background preloader

DIY USB password generator » Code and Life

DIY USB password generator » Code and Life
Having done half a dozen V-USB tutorials I decided it’s time to whip up something cool. As USB keyboards were an area untouched, I decided to make a small USB HID keyboard device that types a password stored in EEPROM every time it’s attached. A new password can be generated just by tabbing CAPS LOCK a few times (4 times to start password regeneration and one tab for each password character generated, 10 is the default password length). Below you can see the device in action: The place I work at requires me to change my password every few months so this would be one way to skip remembering a new password altogether (as long as I remember to write it down before regenerating a new one so password can be changed :). What is inside? The device is powered with a simplified version of the hardware I used in my ATtiny85 USB tutorial – I stripped away the LCD, reset pullup and both capacitors. The enclosure was graciously donated by an old 512 MB flash drive. Software Update 2: Indiegogo project Related:  Security - Privacy - Back Ups - Hacking - DownloadingSEO- KaXtone.com

Online Python Tutor Write your Python code here: x = [1, 2, 3] y = [4, 5, 6] z = y y = x x = z x = [1, 2, 3] # a different [1, 2, 3] list! x.append(4) y.append(5) z = [1, 2, 3, 4, 5] # a different list! x.append(6) y.append(7) y = "hello" def foo(lst): lst.append("hello") bar(lst) def bar(myLst): print(myLst) foo(x) foo(z) [Optional] Please answer these questions to support our research and to help improve this tool. Options: Execute code using , , , , , and . Here are some example Python code snippets to visualize: Basic: hello | happy | intro | filter | tokenize | insertion sort Math: factorial | fibonacci | memoized fibonacci | square root | gcd | towers of hanoi User Input: raw input Objects: OOP 1 | OOP 2 | OOP 3 | inheritance Linked Lists: LL 1 | LL 2 | LL sum Pointer Aliasing:aliasing 1 | aliasing 2 | aliasing 3 | aliasing 4aliasing 5 | aliasing 6 | aliasing 7 | aliasing 8 | sumList Higher-Order Functions: closure 1 | closure 2 | closure 3 | closure 4 | closure 5list map | summation | lambda param | student torture

Your Privacy Kind of Sucks, Fix it Up This Weekend Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Turn off all app- and ad-related functionality on Facebook and other sites wherever possible. Aggressively manage all forms of cookies and other persistent storage. Actively block ads and other trackers. Diversify your digital life by using services from different companies, and provide each with different profile information and email addresses. And remember that "opt out" usually does not mean your information won't be collected and stored, it generally only means that you won't be served up constant reminders of it (e.g., targeted ads, browsable web history, etc).

The Julia Language Quantum Computing: A Primer – Andreessen Horowitz watch time: 28 minutes One of the key insights that legendary physicist and Nobel Prize laureate Richard Feynman had was that quantum mechanics (the branch of physics that deals with subatomic particles, uncertainty principle, and many other concepts beyond classic physics) is just way too complicated to simulate using traditional computers. Nature, of course, can handle these complex calculations — computers however can’t do those same calculations (or would take a prohibitively long time and amount of resources to do so). But this isn’t just about being able to do more with computers in a faster (or smaller) way: It’s about solving problems that we couldn’t solve with traditional computers; it’s about a difference of kind not just degree. So what is a quantum computer and “qubits” — especially as compared to a traditional computer and bits? What is Grover’s Algorithm? some sources and recommended further reading:

Solid State Tesla Coil A solid state Tesla coil is one of the kinds of Tesla coils available. It has several advantages over the more common spark gap tesla coil. They are less louder than conventional Tesla coils, yet they can still achieve a respectable output. They can also be made to play music through its spark, which is a cool effect. Examples of this trick can be seen by searching for musical tesla coil or singing tesla coil. In the following instructable, I will show you how to make a solid state Tesla coil, as well as several helpful tips and hints that will come handy during its construction. While fiddling with the antenna, I accidentally burnt both of the Mosfets, so bear in mind this design is far from perfect. If you like this instructable, please rate it and vote my instructable for the contest.

Chroot-ing in Windows – As Easy as A:, B:, C:… « Just Let It Flow Contents: Introduction Linux people who have to work in Windows are often talking about the basic tools it has which are absent from Microsoft’s product. While recent developments of Windows are slowly catching up with variously featured versions of whoami, ln (mklink) cat (copy con), grep (find), ps (tasklist, taskkill) and chmod (icacls), one app that’s so far evaded the conversion is chroot. For those unaware, chroot allows you to run an application using some specified directory as its filesystem root dir instead of the normal filesystem root. NtSetInformationProcess(hProcess, ProcessDeviceMap, &hObjectDirectory, sizeof(hObjectDirectory)); What’s a Device Map? Ok, so it’s technically one function call, but there needs to be a bit of setup beforehand. The global device map with drive letters highlighted The symbolic links in the device map directory perform exactly the same purpose. How’s it Work? Every time a program passes a path starting with the \?? Usages What’s the Catch? Notes:

10 Travel Tips for Protecting Your Privacy Fran Maier is the president and executive chair of TRUSTe, the leading online privacy solutions provider. She speaks widely on issues of online privacy and trust and is active in mentoring women in technology. She serves on a number of Internet and trust-related boards, including the Online Trust Alliance. At the peak of summer, the weather is not all that’s heating up – privacy, it turns out, has never been hotter. From senators to major news outlets, it seems everyone has privacy on the mind these days. What does this have to do with your upcoming vacation? 1. If you’re connecting to a wireless network, be it at a café or your hotel lobby, it should be password-protected to prevent unauthorized persons from accessing the network. 2. Computers, tablets and smartphones are popular theft targets due to their high resale value, but you can equip them with 21st century anti-theft protection. 3. 4. 5. 6. A daily check of your credit card and bank account while traveling can’t hurt. 7. 8. 9.

Subpixel layout - Lagom LCD test For this test your monitor must be in its native resolution. Each pixel on an LCD screen consists of three subpixels: red, green, and blue (RGB), that are sitting next to each other. Most operating systems since about 2003 can improve the quality of on-screen text by using these subpixels. Observe the colored square below from close by, e.g. 20 cm or 8 inch. If you find that your screen is not RGB, you may want to verify that your operating system handles subpixel rendering correctly for your display. If you wear glasses, you need to pay attention that your glasses do not separate the colors. Below you can see text rendered with various smoothing techniques. Rendering of your browser below: Check your LCD monitor at Lagom.nl! Adjusting your font rendering If you believe your operating system does not handle subpixel rendering correctly, or if you prefer a non-subpixel text smoothing, you can try to adjust the settings, depending on which operating system you use. Windows XP and Vista

The Tiny Radar Chip Revolutionizing Gesture Recognition: Google ATAP’s Project Soli - News Google ATAP is bringing touchless interfaces to the market using a miniaturized radar chip no bigger than a dime. This is Project Soli. Google ATAP at Google I/O 2016 Project Soli made a big splash at last month’s Google I/O 2016 conference, even more so than its initial unveiling at Google I/O the year before. Google ATAP differs from its kindred Alphabet sibling, X, in that it incubates projects for only two years where X develops their projects longer, such as their six-year work on self-driving cars. The project founder, Ivan Poupyrev, introduced both Project Soli and Project Jacquard (which deals with wearable smart fabrics) at this year's gathering. In his presentation of Soli's capabilities, machine learning engineer Nick Gillian showed off Soli’s capabilities in the context of smart watch control. They also demonstrated using the same gesture control tech in a speaker form factor that used the same algorithms as the smart watch. The Soli Sensor Google ATAP’s answer is radar.

Visual Network Threat Level Indicator Network monitoring is very important in todays world. The internet is a scary place. People have taken steps to raise their awareness by installing Intrusion Detection Systems(IDS) such as SNORT. The problem with most of these systems is that upon first installing them they are vigilantly watched. After a week the allure wears off and they are no longer monitored, silently churning away in the depths of the network. By moving the visualization outside of the computer we make it easier to notice, providing the information at a glance and to a larger audience. The Visual Threat Level Indicator (VTLI) requires a network connection and power. A python script is run on the IDS which connects the the Arduino and updates the display.

Related: