This is pretty awesome, check it out! Wolfram Alpha's Facebook Report Analyzes Every Dark Corner of Your Facebook Activity.
My mp3 player is really crappy so it sometimes doesn't recognize books I rip, so if you want to play it in order you have to rename all the files. To make this easier, I merge each disc into one file. It's also great for other purposes. This program is free and works well! Merge MP3.
Sometimes windows will shutdown for "updates", which is great and all except when you had an unsaved project in the works or a huge file conversion that you expected to be completed when you wake up, only to find your computer rebooted.
If you have a PS2/PS3 Eyetoy, but don't want to go and spend $30+ dollars on a new webcam, then this is for you.
This program makes Google Music a lot easier to use! If you are like me and frequently have the need to skip a song or pause momentarily, then this client will enable you to do this from your desktop instead of navigating to the correct tab and finding the skip or pause button.
A nice (free) resource if you are new to Java and would like to learn more!
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat!
I am a strong advocate of adopting Tau, since Pi isn't as elegant for expressing circles as Tau is.
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information you want to keep private, private, should be important to you.
The cryptology course went live today and is accepting anyone who is interested for registration. Check out the link for more information and to view the other awesome free online courses!
Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography.
How do you like the new site banner? :)
I recently found this video series that discusses (in a more round about way) the theories that make cryptography what it is today, which goes great with my most recent blog post. I haven't finished watching them all yet, but so far they have been fairly good and I would recommend watching one to see if you like it?!
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive information.
Scroogle was shut down this month due to " a combination of throttling of search requests by Google and a denial-of-service attack by an unknown person or group."
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
Useful little tutorial!
The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right vague. More reasons to watch what you do on the Internet. You are not the only one watching!
An old blog that I hope to reincarnate in the near future...What do you think so far? (excuse the self promotion)
If you did anything but watch the Superbowl alone with a small screen TV, then you are in violation of copyright infringement law, according to this article!
A nice little series of videos where you witness live social engineering and listen to others share their funny little stories where they were able to use their skills. Definitely worth a watch if you're into this sort of thing!
Can't say I don't love these...haha
Haha, I love these...thought I would share? :)
Stanford is soon supposed to offer free classes in Cryptology, Computer Security and a slew of other intriguing topics! Check out the site to sign up and learn more!
A friend of mine helps develop Cryptool and MysteryTwister and both are really fun and educational, check it out!
Many times throughout history companies have been hacked by so-called "grey-hatters": hackers who do ambiguously ethical things with their computer skills. Often enough, after being hacked the companies actually offer to hire the hacker, but not always (as you see in this case). Just a reminder that you need to watch what you are doing. Never do anything illegal unless you don't mind facing the consequences!