

 Scientists: the human brain unique Scientists: the human brain unique
People say, "our brains work differently, but nevertheless they are unique," and at this stage of the tests, a team of scientists from the University Carnegie Mellon has proven that it is literally so.... [2016-11-20]

Scientists from MIT have made sensor-tablet Scientists from MIT have made sensor-tablet
Have you ever been at a reception at the therapist? The doctor first takes the Stethoscope and starts to listen to your heart and lungs, for the presence of a heart murmur or rales in the lungs, if not, then the doctor ex... [2016-01-09]

It Appears to use smartphones unhealthy! It Appears to use smartphones unhealthy!
Previously, not one physician or group of physicians so definitely not claimed to use smartphones not very desirable. There have only been warnings about that.... [2015-03-06]

teleshema - Free operating instructions of consumer electronics

Put on your server proxy

Put on your server proxy As we decided to go to one forum and procommunity your post and what Yeah malicious forum admin banned my IP Solution found immediately, downloaded proxy list attach it to the Message and I qualify. The next day he went again to the forum, but could not enter because proxies are dead. Here I think the trouble is, became a test proxy list and it turned out that the day is already 50% of proxicom just died. A week later he had to swing proxy list. In General my hemorrhoids had enough and I decided to acquire a specialized proxy.
the fact that you can find and use public proxicam, but where is the guarantee that they do not keep logs Will tell you so that those proxies leaves you see in the network and which supposedly super anonymous all complete nonsense. This is all a setup and just happens live-bait fishing. Do not you believe Then who pays for all of the traffic which they generate processes left on the servers Those who really wants to hide behind a specialized proxy, he does not use the fact that in public. Builds usually proximi himself. And variants can be called a lot. Can nylon pull on the riot, but you can 3proxy Second is easier if you have access via SSH. But I am not clever things to say and to fence hacker development. I advise you a canoe, so the admin of the forum to spend time on! And so we build our SOx serverok. Or simply open a tunnel through one of the ports and use as much as you want. Port choose not 8080 and 3128, type all know these ports. And for example 1897 or as something else. Maybe someone will decide to break your IP to a proxy, so it will have filigree ports and the firewall will meet:))) And these things get started. First of all, we need free hosting with support for SSH like this can be found without much difficulty. I know plenty of those. In order to be someone is thorn in one place miss this information. Best buy for a nominal hosting fee with this set as SSH and then just not worry about it. In order flattery to the server via SSH Protocol the software you need, which means look for the putty program. You can download it freely available without a problem.
now running putty enter the window the login and password and wait. The connection doesnot happen at once, but with a delay. The server and specify the port may by default unless told otherwise when you register.
Next under study in the connections tab, then find the SSH Protocol, and there find the word Tunnels What is the tunnels you understand. You create the bore in the server on a specific port. In General we find there how to add a new port (Add new forwarded port), there you will need to fill in the port there, write your port (1987). In fact the computer on which you build the tunnel and will be your specialized proxy in the future. Do not forget to choose the lower program tab, Auto and dynamic, and it will not work. And now click the add button... After clicking to open a connection you will see a black DOS tab, there you will enter the username and password. That is all! You have created on Windows server your socks proxy server. It was certainly fun, but from the perspective of functionality nonsense. And according to this set will be a specialized proxy type 3proxy/ to Put it simply. Follow the link and download the distro here http://3proxy.EN/0.6.1/3proxy-0.6.1.tgz He does not last but it works, and that the 7 version is buggy. In total we go to the root of our server and create a folder. It flooded the file 3proxy-0.6.1.tgz and go to our shh client. Select a team to razarhivirovat xvzf 3proxy.tgz next, look at where it is all gone and browsing to the folder do the build with the command make -f Makefile.unix For atech team who does not know here is a small educational program. pwd - get the name of the current directory
cd - change the current directory
ls - print information about files or directories
cat - drain or output files-arguments to standard output
cp - copy files
mv - move (rename) files
ln - create link to file
rm - delete files
rmdir - remove directory
mkdir - create directory
echo - print the command line arguments to standard output
ps - print information and the number of running processes
kill - to kill a running process by its number
man to issue a certificate of use and the keys of the team
IN General, when everything will work out. Wipe the window screen, it appears in the target binary finite. He has everything we need. But for him to smartly work, the config register. Our task is to trace on the server was not and the speed of a specialized proxy was higher. Everything else we just do not need. To create the file on the server config recruited streaming box, type cat >3proxy.cfg and in the opened window write the following... The
------- Write in the config----------
nserver ---Auto-DNS
auth none -- Cancel authorization
allow * -- Resolved to go with luogo corner of the planet
socks-p9876 --the Port of the socks
internal -- internal IP
log /dev/null --Here are written logs, write something written, but not read read!

ctrl+c and enter in the console to record everything that is typed in the window. Here we have given birth to a new file in the folder with a specialized proxy called 3proxy.cfg In principle, all ready to run the team specialized proxy of ./Srsohu 3proxy.cfg and then in your browser by adding in the proxy settings. That is all in principle...

<<<< Back >>>>

All about that there is best in the world of the electronics!