Online Mirror of the Encyclopedia of Graphics File Formats: Table of Contents. Tutorial: Skin Detection Example using Python and OpenCV. So last night I went out for a few drinks with my colleague, James, a fellow computer vision researcher who I have known for years. You see, James likes to party. He’s a “go hard” type of guy. He wanted to hit every single bar on Washington St. (there’s a lot of them)…and then hit ‘em again on the way back. It’s safe to say that by the end of the night that James was blotto. Wasted. Lights out. Anyway, it was getting late. 1:47am, to be exact. And James, in his clearly drunken and intoxicated state, walks (or rather, stumbles like a newborn foal) up to this blonde who looks and dresses like she’s straight out of South Beach and says: “You know…if you take your shirt off I have a Python script that can detect how much skin you’re showing.
Now tell me, what do you think happens next? That’s right. Shocked, and fairly appalled, I led the drunken James back to my apartment to sleep it off. So here’s the deal… But use these superpowers for good, okay? You know the drill. . $ python skindetector.py. Aprende a codificar | Codecademy. The Next Big Programming Language You’ve Never Heard Of | Enterprise. Getty Andrei Alexandrescu didn’t stand much of a chance. And neither did Walter Bright. When the two men met for beers at a Seattle bar in 2005, each was in the midst of building a new programming language, trying to remake the way the world creates and runs its computer software.
That’s something pretty close to a hopeless task, as Bright knew all too well. “Most languages never go anywhere,” he told Alexandrescu that night. “Your language may have interesting ideas. But it’s never going to succeed.” Alexandrescu, a graduate student at the time, could’ve said the same thing to Bright, an engineer who had left the venerable software maker Symantec a few years earlier. Andrei Alexandrescu.Photo: Ariel Zambelich/WIRED The result is a programming language that just might defy the odds. C++ is an extremely fast language—meaning software built with it runs at high speed—and it provides great control over your code. Among the giants of tech, this is an increasingly common goal. The Ultra-Simple App That Lets Anyone Encrypt Anything | Threat Level. Original illustration: Getty Encryption is hard.
When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video. Nadim Kobeissi wants to bulldoze that steep learning curve. At the HOPE hacker conference in New York later this month he’ll release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds.
“The tagline is that this is file encryption that does more with less,” says Kobeissi, a 23-year old coder, activist and security consultant. A screenshot from an early demo of miniLock. Kobeissi’s creation, which he says is in an experimental phase and shouldn’t yet be used for high security files, may in fact be the easiest encryption software of its kind.
Is This The Crowdfunding Site App Developers Have Been Wishing For? The basic idea behind Bountysource seems easy enough to explain--it’s a crowdfunding site for open source software. But when the site first launched about a decade ago, those were still fairly esoteric concepts for potential users and investors. Even the founders, then fresh out of college, had never heard the term “crowdfounding,” says cofounder and COO David Rappo. The project died fast. "It ran for a few months before we realized this wasn't gonna pay our bills, and we needed to move on and get real jobs,” says Rappo. But about a year and a half ago, Rappo and CEO Warren Konkel decided it was time to focus full time on Bountysource once again. "Nowadays, we can say it's a crowdfunding platform for open source software, and people are like, we get it," Rappo says.
Bountysource helped the RVM 2 team plan and distribute the rewards it offered backers and often helps software developers organize and even write copy for their funding campaigns, says Rappo. The Next Big Thing You Missed: A Social Network That Could Truly Reform Our Schools | Business. Photo: Getty The federal government has spent 12 years trying to impose reform on primary and secondary schools from above, using things like financial incentives and standardized tests. Edmodo is working from the other direction, hoping to improve our schools from the bottom up. Edmodo is a social network specifically designed for primary and secondary schools, offering a way for teachers to more easily assess students and trade tips.
At a time when many teachers feel hamstrung by standardized tests and associated performance standards, Edmodo helps them exchange techniques in a peer-to-peer, ad hoc fashion. It also provides a relatively unfettered playground where they create and share educational videos and software that can compete with the Facebook posts, texts, YouTube videos, and others things that distract students from their work. In other words, it makes school look more like the rest of our lives. The approach seems to be working. One Thousand Lonely Islands The Idea Share. How to Anonymize Everything You Do Online | Threat Level. One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.
But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. “Hide in the network,” security guru Bruce Schneier made his first tip for evading the NSA. “The less obvious you are, the safer you are.” Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito. Email. Certified Ethical Hacker, Information Security Certifications, Computer Security Training, Network Security Courses, Internet Security, Hacking | EC-Council.
WPA/WEP/WPA2 Cracking Dictionary Wordlist - Tricks Ninja. Cool Tips and Tricks. Tricks Ninja. Latest Hacking News. How to become Professional Hacker | Cool Tips and Tricks. IEEE Spectrum: Technology, Engineering, and Science News. EEP - Electrical Engineering Portal | Energy and Power For All! Top 10 Android Apps That Turn Your Phone into a Hacking Device. 1.SpoofApp SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It's a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009. 2.Andosid The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. 3.Faceniff Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. 4.Nmap Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a "map" of the network. 5.Anti-Android Network Toolkit zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. 6.SSHDroid 7.WiFi Analyser.
Here Are Top 20 Hacking Forums! Open Source For You - The Complete Magazine on Open Source. Electronics Projects Circuits. Open source electronic projects.