Post Date Jun 28

Here Are 40 Free Hacking Tutorials!

penetration-testing Freelance Jobs
 Learning to become a hacker is not everybody’s cup of tea, well, at least it’s not as easy as learning to become a software developer. It doesn’t matter what level you are, a hacker requires to have in depth knowledge of a wide array of topics. Hacking is basically knowing about how things function and knowing why things function the way they do.  Ethical hacking, hacking, hacking tutorials, hacking resources, Hacking Tutorials for Beginners, How to learn Ethical hacking, Penetration Testing Tutorial, Backtrack Penetration Testing Tutorial, Introduction to Penetration Testing, Information Gathering with Nmap, Simple How To Articles, The Six Dumbest Ideas in Computer Security,  Secure Design Principles, 10 steps to secure software, Introduction to Public Key Cryptography, Crypto Tutorial, Introduction to Cryptography,


Here are some great hacking tutorials and resources that you can explore in your journey to learn hacking:

1. Hacking Tutorials for Beginners By

Unless you know how to hack, you cannot defend yourself from hackers. Break The Security(BTS) provides Penetration Testing and Ethical Hacking tutorials. It guides users to get into the PenTesting and Ethical Hacking World.

2. How to learn Ethical hacking By

You can learn all there is to know about Ethical hacking over here.

3. Penetration Testing Tutorial By

Here you learn Penetration Testing by practice. The goal of this testing is to find all security vulnerabilities that are present in the system being tested. This tutorial takes boredom out of learning and makes education a fun experience.

4. Backtrack Penetration Testing Tutorial

This Backtrack Penetration Testing Tutorial is a penetration testing tutorial using Backtrack Linux. Backtrack is the best penetration testing distribution. Offers some penetration testing programs and these programs will used in this Backtrack Penetration Testing Tutorial.

5. Introduction to Penetration Testing

The difference between penetration testing and hacking is whether you have the system owner’s permission. This tutorial helps you understand this better.

6. Information Gathering with Nmap

This tutorial consists of a series that will give a basic walkthrough of a penetration test. However, many tools on the backtrack distro will not be covered in these and could be asked from the author separately.

7. Simple How To Articles By Open Web Application Security

Series of articles describing how to perform a specific activity that contributes to application security.

8. The Six Dumbest Ideas in Computer Security

Introduces you to the six dumbest ideas in computer security: the anti-good ideas that come from misguided attempts to do the impossible.

9. Secure Design Principles

While there are many specific security practices, they flow from a small set of well-accepted principles. Understanding the fundamental principles puts you in the best position to implement specific practices where needed in your own projects. This tutorial guides you through the same.

10. 10 steps to secure software

The author and security analyst recommends that programmers follow some principles for developing secure software that is today’s weakest link.

11. Introduction to Public Key Cryptography

Public-key cryptography and related standards and techniques underlie security features of many Red Hat products, including signed and encrypted email, form signing, object signing, single sign-on, and the Secure Sockets Layer (SSL) protocol. This document introduces the basic concepts of public-key cryptography.

12. Crypto Tutorial

The page contains many crypto tutorials, totalling 973 slides in 12 parts, of which the first 10 (+ part 0) are the tutorial itself and the 12th is extra material which covers crypto politics.

13. Introduction to Cryptography

Deals with the very basics of cryptography.

14. An Overview of Cryptography

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter.

Freelance Jobs

15. Cryptography Tutorials Herong’s Tutorial Examples

Collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, public key, RSA, secret key, SHA1, SSL, X.509.

16. The Crypto Tutorial Herong’s Tutorial Examples

Easy-to-use, interactive cryptography tutorial. You have the opportunity to learn the secrets of cryptography in 30 lessons without having any background knowledge.

17. Handbook of Applied Cryptography 

This ebook contains some free chapter from one of the popular cryptography books.

18. Network Penetration testing Guide

Risk assessment is a critical first-step in the information security lifecycle. Network penetration testing offers an invaluable way to establish a baseline assessment of security as it appears from outside the organisation’s network boundaries.

19. How to hack anything in Java

Many applications in the enterprise world feature thick Java clients. Testing the security of such applications is considered practically more difficult than a similar browser-based client because inspecting, intercepting and altering application data is easy in the browser.

20. Mcafee on iPhone and iPad Security

Mobile application penetration testing is an up and coming security testing need that has recently obtained more attention, with the introduction of the Android, iPhone, and iPad platforms among others.

21. A Good Collection of White papers on security and vulnerabilities

Collection of white papers from different sources and some of these white papers are really worth referring.

22. Engineering Principles for Information Technology Security

The purpose of the Engineering Principles for Information Technology (IT) Security (EP-ITS) is to present a list of system-level security principles to be considered in the design, development, and operation of an information system.

23. Basic Principles Of Information Protection

As computers become better understood and more economical, every day brings new applications. Many of these new applications involve both storing information and simultaneous use by several individuals. The key concern in this paper is multiple use. For those applications in which all users should not have identical authority, some scheme is needed to ensure that the computer system implements the desired authority structure.

24. Open Web Application Security Project

Application security principles are collections of desirable application properties, behaviors, designs and implementation practices that attempt to reduce the likelihood of threat realisation and impact should that threat be realised.

25. Cryptography Course

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!








32. DEF CON – Hacking conference











Freelance Jobs

Post Date Jun 27

Awesome Sysadmin


A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP


Backup software.

  • Amanda – Client-server model backup tool.
  • Bacula – Another Client-server model backup tool.
  • Backupninja – Lightweight, extensible meta-backup system.
  • Backuppc – Client-server model backup tool with file pooling scheme.
  • Burp – Network backup and restore program.
  • Duplicity – Encrypted bandwidth-efficient backup using the rsync algorithm.
  • Lsyncd – Watches a local directory trees for changes, and then spawns a process to synchronize the changes. Uses rsync by default.
  • Rsnapshot – Filesystem Snapshotting Utility.
  • SafeKeep – Centralized pull-based backup using rdiff-backup.
  • TarSnap – Secure backup service with an open-source client.
  • UrBackup – Another client-server backup system.
  • DREBS – AWS EBS backup script that supports strategies.


Cloning software.

  • Clonezilla – Partition and disk imaging/cloning program.
  • Fog – Another computer cloning solution.
  • Redo Backup – Easy Backup, Recovery and Restore.

Cloud Computing

  • Archipel – Manage and supervise virtual machines using Libvirt.
  • CloudStack – Cloud computing software for creating, managing, and deploying infrastructure cloud services.
  • Eucalyptus – Open source private cloud software with AWS compatibility.
  • OpenNebula – An user-driven cloud management platform for sysadmins and devops.
  • OpenStack – Open source software for building private and public clouds.
  • The Foreman – Foreman is a complete lifecycle management tool for physical and virtual servers. FOSS.
  • Cobbler – Cobbler is a Linux installation server that allows for rapid setup of network installation environments.
  • Mesos – Develop and run resource-efficient distributed systems.

Cloud Orchestration

  • Cloudify – Open source TOSCA-based cloud orchestration software platform written in Python and YAML.
  • Juju – Cloud orechestration tool which manages services as charms, YAML configuration and deployment script bundles.
  • MCollective – Ruby framework to manage server orchestration, developed by Puppet labs.
  • Overcast – Deploy VMs across different cloud providers, and run commands and scripts across any or all of them in parallel via SSH.
  • Rundeck – Simple orchestration tool.
  • Salt – It’s written in Python.

Cloud Storage

  • git-annex assistant – A synchronised folder on each of your OSX and Linux computers, Android devices, removable drives, NAS appliances, and cloud services.
  • ownCloud – Provides universal access to your files via the web, your computer or your mobile devices.
  • Seafile – Another Open Source Cloud Storage solution.
  • SparkleShare – Provides cloud storage and file synchronization services. By default, it uses Git as a storage backend.
  • Swift – A highly available, distributed, eventually consistent object/blob store.
  • Syncthing – Open Source system for private, encrypted and authenticated distrobution of data.

Collaborative Software

Collaborative software or groupware suites.

  • Citadel/UX – Collaboration suite (messaging and groupware) that is descended from the Citadel family of programs.
  • EGroupware – Groupware software written in PHP.
  • Kolab – Another groupware suite.
  • SOGo – Collaborative software server with a focus on simplicity and scalability.
  • Zimbra – Collaborative software suite, that includes an email server and web client.

Configuration Management Database

Configuration management database (CMDB) software.

  • i-doit – Open Source IT Documentation and CMDB.
  • iTop – A complete open source, ITIL, web based service management tool.
  • Ralph – Asset management, DCIM and CMDB system for large Data Centers as well as smaller LAN networks.
  • Clusto – Helps you keep track of your inventory, where it is, how it’s connected, and provides an abstracted interface for interacting with the elements of the infrastructure.

Configuration Management

Configuration management tools.

  • Ansible – It’s written in Python and manages the nodes over SSH.
  • CFEngine – Lightweight agent system. Configuration state is specified via a declarative language.
  • Chef – It’s written in Ruby and Erlang and uses a pure-Ruby DSL.
  • Fabric – Python library and cli tool for streamlining the use of SSH for application deployment or systems administration tasks.
  • Pallet – Infrastructure definition, configuration and management via a Clojure DSL.
  • Puppet – It’s written in Ruby and uses Puppet’s declarative language or a Ruby DSL.
  • Salt – It’s written in Python.
  • Slaughter – It’s written in Perl.

Continuous Integration & Continuous Deployment

Continuous integration/deployment software.

  • Buildbot – Python-based toolkit for continuous integration.
  • GitLab CI – Based off of ruby. They also provide GitLab, which manages git repositories.
  • Go – Open source agile build and release management software.
  • Jenkins – An extendable open source continuous integration server.
  • Vlad the Deployer – Deployment automation.

Distributed Filesystems

Network distributed filesystems.

  • Ceph – Distributed object store and file system.
  • DRBD – Disributed Replicated Block Device.
  • GlusterFS – Scale-out network-attached storage file system.
  • HDFS – Distributed, scalable, and portable file-system written in Java for the Hadoop framework.
  • Lustre – A type of parallel distributed file system, generally used for large-scale cluster computing.
  • MooseFS – Fault tolerant, network distributed file system.
  • MogileFS – Application level, network distributed file system.
  • OpenAFS – Distributed network file system with read-only replicas and multi-OS support.
  • TahoeLAFS – secure, decentralized, fault-tolerant, peer-to-peer distributed data store and distributed file system.
  • XtreemFS – XtreemFS is a fault-tolerant distributed file system for all storage needs.


DNS servers.

  • Bind – The most widely used name server software.
  • djbdns – A collection of DNS applications, including tinydns.
  • Designate – DNS REST API that support several DNS servers as its backend.
  • dnsmasq – A lightweight service providing DNS, DHCP and TFTP services to small-scale networks.
  • Knot – High performance authoritative-only DNS server.
  • NSD – Authoritative only, high performance, simple name server.
  • PowerDNS – DNS server with a variety of data storage back-ends and load balancing features.
  • Unbound – Validating, recursive, and caching DNS resolver.
  • Yadifa – Lightweight authoritative Name Server with DNSSEC capabilities powering the .eu top-level domain.

Hosting Control Panels

Web hosting control panels

  • Ajenti – Control panel for Linux and BSD.
  • Feathur – VPS Provisioning and Management Software.
  • ISPConfig – Hosting control panel for Linux.
  • VestaCP – Hosting panel for Linux but with Nginx.
  • Virtualmin – Control panel for Linux based on webmin.
  • ZPanel – Control panel for Linux, BSD, and Windows.


IMAP/POP3 mail servers.

  • Courier IMAP/POP3 – Fast, scalable, enterprise IMAP and POP3 server.
  • Cyrus IMAP/POP3 – Intended to be run on sealed servers, where normal users are not permitted to log in.
  • Dovecot – IMAP and POP3 server written primarily with security in mind.
  • Qpopper – One of the oldest and most popular server implementations of POP3.

IT Asset Management

IT Assets Management software.

  • GLPI – Information Resource-Manager with an additional Administration Interface.
  • OCS Inventory NG – Enables users to inventory their IT assets.
  • RackTables – Datacenter and server room asset management like document hardware assets, network addresses, space in racks, networks configuration.
  • Ralph – Asset management, DCIM and CMDB system for large Data Centers as well as smaller LAN networks.
  • Snipe IT – Asset & license management software.


LDAP servers.

Log Management

Log management tools: collect, parse, visualize …

  • Elasticsearch – A Lucene Based Document store mainly used for log indexing, storage and analysis.
  • Fluentd – Log Collector and Shipper.
  • Flume – Distributed log collection and aggregation system.
  • Graylog2 – Pluggable Log and Event Analysis Server with Alerting options.
  • Heka – Stream processing system which may be used for log aggregation.
  • Kibana – Visualize logs and time-stamped data.
  • Logstash – Tool for managing events and logs.


Monitoring software.

  • Cacti – Web-based network monitoring and graphing tool.
  • Cabot – Monitoring and alerts, similar to PagerDuty.
  • check_mk – Collection of extensions for Nagios.
  • Icinga – Fork of Nagios.
  • LibreNMS – fork of Observium.
  • Monit – Small Open Source utility for managing and monitoring Unix systems.
  • Munin – Networked resource monitoring tool.
  • Naemon – Network monitoring tool based on the Nagios 4 core with performance enhancements and new features.
  • Nagios – Computer system, network and infrastructure monitoring software application.
  • Observium – SNMP monitoring for servers and networking devices. Runs on linux.
  • OMD – The Open Monitoring Distribution.
  • Opsview – Based on Nagios 4, Opsview Core is ideal for small IT and test environments.
  • Riemann – Flexible and fast events processor allowing complex events/metrics analysis.
  • Sensu – Open source monitoring framework.
  • Sentry – Application monitoring, event logging and aggregation.
  • Shinken – Another monitoring framework.
  • Thruk – Multibackend monitoring webinterface with support for Naemon, Nagios, Icinga and Shinken.
  • Xymon – Network monitoring inspired by Big Brother.
  • Zabbix – Enterprise-class software for monitoring of networks and applications.
  • Zenoss – Application, server, and network management platform based on Zope.

Metric & Metric Collection

Metric gathering and display software.

  • Collectd – System statistic collection daemon.
  • Collectl – High precision system performance metrics collecting tool.
  • Dashing – Ruby gem that allows for rapid statistical dashboard development. An all HTML5 approach allows for big screen displays in data centers or conference rooms.
  • Diamond – Python based statistic collection daemon.
  • Grafana – A Graphite & InfluxDB Dashboard and Graph Editor.
  • Ganglia – High performance, scalable RRD based monitoring for grids and/or clusters of servers. Compatible with Graphite using a single collection process.
  • Graphite – Open source scaleable graphing server.
  • InfluxDB – Open source distributed time series database with no external dependencies.
  • OpenTSDB – Store and server massive amounts of time series data without losing granularity.
  • RRDtool – Open source industry standard, high performance data logging and graphing system for time series data.
  • Statsd – Application statistic listener.

Network Configuration Management

Network configuration management tools.

  • GestióIP – An automated web based IPv4/IPv6 IP Address Management tool.
  • RANCID – Monitors network device’s configurarion and maintain history of changes.
  • rConfig – Another network device configuration management tool.


Newsletter software.

  • DadaMail – Mailing List Manager, written in Perl.
  • phpList – Newsletter manager written in PHP.


NoSQL databases.

  • Column-Family
    • Apache HBase – Hadoop database, a distributed, big data store.
    • Cassandra – Distributed DBMS designed to handle large amounts of data across many servers.
  • Document Store
    • CouchDB – Ease of use, with multi-master replication document-oriented database system.
    • ElasticSearch – Java based database, popular with log aggregation, and email archiving projects.
    • MongoDB – Another document-oriented database system.
    • RavenDB – Document based database with ACID/Transactional features.
    • RethinkDB – Open source distributed document store database, focuses on JSON.
  • Graph
    • FlockDB – Twitter’s distributed, fault-tolerant graph database.
    • Neo4j – Open source graph database.
  • Key-Value
    • LevelDB – Google’s high performance key/value database.
    • Redis – Networked, in-memory, key-value data store with optional durability.
    • Riak – Another fault-tolerant key-value NoSQL database.

Comparison of NoSQL servers:


  • fpm – Versatile multi format package creator.
  • omnibus-ruby – Full stack, cross distro packaging software (Ruby).
  • packman – Full stack, cross distro packaging software (Python).


  • BeanstalkD – A simple, fast work queue.
  • NSQ – A realtime distributed messaging platform.
  • RabbitMQ – Robust, fully featured, cross distro queuing system.
  • ZeroMQ – Lightweight queuing system.


Relational DBMS.

  • Firebird – True universal open source database.
  • Galera – Galera Cluster for MySQL is an easy-to-use high-availability solution with high system up-time, no data loss, and scalability for future growth.
  • MariaDB – Community-developed fork of the MySQL.
  • MySQL – Most popular RDBMS server.
  • Percona Server – Enhanced, drop-in MySQL replacement.
  • PostgreSQL – Object-relational database management system (ORDBMS).
  • PostgreSQL-XL – Scalable Open Source PostgreSQL-based database cluster.
  • SQLite – Library that implements a self-contained, serverless, zero-configuration, transactional SQL DBS.


Security tools.

  • Fail2Ban – Scans log files and takes action on IPs that show malicious behavior.


SMTP servers.

  • Exim – Message transfer agent (MTA) developed at the University of Cambridge.
  • Haraka – A high-performance, pluginable SMTP server written in JavaScript.
  • MailCatcher – Ruby gem that deploys a simply SMTP MTA gateway that accepts all mail and displays in web interface. Useful for debugging or development.
  • Maildrop – Open Source disposable email SMTP server, also useful for development.
  • OpenSMTPD – Secure SMTP server implementation from the OpenBSD project.
  • Postfix – Fast, easy to administer, and secure Sendmail replacement.
  • Qmail – Secure Sendmail replacement.
  • Sendmail – Message transfer agent (MTA).

Software Containers

Operating system–level virtualization.

  • Docker – Open platform for developers and sysadmins to build, ship, and run distributed applications.
  • OpenVZ – Container-based virtualization for Linux.


SSH tools.

  • autossh – Automatically respawn ssh session after network interruption.
  • Cluster SSH – Controls a number of xterm windows via a single graphical console.
  • DSH – Dancer’s shell / distributed shell – Wrapper for executing multiple remote shell commands from one command line.
  • Mosh – The mobile shell.
  • parallel-ssh – Provides parallel versions of OpenSSH and related tools.
  • SSH Power Tool – Execute commands and upload files to many servers simultaneously without using pre-shared keys.


Analytics software.

Freelance Jobs
  • Analog – The most popular logfile analyser in the world.
  • Piwik – Free and open source web analytics application.
  • Webalizer – Fast, free web server log file analysis program.

Ticketing systems

Web-based ticketing system.

  • Bugzilla – General-purpose bugtracker and testing tool originally developed and used by the Mozilla project.
  • Cerb – A group-based e-mail management project built with a commercial open source license.
  • Flyspray – Web-based bug tracking system written in PHP.
  • MantisBT – Another web-based bug tracking system.
  • osTicket – Open source support ticket system.
  • Otrs – A free and open-source trouble ticket system software package that a company, organization, or other entity can use to assign tickets to incoming queries and track further communications about them.
  • Request Tracker – Ticket-tracking system written in Perl.
  • TheBugGenie – Open source ticket system with extremely complete users rights granularity.


Troubleshooting Tools.

  • mitmproxy – A Python tool used for intercepting, viewing and modifying network traffic. Invaluable in troubleshooting certain problems.
  • Sysdig – Capture system state and activity from a running Linux instance, then save, filter and analyze.

Project Management

Web-based project management and bug tracking systems.

Version control

Software versioning and revision control.

  • Fossil – Distributed version control with built-in wiki and bug tracking.
  • Git – Distributed revision control and source code management (SCM) with an emphasis on speed.
  • GNU Bazaar – Distributed revision control system sponsored by Canonical.
  • Mercurial – Another distributed revision control.
  • Subversion – Client-server revision control system.


Virtualization software.

  • Ganeti – Cluster virtual server management software tool built on top of KVM and Xen.
  • KVM – Linux kernel virtualization infrastructure.
  • oVirt – Manages virtual machines, storage and virtual networks.
  • Packer – A tool for creating identical machine images for multiple platforms from a single source configuration.
  • Vagrant – Tool for building complete development environments.
  • VirtualBox – Virtualization product from Oracle Corporation.
  • Xen – Virtual machine monitor for 32/64 bit Intel / AMD (IA 64) and PowerPC 970 architectures.


VPN software.

  • OpenVPN – Uses a custom security protocol that utilizes SSL/TLS for key exchange.
  • Pritunl – OpenVPN based solution. Easy to set up.
  • SoftEther – Multi-protocol software VPN with advanced features
  • sshuttle – Poor man’s VPN.
  • strongSwan – Complete IPsec implementation for Linux.
  • tinc – Distributed p2p VPN.


XMPP servers.

  • ejabberd – XMPP instant messaging server written in Erlang/OTP.
  • Metronome IM – Fork of Prosody IM.
  • MongooseIM – Fork of ejabberd.
  • Openfire – Real time collaboration (RTC) server.
  • Prosody IM – XMPP server written in Lua.
  • Tigase – XMPP server implementation in Java.


Webmail applications.

  • RainLoop – Simple, modern & fast web-based IMAP client.
  • Roundcube – Browser-based IMAP client with an application-like user interface.


Web servers.

  • Apache – Most popular web server.
  • Cherokee – Lightweight, high-performance web server/reverse proxy.
  • Lighttpd – Web server more optimized for speed-critical environments.
  • Nginx – Reverse proxy, load balancer, HTTP cache, and web server.
  • uWSGI – The uWSGI project aims at developing a full stack for building hosting services.

Web Performance

  • HAProxy – Software based load Balancing, SSL offloading and performance optimization, compression, and general web routing.
  • Varnish – HTTP based web application accelerator focusing on optimizing caching and compression.


Wiki software.

  • DokuWiki – Simple to use and highly versatile wiki that doesn’t require a database.
  • ikiwiki – A wiki compiler.
  • Mediawiki – Used to power Wikipedia.
  • MoinMoin – An advanced, easy to use and extensible WikiEngine with a large community of users.
  • TiddlyWiki – Complete interactive wiki in JavaScript.


Various resources, such as books, websites and articles, for improving your skills and knowledge.



Sysadmin related books.


Open source code editors.

  • Atom – A hackable text editor from Github.
  • Brackets – Open source code editor for web designers and front-end developers.
  • Eclipse – IDE written in Java with an extensible plug-in system.
  • Geany – GTK2 text editor.
  • GNU Emacs – An extensible, customizable text editor-and more.
  • Haroopad – Markdown editor with live preview.
  • ICEcoder – Code editor awesomeness, built with common web languages.
  • jotgit – Git-backed real-time collaborative code editing.
  • Lime – Aims to provide an open source solution to Sublime Text
  • Vim – A highly configurable text editor built to enable efficient editing.


Software package repositories.

  • Dotdeb – Repository with LAMP updated packages for Debian.
  • Remi – Repository with LAMP updated packages for RHEL/Centos/Fedora.


Useful sysadmin related websites.

  • Ops School – Comprehensive program that will help you learn to be an operations engineer.
  • Digital Ocean Tutorials – A surprisingly vast resource for getting the basics of certain applications, tools, or even systems administration topics. (Note: Digital Ocean pays authors for this content)


Please see CONTRIBUTING for details.

Found this pearl at ;)

Post Date Jun 9

Dummies guide to Bitcoin Mining



Freelance Jobs

Embedly Powered




Post Date Apr 22

7 Reasons Why You Will Never Do Anything Amazing With Your Life By Raymmar

steve jobs quotes

Be sure to grab Raymmar’s  podcasts on Stitcher!

Yeah that’s right; you heard me… I’m talking to you… I’m calling you out.

I’m looking you in the eyes, (ok well, not really since you are probably reading this article, but figuratively, I am burning a cyclops type hole in your face right now) and telling you that you don’t stand a chance.

I’m telling you that if you can read this article, look through this list and not claim it as your own, then you should be a little worried.

Actually, you should be very worried. You should drop everything and immediately question your existence on earth. You should find a mirror, look yourself in the eyes, raise your hand and slap yourself in the face.

Got it? Now repeat that until you come to your senses and continue reading whenever you’re ready.

I’m Talkin’ ‘Bout Street Skills Son!

I’m not talking about the: study hard, party light, graduate top-of-your-class skills.

I’m not even talking about the: slack-off, skip class, smoke weed, drink and party but still graduate, skill-set your $50,000+ diploma has lead you to believe you have.

“I’m talking ’bout, step out your door, make some moves, and get-some-shit-done, kind of skills! Some, move out your mama’s house, quit your job — say “fuck the world” — and then actually go do it, kind of skills”.

The kind of skills you develop in the real world, outside the bubble of your parents protection or the ideological indoctrination that has overwhelmed our entire educational system.

Skills that can be had by anyone willing to pay the price to get them. Skills that are quickly becoming extinct.

I’m talking about skills that cannot be taught in a classroom or in a textbook. Skills you can only learn by doing; by learning how to fly after jumping off the cliff.

Skills that can only be developed when you find your true self. When you put yourself on the line or otherwise expose yourself to the possibility of failure.

The skills you can only develop when you are willing to risk it all in order to do that one amazing thing.

Skills that up until now, you thought you had.

“Basically, what I am trying to tell you is that, in this game called life, you don’t stand a chance…

1 :: Because You Have Not Failed Enough

Because you are comfortable in your mediocrity; because you choose not to try.

Because it is easier to talk about learning that new (programming?) language as opposed to actually learning it.

Because you think everything is too hard or too complicated so you will just “sit this one out”, or maybe you’ll, “do-it-tomorrow”!

Because you hate your job but won’t get a new one; because it is easy to reject rejection.

Because while you’re sitting around failing to try, I am out there trying to fail, challenging myself, learning new things and failing as fast as possible.

Because as I fail, I learn, and then adjust my course to make sure my path is always forward. Like the process of annealing steel, I’ve been through the fire and pounded into shape. The shape of a sword with polished edges and a razor sharp blade that will cut you in half if you are not equally hardened.

2 :: Because You Care What Others Think About You

Because you have to fit in.

Because you believe that being different is only cool if you’re different in the same way that other people are different.

Because you are afraid to embrace your true self for fear of how the world will see you. You think that because you judge others, this means that those people must, in-turn, be judging you.

Because you care more about the stuff you have as opposed to the things you’ve done.

Because while you’re out spending your money on new outfits, new cars, overpriced meals or nights at the bar, I’ll be investing in myself. And while you try to fit in with the world I’ll make the world fit in with me.

Because I will recklessly abandon all insecurities and expose my true self to the world. I will become immune to the impact of your opinion and stand naked in a crowd of ideas; comfortable in knowing that while you married the mundane I explored the exceptional.

3 :: Because You Think You Are Smarter Than You Are

Because you did what everyone else did; you studied what they studied and read what they read.

Because you learned what you had to learn in order to pass their tests and you think that makes you smart.

Because you think learning is only something people do in schools.

Because while you were away at college, I was studying life; because instead of learning about the world in a classroom I went out and learned it by living.

Because I know more than any piece of paper you could ever frame from a university. Because smart is not what you learn, it’s how you live.

Because I might not have a degree but I challenge you to find a topic that I can’t talk to you about cohesively.

Because I could pass your tests if I had to, but you couldn’t stand for a single second in the face of the tests that life has thrown me. Tests that are not graded on a bell curve or by percentages; tests that are graded by one simple stipulation: survival!

4 :: Because You Don’t Read

Because you read the things you are required to read or nothing at all.

Because you think history is boring and philosophy is stupid.

Because you would rather sit and watch “E!” or “MTV” instead of exploring something new, instead of diving head first, into the brain of another man in an attempt to better understand the world around you.

Because you refuse to acknowledge that all the power in the world comes from the words of those that lived before us. That anything you desire can be had by searching through the multitude of words that are available to us now more abundantly than ever before.

Because you are probably not reading this article even though you know you should.

Because the people that are reading this already know these things.

Because you can lead a horse to water but you can’t make him drink.

5 :: Because You Lack Curiosity

Because you get your news from copy-cat members of the state-controlled media.

Because you are unwilling to ask this simple question… “What if it’s all a lie?”, and accept the possibility that maybe it is; that just maybe, the methods of mass media are under direct orders to: keep you distracted.

Because you call me a know-it-all but refuse to call yourself a know-nothing-at-all.

Because I thirst for knowledge, regardless the topic.

Because while you’re busy playing Candy Crush, or Megalopolis, I am reading about string theory and quantum mechanics.

Because while you waste your time with Tosh.o I am learning how to edit video, build websites and design mobile apps.

Because if we were to go heads-up in a debate, I would crush you. I would make it a point to defeat my own argument; from every imaginable angle; in order to understand everything you might be able to use against me.

Because I would dedicate myself to understanding both sides of the argument so thoroughly that I could argue your side for you and win; even after having just handed you a defeat in the same debate.

6 :: Because You Don’t Ask Enough Questions

Because you do not question authority.

Because you don’t question yourself.

Because you don’t understand the power of properly placed questioning in life, respectful disagreements and standing up for what you know to be right in the face of someone telling you otherwise. Unable to question reality; stuck in a self imposed survival strategy within a matrix-style monotony.

Because I know that you will give me all the information I need to destroy you by letting you talk.

Because I study human behaviors and you ignore everyone but yourself.

Because I watch how you say the things you say just as closely as I listen to what you say; and you say way too much!

Because control comes, not from spewing your ignorance like some incurable case of logorrhea, but from properly structuring the context of your questions.

Because I study the premise of your argument and destroy it from the ground level before you even get a chance to establish your ideas.

7 :: Because You Can’t Handle The Truth

Because you refuse to admit that you don’t even know the things you don’t know.

Because there isn’t an article online that would make up for all the time you have wasted in life.

Because even if I told you everything could be different tomorrow you would wait until then to begin doing anything about it.

Because even when you think I’m not, I’m aware of my surroundings.

Because you think that since I have not acknowledged you, it means that I have not seen you.

Because, you walk around with your head up your ass, oblivious to the world around you. Blissfully ignorant of the reality that sits so close to your face that if you stuck your tongue out, just once, you would taste it and realize how delicious the truth actually is.

Because you would become an instant addict. Unable to pull yourself from the teat of truth. Finally able to understand your lack of understanding, and then you would see; then you would know that the only thing holding you back from doing something truly amazing, is you.

Explore the original article and join the discussion @

Post Date Mar 25

How To Install and Setup TileStache Maptiles Server On Ubuntu Server


This tutorial will walk you through installing the TileStache Maptiles server on Ubuntu Server.

About TileStache

TileStache is a Python-based server application that can serve up map tiles based on rendered geographic data. You might be familiar with TileCache, the venerable open source WMS server from MetaCarta. TileStache is similar, but we hope simpler and better-suited to the needs of designers and cartographers.

You can run this tutorial on your Server as a user with sudo privileges. You can check out how to set that up here: *Initial Ubuntu Server Setup *

1) Update Your Ubuntu VPS

Before we do anything else, we should run a quick update to make sure that all of the packages we download to our Server are up to date:

A series of items will fly by and you will be prompted to install… press Y followed by Enter. This will take a few minutes.

It is a good idea to restart your Ubuntu Server to make sure any new packages that were downloaded are freshly loaded

2)Install Required Dependencies

If you haven’t installed them already, you should install the Ubuntu dependency requirements.

3)Install easy_install and pip

pip is a tool for installing and managing Python packages, such as those found in the Python Package Index. It’s a replacement for easy_install. To navigate to your home directory.

type the following:

Then issue the below command:

Next step is to run the downloaded script. To do this, issue this command:

and type your user password when prompted (Please, note that your account needs to be a member of Administrators group in order to issue sudo). Hit Enter and let the script run.

To ensure easyinstall is installed, issue the command below:

The typical response in case the installation completed successfully would look something like this:

The next thing to do is use easyinstall to install pip.

For that you’ll need to issue:

Enter your password if prompted to confirm command. Let the installer run and once the installation is completed type:

This command should typically respond with something like this:

now we are done with installation of pip

4)Install uWSGI

We will install uwsgi from pip and not using aptitude, as Aptitude seems to install an older version of uwsgi.

5)Install TileStache

First of all we should fix PIL path libraries by :

To install the TileStache and its Dependencies, issue the following commands: Install PIL

We are done with installation of TileStache, now lets configure it.

6)Configure TileStache

TileStache configuration is done in a Json file as shown below: Now lets create a new folder in “/var/mapserver”.

now change to “/var/mapserver”.

Create a new config file for TileStache

paste the below content into config file we created above.

Save the file and exit.

7) Run Server

Type the following command to start server on port 8080 of your Server

We are done. now open your droplets ipaddress:8080/osm/ in browser,you see tilesfrom OpenStreetMaps with this you have successfully setup a TileStache Maps server.