background preloader

Google

Google

https://www.google.fr/#cns=1&gws_rd=ssl

Related:  ICN 1ereMoocSecurityLearningA trier

4. Basic Recipes — Picamera 1.10 documentation The following recipes should be reasonably accessible to Python programmers of all skill levels. Please feel free to suggest enhancements or additional recipes. 4.1. Capturing to a file¶ Capturing an image to a file is as simple as specifying the name of the file as the output of whatever capture() method you require: import timeimport picamera with picamera.PiCamera() as camera: camera.resolution = (1024, 768) camera.start_preview() # Camera warm-up time time.sleep(2) camera.capture('foo.jpg')

REC: tout projet - REC: tous Overview of the project More and more universities across Europe are recording their live lectures and then putting them online ('weblectures') as a way to support both on and off campus students. Video is an increasingly a core feature of the virtual campus with significant sector investment in lecture capture systems, podcasts, multimedia lecture theatres, i-Tunes and streaming services. Why I won't recommend Signal anymore - Sander Venema One of the things I do is cryptography and infosec training for investigative journalists who have a need to keep either their sources and communications confidential so they can more safely do their work in the public interest. Often they work in places which are heavily surveilled, like Europe, or the United States. Ed Snowden’s documents explain a thing or two about how the US intelligence apparatus goes about its day-to-day business. They sometimes also work in places in the world where rubber hose cryptanalysis is more common than in say the U.S. or Europe. Which is why crypto tools alone are not the Alpha and the Omega of (personal) security. This requires careful consideration of what to use when, and in what situation.

Running Docker in production for 6 months Managing a dev team at a full stack development company can be hard. You have to always keep the over-enthusiastic developers focussed at the right task. More often than not, you to have to remind them that it is important to finish the change request that a client submitted yesterday by EOD than trying out the fancy new javascript library. To keep us from hurting our business, we also have to make sure that we don’t jump at the wrong slope of any technology hype cycle. And that is probably the reason we were quite late in adopting Docker for any of our projects. We were actually asked to use Docker by one of our clients for his project.

Components Available glyphs Includes over 250 glyphs in font format from the Glyphicon Halflings set. Glyphicons Halflings are normally not available for free, but their creator has made them available for Bootstrap free of cost. As a thank you, we only ask that you include a link back to Glyphicons whenever possible.

Download Wing IDE Pro v. 5.1.12 - Wingware Python IDE Download Wing IDE Pro v. 5.1.12 Download Wing IDE Professional: Ubuntu/Debian Package 64-bit SHA1: a6b9b7dd7e7c9c1863e56b8765799d29737dad51 La vérité sur MOOC MOOC by Sean Michael Morris The truth is there have been other MOOCs about MOOCs. Almost all the early connectivist MOOCs pioneered by folks like George Siemens and Stephen Downes were, whether explicitly or implicitly, exploring the form, the pedagogy, and the process of MOOCs. The information about MOOC-style learning those courses generated is substantial. Stealth Cell Tower Rogue Cellular Infrastructure Disguised as Office Printer Stealth Cell Tower is an antagonistic GSM base station in the form of an innocuous office printer. It brings the covert design practice of disguising cellular infrastructure as other things - like trees and lamp-posts - indoors, while mimicking technology used by police and intelligence agencies to surveil mobile phone users. Masquerading as a regular cellular service provider, Stealth Cell Tower surreptitiously catches phones and sends them SMSs written to appear they are from someone that knows the recipient. It does this without needing to know any phone numbers.

Do not change Linux files using Windows apps and tools – Windows Command Line Tools For Developers I have to provide this guidance at least 2-3 times a day so instead I am publishing it here so everyone can find / link-to this guidance. There is one hard-and-fast rule when it comes to Bash on Windows: DO NOT, under ANY circumstances, create and/or modify Linux files using Windows apps, tools, scripts, consoles, etc. Creating/changing Linux files from Windows will likely result in data corruption and/or damage your Linux environment requiring you to uninstall & reinstall your distro! Note: Your “Linux files” are any of the files and folders under %localappdata%\lxss – which is where the Linux filesystem – distro and your own files – are stored on your drive

Sign in to Office 365 Type the email address of the account you want to sign in with. We're having trouble locating your account. Which type of account do you want to use? Raspberry Pi, détection de mouvement In this tutorial, we will use a passive infrared sensor (PIR) whose output toggle of the down state in the high State, like a switch, upon detection of a movement in the field of vision of it. The State of the PIR sensor is recovered in a Python program to display a message on the screen when a motion detection occurs. Editor's NOTE: this article appealed to the basics of programming in Python, but also to implementing port GPIO of Raspberry Pi. If necessary, we invite the reader to become familiar with these concepts by first visiting the tutorial: Raspberry Pi - Python and GPIO port Comments and suggestions for improvement are welcome, then, after your reading, do not hesitate. 7 comments

ixpBl6OVcE Connected. This pad seems to be opened in more than one browser window on this computer. Reconnect to use this window instead. Your permissions have changed while viewing this page. More Than 1 Million Google Accounts Breached by Gooligan As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Our research exposes how the malware roots infected devices and steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive, and more. Gooligan is a new variant of the Android malware campaign found by our researchers in the SnapPea app last year. Check Point reached out to the Google Security team immediately with information on this campaign.

So you think you know C? – Hacker Noon A lot of programmers claim they know C. Well, it has the most famous syntax, it has been there for 44 years, and it’s not cluttered with obscure features. It’s easy! I mean, it’s easy to claim that you know C. You probably learned it in college or on the go, you probably had some experience with it, you probably think that you know it through and through, because there’s not much to know.

Related:  TECHNIQUE