I was trying to post this in a similar recent related, but could not find it:
https://www.forbes.com/sites/daveywinder/2019/06/07/nsa-warns-microsoft-windows-users-update-now-or-face-devastating-damage/?utm_source=quora&utm_medium=referral#75ea7ef93aa0
I am not tech--savvy-enough to make a...
SmarterEveryDay is posting a series of videos (this is the first one) on Youtube Video Identification hacking, what it is and how it affects what we see online. Its really good even though the notion of manipulating the Youtube algorithm is very disturbing.
I didn't know whether to put this in Biology and Medical or in Programing and Computer Science so I am putting it in General Discussion.
This article from Wired describes U. of Washington group that has produced a piece of DNA that when sequenced in a particular sequencing machine can produce a...
This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for...
Hello.
I have been looking for some learn-to-hack resources. I have Kali-linux VM, firewall, proxy and terminal.
My teacher tells me that he learned to hack and technology by reading hacking books. He did not mention any.
I had a google around for some. Some cost too much or do not have many...
On the weekend I have participated in a hacking and cybersecurity competition.
We were assigned some capture the flag challenges in teams and we had an awesome weekend of hacking!
My teammate and I have won the high school division and as a prize we get a Wi-fi Pineapple Nano Basic. This is a...
Hello.
During a session at my Coderdojo club at my school I asked a teacher if he could hack. He answered "Easy, many people can...".
Is this true?
I was also wondering if most hacking is done with the application 'Terminal'.:smile:
Thanks.
I wish to be able to create android and iphone games and apps but currently know nothing about programming. With this in mind, what do you suggest doing first in a form that you suggest the programming language i start learning first, textbook that i should use and program that i will write on...
Read more: http://www.businessinsider.com/china-reading-top-obama-administration-emails-since-2010-2015-8#ixzz3iemYeAUS
China Read Emails of Top U.S. Officials
http://www.nbcnews.com/news/us-news/china-read-emails-top-us-officials-n406046
If any PF members use combination locks to secure valuables, you might want to re-think your security measures protecting those treasures:
http://www.wired.com/2015/05/little-3-d-printed-robot-cracks-combination-locks-30-seconds/
A hacker has developed an Arduino-based combo-lock picker which...
I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc.
Is this the only way hacking can be done?
You can't really access someone's else's server and look at their data...
Hi all, i have been a member of a few IT and hacking forums but they always get full of arrogant little kids who seem to have nothing better to do than to wind me up. Then I found this place, by no means am I a physicist (got A* in science GCSE then joined the army...) however I am hoping to...
How hard would it be to pull the sound card out of an old NES game system and build a 8 or 16 step sequencer for it. Building the sequencer would be no prob, but I'm just curious as to how complicated that NES sound card is. I have a couple of NESs at my parents house, but I don't want to make...
Is it theoretically possible to make software and hardware that is completely hacker proof? Why do we have this problem? Is it the architecture of the hardware that allows hacking or is it purely software? I don't understand why this problem is allowed to continue. Hackers cause immense damage...
According to Nick Herbert in Quantum Reality:
"Even if we believe (with the support of Bell's theorem) in universal superluminal links, we must face the possibility that such links are private lines accessible to the workings of nature alone, and are blocked to human use by an undecipherable...
I'm considering using an old chiller for a research project. It's a simple application, maintaining a bath of water at various constant or slowly varying temperatures. Unfortunately, since it's an http://www.thermo.com/com/cda/product/detail/1,,1000001155238,00.html", it doesn't have any...
I am not a computer hacker, and have absolutely no idea how to do so. I was wondering just how mathematically mind-boggling that computer hacking is. Don't you have to make extremely complex and fast mental calculations and type in thousands of odd numbers at some kind of prompt? Do you have to...
Does anyone know how to? I don't mean crackers. Its hackers I want to talk to. Those who get it, know the difference. Whats net security all about? How do encoding/decoding algoithms work? How can you compress information and still retain the quality of it?
I know avi/mpeg/vcd/wmp are all...
I attend an Alternative school, which is a computer based curriculum. There have been several times where I was messing with their network in miscilanious ways :smile: I have been supspended, and even temporary transferred to another school for my activities. But everyone seems sympathetic...
I still don't get the reason for turning down their applications, maybe if they did something to influence their admissions decision I would understand.
I saw this and I thought that just learning about bluetooth and how to mess with it would be really fun this summer.
maybe its just the sniper rifle, but it made learning about bluetooth sound really fun :biggrin:
Anyway, I was wondering if anyone could point me in the right direction to...
I have been told to change alphanumeric passwords every so often to avoid someone hacking into a website. Suppose hacking occurs only by trying randomly sequences of numbers and letters to break into the site. Would my changing passwords have any effect, on average, of the site being hacked...
Recently, I was sent a SPAM entitled learn the kiss test. Apparently, these people believe they have a universal algorithm for determining the right time to kiss a girl. Although, I believe there exists a certain algorithm for getting intimate with any female, I believe all females are unique...