background preloader

Techno

Facebook Twitter

MongoDB. [._.] 6 things I learned from riding in a Google Self-Driving Car. Last week, a friend and I got a sneak peek at Google's new self-driving cars.

6 things I learned from riding in a Google Self-Driving Car

In addition to spending an afternoon cheating on my Intergalactic SpaceBoat of Light and Wonder, I got to chat with the engineers about the project. 1. Human beings are terrible drivers. We drink. We doze. 2. The car we rode in did not strike me as dangerous. In the early versions they tested on closed courses, the vehicles were programmed to be highly aggressive. 3.

Phishing scam that penetrated Wall Street just might work against you, too. Researchers have uncovered a group of Wall Street-savvy hackers that has penetrated the e-mail accounts of more than 100 companies, a feat that has allowed them to obtain highly valuable plans concerning corporate acquisitions and other insider information.

Phishing scam that penetrated Wall Street just might work against you, too

FIN4, as the group is known, relies on a set of extremely simple tactics that in many cases has allowed them to remain undetected since at least the middle of 2013, according to a report published Monday from security firm FireEye. Members boast a strong command of the English language and knowledge of corporate finance and Fortune 500 culture.

They use that savvy to send highly targeted spearphishing e-mails that harvest login credentials for Microsoft Outlook accounts. The group then uses compromised accounts of one employee, customer, or partner to send spearphishing e-mails to other company insiders. Limitless Keylogger Optimized with AutoIT Infected thousands of Computers. A new surge of malware has been discovered which goes on to infect hundreds of thousands of computers worldwide and allegedly steals users’ social and banking site credentials.

Limitless Keylogger Optimized with AutoIT Infected thousands of Computers

Few days back, a list of 5 million combinations of Gmail addresses and passwords were leaked online. The search engine giant, Google said that Gmail credentials didn’t come from the security breaches of its system, rather the credentials had been stolen by phishing campaigns and unauthorized access to user accounts. Just now, we come across another similar incident where cyber criminals are using a malware which has already compromised thousands of Windows users worldwide in an effort to steal their Social Media account, Online account and Banking account Credentials. Hacking any eBay Account in Just 1 Minute. Four month ago, a massive data breach on the eBay website affected 145 million registered users worldwide after its database was compromised.

Hacking any eBay Account in Just 1 Minute

Meanwhile, another critical vulnerability on the eBay website was reported, allowing an attacker to hijack millions of user accounts in bulk. An Egyptian security researcher ‘Yasser H. Ali’ informed The Hacker News about this vulnerability 4 months ago, which could be used by the cyber criminals in the targeted attacks. At that time, Mr.Yasser secretly demonstrated the vulnerability step-by-step to ‘The Hacker News’ team and we confirmed - IT WORKS. Since it was not addressed by the eBay security team, we kept the technical details of this vulnerability hidden from our readers. The vulnerability Yasserfound could allow you to Reset Password of any eBay user account and that too without any user interaction or dependency.

China Develops Facial Recognition Payment System with Near-Perfect Accuracy. In an intent to move one step forward from others, China is planning to launch a facial recognition payment application with near-perfect accuracy that enables users to authorize their online transactions just by showing a picture of themselves.

China Develops Facial Recognition Payment System with Near-Perfect Accuracy

Chinese researchers from the Chongqing-based research institute have developed a facial recognition system that can pick faces from a crowd with 99.8 percent accuracy from 91 angles. Academic at the Chongqing Institute of Green has set up the world's biggest Asian face database displaying more than 50 million Chinese faces. The database was compiled with help from the University of Illinois and the National University of Singapore. The face-recognition payment system is not completely developed at the moment and will come into application by the Chinese Academy of Science (CAS) in 2015. iPwned: How easy is it to mine Apple services, devices for data? Apple executives never mentioned the word "security" during the unveiling of the iPhone 6, iPhone 6+, and Apple Watch yesterday, choosing to focus on the sexier features of the upcoming iOS 8 and its connections to Apple's iCloud service.

iPwned: How easy is it to mine Apple services, devices for data?

But digital safety is certainly on everyone's mind after the massive iCloud breach that resulted in many celebrity nude photos leaking across the Internet. While the company has promised fixes to both its mobile operating system and cloud storage service in the coming weeks, the perception of Apple's current security feels iffy at best. In light of one high profile "hack," is it fair to primarily blame Apple's current setup? Watch A Facial Tracking Projection Turn This Woman Into A Cyborg. It's unclear to me that people understand the effect of Moore's Law (a placeholder for advancing technology) as it relates to perception.

Watch A Facial Tracking Projection Turn This Woman Into A Cyborg

The more CPU cycles/technology you have, the less one's perception is accurate for what's presented. There are going to be all kinds of things (which are *super* cool imo) that we do with that new capability, but how unmoored are people going to become as they realize that what they see may not be real and only what others want them to see? I'm holding out for the killer app of the 21st century - real authentication: the assurance that what you're seeing is real, trusted, accurate, etc. Everything else is just convenience and noise. Eggbot Pro: an all-metal plotter for drawing on curved surfaces. Evil Mad Scientist Labs have updated their beloved open-source hardware Eggbot, a plotter that draws on curved surfaces, with a new all-metal model called the Eggbot Pro.

Eggbot Pro: an all-metal plotter for drawing on curved surfaces

The standard pen holder included with the EggBot kit is designed to fit various art pens including Sharpie Ultra Fine Point and Sharpie Fine Point pens. However, it can actually fit almost any pen of similar size. You can even fit a lot of things that aren't pens. Learn the Basics. See more examples...

Learn the Basics

Core Documentation ZeroMQ - The Guide explains how to use ZeroMQ as an intelligent transport layer for your distributed apps. Old version for version 2.2. The ZeroMQ Reference Manual specifies the ZeroMQ API. What's the best way to call Mathematica from Python? - Online Technical Discussion Groups—Wolfram Community. Hi guys!

What's the best way to call Mathematica from Python? - Online Technical Discussion Groups—Wolfram Community

Thank you for posting about the way of calling Mathematica from Python. However, I am very new in building interprogram communication codes. Start a free online store - Ecommerce website for everyone - Tictail : Tictail. Free Goods of This Week from Creative Market. Grab free goods from Creative Market every week! Free goods for this week -> Graphic: Creative Tools Shapes Vol. 1 | Graphic: Paper Pack – 30 Digital Papers | Graphic: U R like a cloud! Creative Tools Shapes Vol. 1 32 vector shapes of creative tools (.AI files). Apple adds privacy-protecting MAC spoofing (when Aaron Swartz did it, it was evidence of criminality) Apple has announced that it will spoof the MAC addresses emitted by its wireless devices as an anti-tracking measure, a change that, while welcome, is "an umbrella in a hurricane" according to a good technical explainer by the Electronic Frontier Foundation's Jeremy Gillula and Seth Schoen.

One notable and sad irony here is that MAC spoofing was held up as evidence of criminality in the indictment of Aaron Swartz: the US prosecutors characterized changing your MAC address as the sort of thing that only criminals do. 30+ Free Flare and Light Photoshop Brushes Sets. Seven Unsung Built-In Gems of Mac OS X. Pin Short Notes and Reference Information to the Windows Taskbar. 10 Powerful Tools To Spy On Your Competitors. Knowledge is power and in the internet age, knowledge is easily accessible. There are many tools available to scope out the competition in order to make your business or service the most successful it can be. Below are the top ten websites you can use “spy” on the competition and see what they’re up to. The Biggest Tech Industry Buzzwords, Defined for Normal People. ER doctors use Google Glass and QR codes to identify patients. A tech-savvy hospital in Boston developed a custom information-retrieval system for Google Glass, which lets ER doctors scan a QR code on the wall of each room to call up information about patients.

Dr. John Halamka, CIO of Beth Israel Deaconess Medical Center, described the system today in his blog (a cached version is here as the original post seems to have been shortened significantly): In the Emergency Department, we’ve developed a prototype of a new information system using Google Glass, a high tech pair of glasses that includes a video camera, video screen, speaker, microphone, touch pad, and motion sensor.Here’s how it works.When a clinician walks into an emergency department room, he or she looks at [a] bar code (a QR or Quick Response code) placed on the wall. Google Glass immediately recognizes the room and then the ED Dashboard sends information about the patient in that room to the glasses, appearing in the clinician’s field of vision.

Pourquoi est-ce que la radio n'est pas virale? Urban Computing Reveals the Hidden City. In his essay “Walking in the City,” the French scholar Michel de Certeau talks about the “invisible identities of the visible.” He is talking specifically about the memories and personal narratives associated with a location. Until recently, this information was only accessible one-to-one—that is, by talking to people who had knowledge of a place. But what if that data became one-to-many, or even many-to-many, and easily accessible via some sort of street-level interface that could be accessed manually, or wirelessly using a smartphone?

This is essentially the idea behind urban computing, where the city itself becomes a kind of distributed computer. The pedestrian is the moving cursor; neighborhoods, buildings, and street objects become the interface; and the smartphone is used to “click” or “tap” that interface. Smartphone in hand, what can the modern-day flaneur expect to find in this newly digitized urban environment? Is the urban computer a good thing?

Project ressources

Which operating system will colonise the Internet of Things? - Open Source Insider. Interview with Raffi Krikorian on Twitter's Infrastructure. Raffi Krikorian, Vice President of Platform Engineering at Twitter, gives an insight on how Twitter prepares for unexpected traffic peaks and how system architecture is designed to support failure. How to Flash a ROM to Your Android Phone. Bitrot and atomic COWs: Inside “next-gen” filesystems. HomeServer. Download. Downloaded 5177530 times. About. Dotcloud/docker. Cyberdéfense : les systèmes d'armes sont-ils vulnérables à des cyber-attaques ? La guerre dans la guerre.

La montée en puissance des dispositifs de cyberdéfense oblige toutes les armées du monde à réfléchir sur les nouvelles menaces et de trouver comment les contrer et les maîtriser. Comme par exemple comment protéger un système d'arme bourré de technologies reliées à un ou plusieurs systèmes de communications. C'est d'ailleurs l'une des craintes actuelles du ministère de la Défense. "Actuellement, les exigences de la protection des réseaux sont bien perçues et l'on sait comment renforcer très rapidement leur sécurité. Ce que l'on connaît moins bien réside davantage dans les systèmes d'armes et les automatismes embarqués dans les systèmes automatisés", explique le contre-amiral Arnaud Coustillière, patron en charge de la cyberdéfense au ministère. Mathematical and Generative Graphics.

Object-relational mapping. YARN.

SEO

How to Clean Out Your Overflowing Hard Drive and Get Your Space Back. Blogging For Web 3.0. Static.googleusercontent.com/external_content/untrusted_dlcp/www.google.com/fr//insidesearch/howsearchworks/assets/searchqualityevaluatorguidelines. How Search Works - The Story – Inside Search – Google.

Stocker 10 GB de données dans une vidéo Youtube. Stocker 10 GB de données dans une vidéo Youtube Très amusant ce proof of concept. Partant du principe qu'un QR Code peut contenir de la donnée, il est possible de stocker un fichier dans une dizaine (centaine ?) De QRCode. En assemblant ensuite ces QR Code dans une vidéo et en l'envoyant sur YouTube, il serait alors possible de stocker un fichier de 10 GB environ dans une simple vidéo YouTube.

Los Alamos has been running a demo quantum key distribution system. Cray brings top supercomputer tech to businesses for a mere $500,000. Thank you for not viewing: “Hidden” display ads hurt Web ad networks. Kinect Hack Turns Any Surface Into a Remote Control. How to Turn Your Webcam Into a Streaming, Motion-Detecting Surveillance System. Gnome & Wayland. Welcome to the Anthropocene. Modèle OSI. Tid=080812desk. Fuzzy Logic. [nytlabs] Project Cascade. Querying DBpedia. Tweet ping. Tweetping, pour voir la twittosphère s'agiter en temps réel. Save Publishing trouve la phrase à tweeter sur une page web. Navigate Wikipedia By Charted Connections - There's An App For That.

Créa

Video Games. Programmation. Security & Network. Tools. Web Based. Hardware. Bordel.