How the Bible and YouTube are fueling the next frontier of password cracking Early last year, password security researcher Kevin Young was hitting a brick wall. Over the previous few weeks, he made steady progress decoding cryptographically protected password data leaked from the then-recent hack of intelligence firm Stratfor. But with about 60 percent of the more than 860,000 password hashes cracked, his attempts to decipher the remaining 40 percent were failing. Google Timelapse lets you see how any location on Earth has changed in 32 years It might not seem like such a long time, but in past three decades, Earth has changed in immeasurable ways, with cities rising, glaciers falling, and unprecedented disasters reshaping the landscape forever. With 5 million satellite images taken from 1984 to 2016, Google Earth’s new Timelapse update allows you to go anywhere on the planet, and see a perfect timelapse of the shifting landscape, whether you want to see how your home has fared, or what the hell happened to the Aral Sea. "Using Google Earth Engine, we sifted through about 3 quadrillion pixels - that's 3 followed by 15 zeroes - from more than 5,000,000 satellite images," Chris Herwig, program manager for the Google Earth Engine, writes in a blog post. "For this latest update, we had access to more images from the past, thanks to the Landsat Global Archive Consolidation Program, and fresh images from two new satellites, Landsat 8 and Sentinel-2."
Minecrafting with OS OpenData We have created GB Minecraft 2, a Minecraft® world made with digital map products – freely available as OS OpenData™. The world consists of more than 83 billion blocks representing over 220,000 square kilometres of mainland Great Britain and surrounding islands. We don't include Northern Ireland, the Channel Islands or the Isle of Man because they are mapped by other organisations. Take a look at our Developer Centre for lots more information on the data, tools and other resources we offer. How to Get Around Sites That Block Your Right-Clicks Though not quite annoying as pop-up browser ads, sites that block you from right-clicking are still found on the Web. These sites typically contain original images or perhaps some text that the site owner doesn’t want you to copy for whatever reason. Let's Put A Stop To Pop-Up Browser Ads Once And For All! Let's Put A Stop To Pop-Up Browser Ads Once And For All! Pop-ups can catch you off guard, and if you're not careful they can create problems.
Gaupol Subtitle Editor Gaupol is an editor for text-based subtitle files. It supports multiple subtitle file formats and provides means of creating subtitles, editing texts and timing subtitles to match video. The user interface is designed with attention to batch processing of multiple documents and convenience of translating. Gaupol should run on all Unix-like (GNU/Linux, *BSD, Solaris, etc.) operating systems and on Windows. 9 best hidden Google Chrome tips and tricks If you're a Chrome user, you're in good company. Google's beta release of Chrome 50 last month comes as the world's most popular Web browser is nearing its eighth anniversary. At 1 billion monthly active users, it's no surprise that Chrome is the browser of choice for snake people, Donald Drumpf supporters, and people who prefer poop emoji to actual news. But even Chrome die-hards may not know about some of its many hidden features. Here are some things you didn't know Chrome could do.
The beginners guide to breaking website security with nothing more than a Pineapple You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn’t enough, you have to load login forms over HTTPS as well and then you can’t send auth cookies over HTTP because they’ll get sniffed and sessions hijacked and so on and so forth. This is all pretty much security people rhetoric designed to instil fear but without a whole lot of practical basis, right? That’s an easy assumption to make because it’s hard to observe the risk of insufficient transport layer protection being exploited, at least compared to something like XSS or SQL injection. But it turns out that exploiting unprotected network traffic can actually be extremely simple, you just need to have the right gear.
Displaying Events from Multiple Google Calendars in a Single Embedded Calendar View Of all the things Google Calendar is good for, producing a single embedded calendar from a set of Google Calendars has not been one of them… [Cue sideaways glance] Or so I thought… In a flurry of activity earlier today, the Reverend posted this: Bayesian Methods for Hackers An intro to Bayesian methods and probabilistic programming from a computation/understanding-first, mathematics-second point of view. Prologue The Bayesian method is the natural approach to inference, yet it is hidden from readers behind chapters of slow, mathematical analysis. The typical text on Bayesian inference involves two to three chapters on probability theory, then enters what Bayesian inference is. Unfortunately, due to mathematical intractability of most Bayesian models, the reader is only shown simple, artificial examples. This can leave the user with a so-what feeling about Bayesian inference.
Digital Dementia – Are Google Search and the Web Getting Alzheimer’s? According to the Alzheimer’s Society, Alzheimer’s disease – one of the most common forms of dementia – memory lapses tend to be one of the first symptoms sufferers become aware of along with “difficulty recalling recent events and learning new information”. One of the things I have been aware of for some time but only started trying to pay more attention to recently, is how Google search increasingly responds to many of my tech related web queries with results that are dated 2013 and 2014. In addition, the majority of traffic to my blog is directed to a few posts that are themselves several years old, and that were shared – through blog links and links from other public websites at the time they were posted.
svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted August 1, 2013 Anuj Varma svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted All content on this site is original and owned by anujvarma.com. Specializing in high volume web applications, Anuj Varma has helped architect, re-architect and troubleshoot some of the largest web applications out there. His customer base includes Fortune 100 companies ( British Petroleum, dell.com, Schlumberger) as well as smaller to mid size firms within the United States. 101 Google tips, tricks and hacks: 71. Click "Trends" to see the sites you visit most, the terms you enter most often and links you've clicked on! 72. Personalised Search also includes a bookmark facility – which enables you to save bookmarks online and access them from anywhere. 73. You can add bookmarks or access your bookmarks using the iGoogle Bookmarks gadget.
New AWS Command Line Interface (CLI) Graphical user interfaces (e.g. the AWS Management Console) are great, but nothing beats the expressiveness of the command line! Today we are releasing the AWS Command Line Interface (CLI). The AWS CLI provides a single, unified interface to a very large collection of AWS services. After downloading and configuring the CLI you can drive Amazon EC2, Amazon S3, Elastic Beanstalk, the Simple Workflow Service, and twenty other services (complete list) from your Linux, OS X, or Windows command line. Download and ConfigureThe Getting Started page contains the information that you need to know in order to download and configure the AWS CLI.