background preloader

DIY USB password generator » Code and Life

DIY USB password generator » Code and Life
Having done half a dozen V-USB tutorials I decided it’s time to whip up something cool. As USB keyboards were an area untouched, I decided to make a small USB HID keyboard device that types a password stored in EEPROM every time it’s attached. A new password can be generated just by tabbing CAPS LOCK a few times (4 times to start password regeneration and one tab for each password character generated, 10 is the default password length). Below you can see the device in action: The place I work at requires me to change my password every few months so this would be one way to skip remembering a new password altogether (as long as I remember to write it down before regenerating a new one so password can be changed :). What is inside? The device is powered with a simplified version of the hardware I used in my ATtiny85 USB tutorial – I stripped away the LCD, reset pullup and both capacitors. The enclosure was graciously donated by an old 512 MB flash drive. Software Update 2: Indiegogo project Related:  SEO- KaXtone.comSecurity - Privacy - Back Ups - Hacking - Downloading

The Julia Language Your Privacy Kind of Sucks, Fix it Up This Weekend Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Turn off all app- and ad-related functionality on Facebook and other sites wherever possible. Aggressively manage all forms of cookies and other persistent storage. Actively block ads and other trackers. Diversify your digital life by using services from different companies, and provide each with different profile information and email addresses. And remember that "opt out" usually does not mean your information won't be collected and stored, it generally only means that you won't be served up constant reminders of it (e.g., targeted ads, browsable web history, etc).

Subpixel layout - Lagom LCD test For this test your monitor must be in its native resolution. Each pixel on an LCD screen consists of three subpixels: red, green, and blue (RGB), that are sitting next to each other. Most operating systems since about 2003 can improve the quality of on-screen text by using these subpixels. Observe the colored square below from close by, e.g. 20 cm or 8 inch. If you find that your screen is not RGB, you may want to verify that your operating system handles subpixel rendering correctly for your display. If you wear glasses, you need to pay attention that your glasses do not separate the colors. Below you can see text rendered with various smoothing techniques. Rendering of your browser below: Check your LCD monitor at Lagom.nl! Adjusting your font rendering If you believe your operating system does not handle subpixel rendering correctly, or if you prefer a non-subpixel text smoothing, you can try to adjust the settings, depending on which operating system you use. Windows XP and Vista

10 Travel Tips for Protecting Your Privacy Fran Maier is the president and executive chair of TRUSTe, the leading online privacy solutions provider. She speaks widely on issues of online privacy and trust and is active in mentoring women in technology. She serves on a number of Internet and trust-related boards, including the Online Trust Alliance. At the peak of summer, the weather is not all that’s heating up – privacy, it turns out, has never been hotter. From senators to major news outlets, it seems everyone has privacy on the mind these days. What does this have to do with your upcoming vacation? 1. If you’re connecting to a wireless network, be it at a café or your hotel lobby, it should be password-protected to prevent unauthorized persons from accessing the network. 2. Computers, tablets and smartphones are popular theft targets due to their high resale value, but you can equip them with 21st century anti-theft protection. 3. 4. 5. 6. A daily check of your credit card and bank account while traveling can’t hurt. 7. 8. 9.

Pragmatic Unicode Hi, I’m Ned Batchelder. I’ve been writing in Python for over ten years, which means at least a half-dozen times, I’ve made the same Unicode mistakes that everyone else has. Wrote a nice program It worked! Accented chars UnicodeError! If you’re like most Python programmers, you’ve done it too: you’ve built a nice application, and everything seemed to be going fine. You kind of knew what to do with those, so you added an encode or a decode where the error was raised, but the UnicodeError happened somewhere else. Then a few days later, another accent appeared in another place, and you had to play a little bit more whack-a-mole until the problem finally stopped. Annoyed Angry Uninterested So now you have a program that works, but you’re annoyed and uncomfortable, it took too long, you know it isn’t "right," and you hate yourself. You don’t want to know about weirdo character sets, you just want to be able to write a program that doesn’t make you feel bad. 5 Facts of Life 3 Pro Tips Fact of Life #1 ! Hi

How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect [UPDATE 2/22/2012] It is important to note that disabling Web History in your Google account will not prevent Google from gathering and storing this information and using it for internal purposes. More information at the end of this post. On March 1st, Google will implement its new, unified privacy policy, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future. Here's how you can do that: 1. 2. 3. 4. Note that removing your Web History also pauses it. [UPDATE 2/22/2012]: Note that disabling Web History in your Google account will not prevent Google from gathering and storing this information and using it for internal purposes. With Web History enabled, Google will keep these records indefinitely; with it disabled, they will be partially anonymized after 18 months, and certain kinds of uses, including sending you customized search results, will be prevented.

Online Python Tutor Write your Python code here: x = [1, 2, 3] y = [4, 5, 6] z = y y = x x = z x = [1, 2, 3] # a different [1, 2, 3] list! x.append(4) y.append(5) z = [1, 2, 3, 4, 5] # a different list! x.append(6) y.append(7) y = "hello" def foo(lst): lst.append("hello") bar(lst) def bar(myLst): print(myLst) foo(x) foo(z) [Optional] Please answer these questions to support our research and to help improve this tool. Options: Execute code using , , , , , and . Here are some example Python code snippets to visualize: Basic: hello | happy | intro | filter | tokenize | insertion sort Math: factorial | fibonacci | memoized fibonacci | square root | gcd | towers of hanoi User Input: raw input Objects: OOP 1 | OOP 2 | OOP 3 | inheritance Linked Lists: LL 1 | LL 2 | LL sum Pointer Aliasing:aliasing 1 | aliasing 2 | aliasing 3 | aliasing 4aliasing 5 | aliasing 6 | aliasing 7 | aliasing 8 | sumList Higher-Order Functions: closure 1 | closure 2 | closure 3 | closure 4 | closure 5list map | summation | lambda param | student torture

Foil Electronic Pickpockets with Aluminum Foil or Multiple Credit Cards so someone not even close by can hack my phone and grab my info? what's wrong with cards that don't have chips and are swiped? it's not like they're any less convenient it will be your fault for keeping your bluetooth on all the time I do not see how he would even connect to your phone if your phone isn't acting as a teethering device, and even then you'd need to physically connect it and even if someone did, there are algorithms that are almost uncrackable that can be implemented ALMOST uncrackable. everything that is said to be fool-proof is eventually hacked, it's always been like this. and why would i need to have my bluetooth on? NFC connects by a shortwave (much shorter than bt) and literally anything that comes within range can give a payment.

Unicode Character Finder The best way to get familiar with the Unicode Character Finder is to play with it - type in the boxes, push the buttons and see where they lead you. The paragraphs below describe the available features. The character preview area is intially blank. You can (1) click in the left-hand box; (2) type a character or copy & paste from another window; and (3) view the character properties on the right. The Code point number (eg: U+00E7) uniquely identifies the character in the Unicode code charts. The character Description comes from the Unicode character database. The HTML entity is one form you can use to represent the character in the source of an HTML page. The UTF-8 numbers are hex-encoded bytes of the codepoint expressed in UTF-8. The UTF-16 numbers are hex-encoded short (2 byte) integers of the codepoint expressed in UTF-16. The Character block is the descriptive name for the group of characters that this one belongs to. A number of different types of searches are possible: ?

Automatic Anonymous Wifi The two applications we will be using are called MadMACs and TOR. When a computer connects to a wireless network it usually obtains an IP through a DHCP server, which is basically just a method of providing dynamic IPs so that everyone does not have to sit down and figure out what IP everyone else is using and then manually set one on their own machine. When a request is made to a DHCP server two pieces of information are recorded, your MAC address and your hostname. What MadMACs does is randomize both of these for you automatically every time you boot, or every time you manually tell the software to do so. Once your computer is connected to the network, randomized or not, most of the traffic leaving your PC is in the clear. So any network admin, or *nix user with free software can eavesdrop on everything you do. (Sorry, no how madmacs works, but then its pretty self explanatory)

Related: