Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read online articles about elliptic curve cryptography applications to C++? Well, then this article is for you!
If you have a PS2/PS3 Eyetoy, but don't want to go and spend $30+ dollars on a new webcam, then this is for you.
What is a Data Structure?
Stanford is soon supposed to offer free classes in Cryptology, Computer Security and a slew of other intriguing topics! Check out the site to sign up and learn more!
This is pretty awesome, check it out! Wolfram Alpha's Facebook Report Analyzes Every Dark Corner of Your Facebook Activity.
My mp3 player is really crappy so it sometimes doesn't recognize books I rip, so if you want to play it in order you have to rename all the files. To make this easier, I merge each disc into one file. It's also great for other purposes. This program is free and works well! Merge MP3.
Sometimes windows will shutdown for "updates", which is great and all except when you had an unsaved project in the works or a huge file conversion that you expected to be completed when you wake up, only to find your computer rebooted.
This program makes Google Music a lot easier to use! If you are like me and frequently have the need to skip a song or pause momentarily, then this client will enable you to do this from your desktop instead of navigating to the correct tab and finding the skip or pause button.
There are a number of reasons why you might want to trick a web server into thinking you're on a different operating system (OS) or web browser. One might be that you want to test the mobile version of your website from your computer. Or perhaps for some reason a website is restricted to a certain OS or browser and you wish to circumnavigate that barrier. Today's guide shows you how to do just that!
Today, we are going to combine what we learned from the Introduction to Cryptography article with our Java programming skills. If you are new to Java, check out Matthew's Learn Java: Part One for a quick beginner's lesson, or check out some of the Java tutorials directly on Oracle.
I may be a bit weird, but I enjoy listening to music at night as I fall asleep. Sure, you could create a playlist of songs so that it stopped after all the songs finished playing, but I have a rather extensive database of music and I enjoy listening to them randomly. Also, I like to ensure it terminates after a specific amount of time (I don't want it playing all night). Or sometimes I use it when I am cooking so that when the music stops, I know I need to check on my food, etc.
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer security, networking, software development, testing, and so on...It's probably a bit premature to decide what you want your speciality to be, but keeping the question in the back of your mind will help give you direction in ...
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then acquire and familiarize ourselves with basic lock-picking tools.
A nice (free) resource if you are new to Java and would like to learn more!
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat!
I am a strong advocate of adopting Tau, since Pi isn't as elegant for expressing circles as Tau is.
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information you want to keep private, private, should be important to you.
The cryptology course went live today and is accepting anyone who is interested for registration. Check out the link for more information and to view the other awesome free online courses!
Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography.
How do you like the new site banner? :)
I recently found this video series that discusses (in a more round about way) the theories that make cryptography what it is today, which goes great with my most recent blog post. I haven't finished watching them all yet, but so far they have been fairly good and I would recommend watching one to see if you like it?!
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive information.
Scroogle was shut down this month due to " a combination of throttling of search requests by Google and a denial-of-service attack by an unknown person or group."
Useful little tutorial!
The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right vague. More reasons to watch what you do on the Internet. You are not the only one watching!
An old blog that I hope to reincarnate in the near future...What do you think so far? (excuse the self promotion)
If you did anything but watch the Superbowl alone with a small screen TV, then you are in violation of copyright infringement law, according to this article!
A nice little series of videos where you witness live social engineering and listen to others share their funny little stories where they were able to use their skills. Definitely worth a watch if you're into this sort of thing!
Can't say I don't love these...haha
Haha, I love these...thought I would share? :)
A friend of mine helps develop Cryptool and MysteryTwister and both are really fun and educational, check it out!
Many times throughout history companies have been hacked by so-called "grey-hatters": hackers who do ambiguously ethical things with their computer skills. Often enough, after being hacked the companies actually offer to hire the hacker, but not always (as you see in this case). Just a reminder that you need to watch what you are doing. Never do anything illegal unless you don't mind facing the consequences!