Hot Invisible Computer Posts
News: Wolfram Analysis of Your Facebook!
This is pretty awesome, check it out! Wolfram Alpha's Facebook Report Analyzes Every Dark Corner of Your Facebook Activity.
News: Merge Audio Files
My mp3 player is really crappy so it sometimes doesn't recognize books I rip, so if you want to play it in order you have to rename all the files. To make this easier, I merge each disc into one file. It's also great for other purposes. This program is free and works well! Merge MP3.
News: Stop Windows Update from Shutting Down Your Computer
Sometimes windows will shutdown for "updates", which is great and all except when you had an unsaved project in the works or a huge file conversion that you expected to be completed when you wake up, only to find your computer rebooted.
News: GMusic-Desktop Client for Google Music
This program makes Google Music a lot easier to use! If you are like me and frequently have the need to skip a song or pause momentarily, then this client will enable you to do this from your desktop instead of navigating to the correct tab and finding the skip or pause button.
Coding Fundamentals: An Introduction to Data Structures and Algorithms
What is a Data Structure?
How To: Pick Basic Tumbler Locks
Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then acquire and familiarize ourselves with basic lock-picking tools.
News: How to Use an Eyetoy as a Webcam!
If you have a PS2/PS3 Eyetoy, but don't want to go and spend $30+ dollars on a new webcam, then this is for you.
How To: Trick Websites into Thinking You're on a Different OS or Browser
There are a number of reasons why you might want to trick a web server into thinking you're on a different operating system (OS) or web browser. One might be that you want to test the mobile version of your website from your computer. Or perhaps for some reason a website is restricted to a certain OS or browser and you wish to circumnavigate that barrier. Today's guide shows you how to do just that!
How To: Write a Basic Encryption Program Using Java!
Today, we are going to combine what we learned from the Introduction to Cryptography article with our Java programming skills. If you are new to Java, check out Matthew's Learn Java: Part One for a quick beginner's lesson, or check out some of the Java tutorials directly on Oracle.
How To: Code a Simple Java App to Kill Any Process After a Specified Time
I may be a bit weird, but I enjoy listening to music at night as I fall asleep. Sure, you could create a playlist of songs so that it stopped after all the songs finished playing, but I have a rather extensive database of music and I enjoy listening to them randomly. Also, I like to ensure it terminates after a specific amount of time (I don't want it playing all night). Or sometimes I use it when I am cooking so that when the music stops, I know I need to check on my food, etc.
News: Introduction to Java
A nice (free) resource if you are new to Java and would like to learn more!
Post Pi Day Coding Project: Let's Uncover the Hidden Words in Pi
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat!
News: Happy Pi/Half-Tau Day!
I am a strong advocate of adopting Tau, since Pi isn't as elegant for expressing circles as Tau is.
News: Social Hacking and Protecting Yourself from Prying Eyes
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information you want to keep private, private, should be important to you.
News: Stanford's Cryptology Class Goes Live TODAY!
The cryptology course went live today and is accepting anyone who is interested for registration. Check out the link for more information and to view the other awesome free online courses!
News: Understanding Modern Cryptography: Public Keys
Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography.
News: Site makeover!
How do you like the new site banner? :)
How To: Noob's Introductory Guide to Hacking: Where to Get Started?
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer security, networking, software development, testing, and so on...It's probably a bit premature to decide what you want your speciality to be, but keeping the question in the back of your mind will help give you direction in ...
Gambling with Secrets: Video Series
I recently found this video series that discusses (in a more round about way) the theories that make cryptography what it is today, which goes great with my most recent blog post. I haven't finished watching them all yet, but so far they have been fairly good and I would recommend watching one to see if you like it?!
Introduction to Cryptography: Archaic Beginnings
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive information.
RIP: Scroogle
Scroogle was shut down this month due to " a combination of throttling of search requests by Google and a denial-of-service attack by an unknown person or group."
Anonymous Browsing in a Click: Add a Tor Toggle Button to Chrome
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
News: Make an "On/Off" Tor Button for Chrome
Useful little tutorial!
News: Homeland Security is watching YOU
The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right vague. More reasons to watch what you do on the Internet. You are not the only one watching!
News: Imagine A Day When..
An old blog that I hope to reincarnate in the near future...What do you think so far? (excuse the self promotion)
News: Did you watch the Superbowl with your friends? Copyright Infringement!
If you did anything but watch the Superbowl alone with a small screen TV, then you are in violation of copyright infringement law, according to this article!
News: Live Social Engineering
A nice little series of videos where you witness live social engineering and listen to others share their funny little stories where they were able to use their skills. Definitely worth a watch if you're into this sort of thing!
News: More Stupid Math Jokes...
Can't say I don't love these...haha
News: Password Strength, as told by xkcd!
Haha, I love these...thought I would share? :)
News: Free Online Classes from Stanford!
Stanford is soon supposed to offer free classes in Cryptology, Computer Security and a slew of other intriguing topics! Check out the site to sign up and learn more!
News: Cryptool- A simple, fun and intuitive learning tool
A friend of mine helps develop Cryptool and MysteryTwister and both are really fun and educational, check it out!
How To: Sneak into Your Roommate's Computer by Bypassing the Windows Login Screen
Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read online articles about elliptic curve cryptography applications to C++? Well, then this article is for you!
News: Student Sentenced to 8mo. in Jail for Hacking Facebook
Many times throughout history companies have been hacked by so-called "grey-hatters": hackers who do ambiguously ethical things with their computer skills. Often enough, after being hacked the companies actually offer to hire the hacker, but not always (as you see in this case). Just a reminder that you need to watch what you are doing. Never do anything illegal unless you don't mind facing the consequences!