background preloader

Programming

Facebook Twitter

How I coded in 1985. Back in 1985 I worked on the computerization of a machine designed to stick labels on bottles. The company that made the machines was using electromechanical controls to spool labels off a reel and onto products (such as bottles of shampoo) passing by on a conveyor. The entire thing needed to work with mm accuracy because consumers don't like labels that aren't perfectly aligned. Unfortunately, electromechanical controls aren't as flexible as computer controls and so the company had contracted a local technical college (where I was studying electronics) to prototype computer control using a KIM-1. Another student had put together the machine with a conveyor, a mechanism for delivering the labels, control of stepper motors, and infrared sensors for detecting labels and products. My job was to write the software in 6502 assembly. It was immediately obvious that computer control was going to be more flexible.

Of course, writing code like this is a pain. How I became a password cracker. At the beginning of a sunny Monday morning earlier this month, I had never cracked a password. By the end of the day, I had cracked 8,000. Even though I knew password cracking was easy, I didn't know it was ridiculously easy—well, ridiculously easy once I overcame the urge to bash my laptop with a sledgehammer and finally figured out what I was doing. My journey into the Dark-ish Side began during a chat with our security editor, Dan Goodin, who remarked in an offhand fashion that cracking passwords was approaching entry-level "script kiddie stuff. " This got me thinking, because—though I understand password cracking conceptually—I can't hack my way out of the proverbial paper bag.

I'm the very definition of a "script kiddie," someone who needs the simplified and automated tools created by others to mount attacks that he couldn't manage if left to his own devices. It sounded like an interesting challenge. I could. “Password recovery” Trick question. . The first hit. How to Find Hidden COM Ports. This mini tutorial will show you how you can find and uninstall all those extra COM ports you may have registered from years of microcontroller-hacking. You may have noticed that every time a new FTDI-based board is plugged in, you get a new COM port. You might also get new COM port assignment with adapters, etc.

Eventually you can get into pretty high COM port numbers and that can be really annoying! For example, on my 6-month old Windows 7 install I'm already up to COM38! At some point you may want to figure out what were all those other COM ports and perhaps uninstall the "ghost" devices. First up, you'll have to open up a Command Prompt and in Windows 7 it has to be run as administrator.

Now type in set devmgr_show_nonpresent_devices=1 (which is the magic command to show ghost devices) followed by start devmgmt.msc (which starts up the device manager) Now you're almost done, select Show hidden devices from the View menu Voila! Lab Notes: Zack’s Wearable RasPi. I’m Zack Freedman, part man, part Raspberry Pi! I’m writing this blog post from a wearable cyborg Raspberry Pi, or as I like to call it, Pi in the Face. When Rob Bishop of the Raspberry Pi Foundation visited the space yesterday, he challenged the attendees to build a project using the tiny open-source computer.

I decided, why not take advantage of its small size to make myself a cyborg? Wearable technology is my main area of hacking, so I had some parts lying around. The brains of the operation are, of course, a RasPi. No one brought a wi-fi dongle, so no wireless intertubes. I built this with parts lying around, but a similar setup would cost just over $100. If you’re interested in wearables, cyborg tech, and augmented reality, I write about the subjects weekly on my blog. ARToolKit Home Page.

ARToolKit is a software library for building Augmented Reality (AR) applications. These are applications that involve the overlay of virtual imagery on the real world. For example, in the image to the right a three-dimensional virtual character appears standing on a real card. It can be seen by the user in the head set display they are wearing. When the user moves the card, the virtual character moves with it and appears attached to the real object. This website contains a link to the ARToolKit software, projects that have used ARToolKit, sample ARToolKit applications, a discussion group and full documentation. All the information needed to be able to easily develop AR applications with ARToolKit can be found here. ARToolKit was originally developed by Dr. For information on this page, contact Philip Lamb. Translations of this page available: Belarusian.

USB firmware debugging with USBTrace, PicKit & MPLAB IDE. Ah, the joy of firmware debugging! I’ve been working on a USB firmware for my new upcoming product that involves a dual traditional TTL (Serial) and a USB-TO-SERIAL converter (CDC Communication Port) implemented in the same firmware. The firmware was written in C18 , using the USB stack from Microchip Applications Libraries. Everything worked well until I suddenly discovered that while sending data over the CDC port from the computer to the device, the device would *sometimes* receive garbage data instead of what I sent. This wouldn’t be so discouraging if the data received would be the same, or at least this would happen always not *sometimes*.

The bug was caught in the act on the screenshot below, the arrows show the data I actually sent ‘stop’ followed by LF (0xA) char and the character codes (in decimal) actually received. This is garbage because 92,162,62,180 are note the ASCII chars for ‘stop’. So where do we go from here ? Wow , that was an overwhelming number of packets! A. Blockly - A visual programming language. p41.pdf (application/pdf Object) HTG Explains: What Can You Find in an Email Header? Whenever you receive an email, there is a lot more to it than meets the eye. While you typically only pay attention to the from address, subject line and body of the message, there is lots more information available “under the hood” of each email which can provide you a wealth of additional information. Why Bother Looking at an Email Header?

This is a very good question. For the most part, you really wouldn’t ever need to unless: You suspect an email is a phishing attempt or spoofYou want to view routing information on the email’s pathYou are a curious geek Regardless of your reasons, reading email headers is actually quite easy and can be very revealing. Article Note: For our screenshots and data, we will be using Gmail but virtually every other mail client should provide this same information as well. Viewing the Email Header In Gmail, view the email. Then click the arrow in the upper right corner and select Show original. The resulting window will have the email header data in plain text. Hacker's Delight. Free Removable Media Eject Utility.

Projectile Motion Primer for FIRST Robotics | Wired Science  It is that FIRST Robotics competition time of the year. Basically, in FIRST, high school students work in teams to build robots that compete in specific tasks. Apparently, this year a task involves throwing a basketball into a goal. And this leads to the popular question: how do I tell my robot to throw the ball? Oh? Projectile motion you say? Quick note: just about all of the following has been posted somewhere before on my blog. Can You Neglect Air Resistance? For basic projectile motion, the assumption is that the only force acting on the object is the gravitational force. With the following variables: ρ is the density of air.C is the drag coefficient that depends on the shape of the object. So, when do you have to include this air resistance force? Same speed and the same size (and shape) means they have the same air drag. Ah HA! The magnitude of the gravitational force is easy to calculate.

And now for the magnitude of the air drag force: But what about motion with air resistance? Open Source (Almost) Everything. When Chris and I first started working on GitHub in late 2007, we split the work into two parts. Chris worked on the Rails app and I worked on Grit, the first ever Git bindings for Ruby. After six months of development, Grit had become complete enough to power GitHub during our public launch of the site and we were faced with an interesting question: Should we open source Grit or keep it proprietary? Keeping it private would provide a higher hurdle for competing Ruby-based Git hosting sites, giving us an advantage. Open sourcing it would mean thousands of people worldwide could use it to build interesting Git tools, creating an even more vibrant Git ecosystem. After a small amount of debate we decided to open source Grit.

Why is it awesome to open source (almost) everything? If you do it right, open sourcing code is great advertising for you and your company. Smart people like to hang out with other smart people. Lastly, it’s the right thing to do. Ok, then what shouldn’t I open source?

Ar

Official Website | FreeBASIC Programming Language. Python. Cheat Sheets & Quick Reference Cards for Developers | DevCheatSheet.com. WPA PSK Generator. Compare the license type of MiniTool Power Data Recovery. A brief Sony password analysis. So the Sony saga continues. As if the whole thing about 77 million breached PlayStation Network accounts wasn’t bad enough, numerous other security breaches in other Sony services have followed in the ensuing weeks, most recently with SonyPictures.com.

As bad guys often like to do, the culprits quickly stood up and put their handiwork on show. This time around it was a group going by the name of LulzSec. Here’s the interesting bit: Sony stored over 1,000,000 passwords of its customers in plaintext Well actually, the really interesting bit is that they created a torrent of some of the breached accounts so that anyone could go and grab a copy. Ouch. I thought it would be interesting to take a look at password practices from a real data source. What’s in the torrent The Sony Pictures torrent contains a number of text files with breached information and a few instructions: Analysis Here’s what I’m really interested in: Length Variety of character types Randomness Uniqueness Length Randomness. Chrome Experiments - Home. Pixel art scaling algorithms. An image scaled with nearest-neighbor scaling (left) and 2×SaI scaling (right).

In computer graphics, image scaling is the process of resizing a digital image. Scaling is a non-trivial process that involves a trade-off between efficiency, smoothness and sharpness. With bitmap graphics, as the size of an image is reduced or enlarged, the pixels that form the image become increasingly visible, making the image appear "soft" if pixels are averaged, or jagged if not. With vector graphics the trade-off may be in processing power for re-rendering the image, which may be noticeable as slow re-rendering with still graphics, or slower frame rate and frame skipping in computer animation. Apart from fitting a smaller display area, image size is most commonly decreased (or subsampled or downsampled) in order to produce thumbnails.

Scaling methods[edit] An image size can be changed in several ways. Nearest-neighbor interpolation Bilinear interpolation hqx Supersampling Vectorization Mipmap Algorithms[edit] Infographic_Programming_Rackspace_Final_Version.png (PNG Image, 1190x12496 pixels) The Usability of Passwords (by @baekdal) #tips. Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords.

In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Update: Read the FAQ (updated January 2011) Update - April 21, 2011: This article was "featured" on Security Now, here is my reply! How to hack a password The work involved in hacking passwords is very simple. Asking: Amazingly the most common way to gain access to someone's password is simply to ask for it (often in relation with something else). When is a password secure? You cannot protect against "asking" and "guessing", but you can protect yourself from the other forms of attacks.

The measure of security must then be "how many password requests can the automated program make - e.g. per second". Like these: It takes: HTML Help 1.4 SDK. Microsoft HTML Help is the standard help system for the Windows platform. Authors can use HTML Help to create online help for a software application or to create content for a multimedia title or Web site. Developers can use the HTML Help API to program a host application or hook up context-sensitive help to an application. As an information delivery system, HTML Help is suited for a wide range of applications, including training guides, interactive books, and electronic newsletters, as well as help for software applications.

HTML Help offers some distinct advantages over standard HTML, such as the ability to implement a combined table of contents and index and the use of keywords for advanced hyperlinking capability. The HTML Help compiler (part of the HTML Help Workshop) makes it possible to compress HTML, graphic, and other files into a relatively small compiled help (.chm) file, which can then be distributed with a software application, or downloaded from the Web. HTML Help Downloads. Free Help-file authoring tools - Freebyte. Safety Scanner - Remove Spyware, Malware, Viruses Free. Run Android on Your Netbook or Desktop. Would you like to try out Google’s Android OS on your netbook or desktop? Here’s how you can run Android from a flash drive and see how fast Android can run on real hardware!

Install Android On Your Flash Drive or Memory Card First, make sure you have a flash drive or memory card inserted into your computer with around 256MB or more storage space. Remove any files you may need off of the drive, so you can use it to run Android on your computer. Now you’re ready to download and setup Android on your drive. In the mean time, head over to the UNetbootin site (link below), and download it as well. Once your downloads are complete, run UNetbootin. UNetbootin will now copy the files to your flash drive. Once it’s finished, it will ask if you wish to reboot. If you want to try Android on a computer that has a CD/DVD drive, you could just burn the ISO to a disk and boot from it.

Using Android-x86 On Your Computer You’ll see a text prompt for a few moments as Android begins to load. Conclusion Links. Headache relief for programmers :: regular expression generator. Free Online Computer Science and Programming Books, Textbooks, and Lecture Notes. WebBrowserPassView - Recover lost passwords stored in your Web browser. See Also Description WebBrowserPassView is a password recovery tool that reveals the passwords stored by the following Web browsers: Internet Explorer (Version 4.0 - 11.0), Mozilla Firefox (All Versions), Google Chrome, Safari, and Opera. This tool can be used to recover your lost/forgotten password of any Website, including popular Web sites, like Facebook, Yahoo, Google, and GMail, as long as the password is stored by your Web Browser. After retrieving your lost passwords, you can save them into text/html/csv/xml file, by using the 'Save Selected Items' option (Ctrl+S).

System Requirements And Limitations This utility works on any version of Windows, starting from Windows 2000, and up to Windows 10, including 64-bit systems. Versions History Version 1.86: Added 'Quick Filter' feature (View -> Use Quick Filter or Ctrl+Q). Using WebBrowserPassView WebBrowserPassView doesn't require any installation process or additional DLL files. False Virus/Trojan Warning Command-Line Options License Feedback. The Generator Blog. Free Video Converter - Convert Video Formats Free - MP4 MPEG AVI DVD HD FLV. Free Video Downloader - Download Video Free - YouTube Facebook Hulu MTV ComedyCentral Dailymotion Megavideo Vimeo. Freeware Top 30. Mobile Atlas Creator - Screenshots.

Web

Five Best Virtual Machine Applications. Php.