Invisible Computer News
News: Wolfram Analysis of Your Facebook!
This is pretty awesome, check it out! Wolfram Alpha's Facebook Report Analyzes Every Dark Corner of Your Facebook Activity.
News: Merge Audio Files
My mp3 player is really crappy so it sometimes doesn't recognize books I rip, so if you want to play it in order you have to rename all the files. To make this easier, I merge each disc into one file. It's also great for other purposes. This program is free and works well! Merge MP3.
News: Stop Windows Update from Shutting Down Your Computer
Sometimes windows will shutdown for "updates", which is great and all except when you had an unsaved project in the works or a huge file conversion that you expected to be completed when you wake up, only to find your computer rebooted.
News: GMusic-Desktop Client for Google Music
This program makes Google Music a lot easier to use! If you are like me and frequently have the need to skip a song or pause momentarily, then this client will enable you to do this from your desktop instead of navigating to the correct tab and finding the skip or pause button.
News: How to Use an Eyetoy as a Webcam!
If you have a PS2/PS3 Eyetoy, but don't want to go and spend $30+ dollars on a new webcam, then this is for you.
News: Introduction to Java
A nice (free) resource if you are new to Java and would like to learn more!
Post Pi Day Coding Project: Let's Uncover the Hidden Words in Pi
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat!
News: Happy Pi/Half-Tau Day!
I am a strong advocate of adopting Tau, since Pi isn't as elegant for expressing circles as Tau is.
News: Social Hacking and Protecting Yourself from Prying Eyes
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information you want to keep private, private, should be important to you.
News: Stanford's Cryptology Class Goes Live TODAY!
The cryptology course went live today and is accepting anyone who is interested for registration. Check out the link for more information and to view the other awesome free online courses!
News: Understanding Modern Cryptography: Public Keys
Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography.
News: Site makeover!
How do you like the new site banner? :)
Gambling with Secrets: Video Series
I recently found this video series that discusses (in a more round about way) the theories that make cryptography what it is today, which goes great with my most recent blog post. I haven't finished watching them all yet, but so far they have been fairly good and I would recommend watching one to see if you like it?!
Introduction to Cryptography: Archaic Beginnings
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive information.
RIP: Scroogle
Scroogle was shut down this month due to " a combination of throttling of search requests by Google and a denial-of-service attack by an unknown person or group."
Anonymous Browsing in a Click: Add a Tor Toggle Button to Chrome
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
News: Make an "On/Off" Tor Button for Chrome
Useful little tutorial!
News: Homeland Security is watching YOU
The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right vague. More reasons to watch what you do on the Internet. You are not the only one watching!
News: Imagine A Day When..
An old blog that I hope to reincarnate in the near future...What do you think so far? (excuse the self promotion)
News: Did you watch the Superbowl with your friends? Copyright Infringement!
If you did anything but watch the Superbowl alone with a small screen TV, then you are in violation of copyright infringement law, according to this article!
News: Live Social Engineering
A nice little series of videos where you witness live social engineering and listen to others share their funny little stories where they were able to use their skills. Definitely worth a watch if you're into this sort of thing!
News: More Stupid Math Jokes...
Can't say I don't love these...haha
News: Password Strength, as told by xkcd!
Haha, I love these...thought I would share? :)
News: Free Online Classes from Stanford!
Stanford is soon supposed to offer free classes in Cryptology, Computer Security and a slew of other intriguing topics! Check out the site to sign up and learn more!
News: Cryptool- A simple, fun and intuitive learning tool
A friend of mine helps develop Cryptool and MysteryTwister and both are really fun and educational, check it out!
News: Student Sentenced to 8mo. in Jail for Hacking Facebook
Many times throughout history companies have been hacked by so-called "grey-hatters": hackers who do ambiguously ethical things with their computer skills. Often enough, after being hacked the companies actually offer to hire the hacker, but not always (as you see in this case). Just a reminder that you need to watch what you are doing. Never do anything illegal unless you don't mind facing the consequences!