ചില രണ്ടു വരി കവിതകൾ.

ഓർമിച്ചാൽ പൊടിയുന്ന ചോരയിലും ഭേദം ഓർമ്മിച്ചിടാത്തുള്ള കണ്ണുനീരല്ലേ.

കാത്തിരിപ്പും പൊടി ലഹരിയും ചേർത്ത് എഴുതാനുള്ള എന്തുവേണം,അത് തന്നെ നിനക്കു ഭക്ഷണം,അത് തന്നെ നിന്റെ സായൂജ്യം,അത് തന്നെയാല്ലോ നിന്റെ പ്രണയവും മരണവും.

മണ്മറഞ്ഞു പോകുക ചിന്തകൾ നിങ്ങൾ,മണ്മട്ടിയെടുത്തു വെട്ടണം ഇനിയും,അവിരാമം തുടരട്ടെ മരണവും ജനനവും,മരണമില്ലാത്തുള്ള ചിന്തകൾ ഉണ്ടെകിൽ മണമില്ലെന്ന ചിന്തയെത്തന്നെ ഞരമ്പ് മുറിച്ചു പോരു കളിക്കാം.

From Pocket 5:How to Change Your Default DNS to Google DNS for Fast Internet Speeds

“DNS (Domain Name system) is a set of numbers that is assigned by your respective ISPs to connect to the World Wide Web.  DNS first converts your domain name into an IP address and then connects to your ISP to loads pages over the web. Basically, it translates more readily memorized domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System is an essential component of the functionality of the Internet.

Why is your ISP’s DNS slow compared to Google DNS

Your ISP is into the business of providing you with Internet is basically to make money. Naturally, they try to cram as many DNS’s  as possible out of the range that is available to them. Each time you connect to your ISP, it assigns you a dynamic IP address through which you connect to the Internet. This often creates slow relay speeds and connection issues.”

Read more in :http://www.techworm.net/2016/08/change-default-dns-google-dns-fast-internet-speeds.html

From Pocket 4:How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

“Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi.

Kali Linux is an operating system built for network penetration testing. You can run it on your laptop to crack nearby Wi-Fi passwords, spoof networks, test for Bluetooth vulnerabilities, and tons of other things. Remember, using this knowledge to break into protected networks will likely get you arrested and charged with a felony—possibly a federal charge of violating the Computer Security Act. You should only use this knowledge for good, for your own learning, and only play with networks you control. We’ve talked pretty extensively about using Kali Linux before, so we won’t go through that here, but check out our guide for an overview of everything you can do with it. All of that applies to the Raspberry Pi version we’ll build here as well.”

Read more in http://www.lifehacker.co.uk/2015/10/30/build-portable-hacking-station-raspberry-pi-kali-linux