background preloader

New Links~ 'Hacker News'

New Links~ 'Hacker News'

Related:  security and hackingBlogs & Sites to Revisit Oftensearch 5dpitt

Data Breaches and How to Secure Against Them Applications and operating systems are easily reinstalled. However, your data is quite a bit more unique. This means that it is the most critical thing that you have on your network or computer. You need to be vigilant about protecting that data from unauthorized access and especially from loss.

40 websites that will make you cleverer right now The indexed web contains an incredible 14 billion pages. But only a tiny fraction help you improve your brain power. Here are 40 of the best. 100 Search Engines For Academic Research Back in 2010, we shared with you 100 awesome search engines and research resources in our post: 100 Time-Saving Search Engines for Serious Scholars. It’s been an incredible resource, but now, it’s time for an update. Some services have moved on, others have been created, and we’ve found some new discoveries, too. Many of our original 100 are still going strong, but we’ve updated where necessary and added some of our new favorites, too. Check out our new, up-to-date collection to discover the very best search engine for finding the academic results you’re looking for.

Q&A: Why io.js decided to fork Node.js Node.js devotees who are dissatisfied with Joyent's control over the project are now backing their own fork of the server-side JavaScript variant, called io.js or iojs. To get the lowdown on what and who was behind this move, InfoWorld Editor at Large Paul Krill on Wednesday asked Mikeal Rogers, who has been involved with the fork and is director of evangelism at cloud hosting service vendor DigitalOcean, about the effort. InfoWorld: Are you the person in charge of the fork?

Nesting MySQL Cursor Loops Handling cursor loops in MySQL keeps puzzling people. Single Cursor Loops The common case is to have a simple cursor loop. Each record is fetched from the cursor until there are now more records, and for each record some work is performed.Let's take a look at this snippet: This is a fragment of a MySPL Procedure. To summarize, the CURSOR is processed by iteration through an ordinary LOOP that happens to FETCH rows from the cursor.

FBI Surveillance Hacks Android Devices, Laptops In recent months, Americans were aghast to learn that their phone calls were secretly being recorded and collected by a government agency, the NSA, when the extent of their indiscriminate wiretapping program was leaked to the public. But if you think that’s an invasion of privacy, you’d better hope the NSA never gets its hands on FBI surveillance techniques and tactics…such as the ability to remotely turn on the microphones in laptops and Android devices without you knowing it. How’s that for Big Brother? Because what’s a little espionage between family? We’ve all watched enough TV to know that wiretapping is no problem for the mishmash of acronymic government agencies (FBI, CIA, NSA, NASA, etc.), but those same shows have taught us certain assumptions about wiretapping, like the necessity of a warrant, and the necessity of the phone actually being in a call. Just like the rest of them.

50 Kick-Ass Websites You Need to Know About It's time to update the entries in your browser's links toolbar. But with recent estimates putting the size of the internet at well more than 100 million distinct websites, it's getting harder and harder to get a handle on all the great stuff that's out there. That's why we've compiled this list. And unlike some lists you may have seen, which try to name the very "best" websites, but end up just telling you a lot of stuff you already know, we've chosen instead to highlight 50 of our favorite sites that fly under most people's radar. Think of it as the Maximum PC blog roll (remember those?).

Journey Into The Hidden Web: A Guide For New Researchers Table Of Contents 1. What is the Deep Web? 1.1 Databases for People Research 1.2 Other Types of Deep Web Research How Police Listen to You Part 2: E911 Phone Tracking and How to Troll It How Police Listen to You Part 2: E911 Phone Tracking and How to Troll It Thibault Serlet How to save web form data in a text file with PHP You can save your web form data in a text file instead of saving it in a MySQL table using a simple PHP script. The advantage of doing this is that you might not have the MySQL server installed on your server or you might like to save your web form data in another form. In fact if you save your web form data in a text file as comma separated values (CSV) you can later on import your data in any file format. For instance, after downloading your text file, you can import the values in an Excel sheet, or into an Access table, or later on, even in a MySQL table. You can use it with any software the uses comma separated values.

The Real Science Behind Cracking Passwords b46f685f85e0af830d82ddbbe795eff3 By adding a unique salt, I can do something about that. I created a quick Javascript program that takes the user’s name, and pulls the first and last three letters from their username and makes them into a salt. David Chalmers David Chalmers I am a philosopher at New York University and the Australian National University. Officially I am Professor of Philosophy and co-director of the Center for Mind, Brain, and Consciousness at NYU, and also (20% time) Professor of Philosophy at ANU. I work in the philosophy of mind and in related areas of philosophy and cognitive science.

Research Beyond Google: 56 Authoritative, Invisible, and Comprehensive Resources Got a research paper or thesis to write for school or an online class? Want to research using the Internet? Good luck.