Two-Factor Authentication App | Authy

Authy provides you Strong Authentication for your daily apps like Facebook, Dropbox, Evernote, AWS, Outlook and many others. You can use Authy to keep safe of hacking & phishing attacks easy & quickly. It runs on Apple, Android, Blackberry, OS X, Windows and Linux. It also works when you’re offline. via Two-Factor Authentication App | Read more about Two-Factor Authentication App | Authy[…]

‘Cloaking’ device uses ordinary lenses to hide objects across range of angles

To build your own device Purchase 2 sets of 2 lenses with different focal lengths f1 and f2 (4 lenses total, 2 with f1 focal length, and 2 with f2 focal length) Separate the first 2 lenses by the sum of their focal lengths (So f1 lens is the first lens, f2 is the 2nd Read more about ‘Cloaking’ device uses ordinary lenses to hide objects across range of angles[…]

Tiny Humanoid Robot Learning to Fly Real Airplanes

The little robot in the picture above is a PIBOT, a small, very low-cost humanoid (actually a Bioloid Premium from Robotis). It’s been slightly modified to be able to work the controls of a scaled-down, simulated aircraft cockpit, as in the pic above. PIBOT is able to identify and use all of the buttons and Read more about Tiny Humanoid Robot Learning to Fly Real Airplanes[…]

Terror laws clear Senate, enabling entire Australian web to be monitored and whistleblowers to be jailed

Australian spies will soon have the power to monitor the entire Australian internet with just one warrant, and journalists and whistleblowers will face up to 10 years’ jail for disclosing classified information. via Terror laws clear Senate, enabling entire Australian web to be monitored and whistleblowers to be jailed.

Bash broken – ShellShock

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, Read more about Bash broken – ShellShock[…]

Antidepressants rapidly alter brain architecture

A single dose of a popular class of psychiatric drug used to treat depression can alter the brain’s architecture within hours, even though most patients usually don’t report improvement for weeks, a new study suggests. More than 1 in 10 adults in the U.S. use these drugs, which adjust the availability of a chemical transmitter Read more about Antidepressants rapidly alter brain architecture[…]

Lockheed Martin Conducts Flight Tests Of Aircraft Laser Turret

Lockheed Martin [NYSE: LMT], in partnership with the Air Force Research Laboratory (AFRL) and the University of Notre Dame, has demonstrated the airworthiness of a new beam control turret being developed for the Defense Advanced Research Projects Agency (DARPA) and AFRL to give 360-degree coverage for high-energy laser weapons operating on military aircraft. A research Read more about Lockheed Martin Conducts Flight Tests Of Aircraft Laser Turret[…]

Open-Source Syringe Pump Library

A syringe pump was designed using freely available open-source computer aided design (CAD) software and manufactured using an open-source RepRap 3-D printer and readily available parts. The design, bill of materials and assembly instructions are globally available to anyone wishing to use them. Details are provided covering the use of the CAD software and the Read more about Open-Source Syringe Pump Library[…]

3D print your own Smartphone Microscope for $1,-

Using inexpensive glass beads traditionally used for reflective pavement markings at airports, the PNNL team has demonstrated 1000x magnification, which is necessary to see tiny anthrax spores and plague cells. They have also made a 350x version, which is adequate to identify parasites in blood samples or protozoa in drinking water. A 100x version enables Read more about 3D print your own Smartphone Microscope for $1,-[…]

De gereedschapskist van de hacker | Workshop Security en Privacy

Security is een ambacht, hackers zijn vaak hun hele leven al bezig om systemen en applicaties te testen, maar evenals bij een goede ICT beheerder is een kenmerk van een hacker dat men liever routineuze taken zal automatiseren (scripten). In de begindagen van het web hadden hackers veelal hun eigen collecties van scripts en werden Read more about De gereedschapskist van de hacker | Workshop Security en Privacy[…]

Chivalry: Medieval Warfare

First person multiplayer sword fighting or… Players have real-time control over their swings, allowing them to aim strikes and blocks with precision and become master swordsmen over time. Players exchange attacks and blocks in a fast-paced competitive multiplayer setting with truly satisfying combat including gruesome decapitation and advanced swordplay. Chivalry: Medieval Warfare – Torn Banner Read more about Chivalry: Medieval Warfare[…]

ads showing sexy women make male consumers less charitable

What happens when you use images of sexy women to attract men’s attention? According to a new study in the Journal of Consumer Research, male consumers who are shown images of sexy women feel less connected to other people and are less likely to purchase products advertised as benefiting others or make charitable contributions. via Read more about ads showing sexy women make male consumers less charitable[…]

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

The software first brute forces an icloud username / password, then tricks icloud into thinking your device is the target device and finally performs a full restore to your device. This software is supposed to be for law enforcement, but can be bought and downloaded by anyone. There are also illegal copies to be found. Read more about The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud[…]