Author Archive

10 Most Dangerous Commands – You Should Never Execute On Linux

Linux command line is productive, useful and interesting but sometimes it may be very much dangerous specially when you are not sure what you are doing. Read article at http://www.tecmint.com/10-most-dangerous-commands-you-should-never-execute-on-linux/ to be aware of some of the commands which you should think twice before you execute them. Posted from WordPress for Android

Security check list for web server

https://securitychecklist.org/ page has a a good security check list for web server. It has good set of security question to check out and gives commands to do the testing for many issues. Posted from WordPress for Android

Open source electronic projects

http://www.open-electronics.org/ is a site to support development, hacking and playing with electronics: we share exciting open projects and create amazing products! Their mission is to become a reference in Open Source Hacking with ideas and feedbacks. I see some similarity to Hackster.io – The community dedicated to learning hardware. Posted from WordPress for Android

The FBI Warns That Car Hacking Is a Real Risk | WIRED

It’s been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely killed the transmission of a 2014 Jeep Cherokee (news also noted in this blog). Now the FBI has caught up with that news, and it’s warning Americans

Scania Syndrome — PERSONAL SPACE

What is different on common view and Finnish view of personal space? http://scaniasyndrome.tumblr.com/post/99738485347/personal-space Posted from WordPress for Android

HAX: the Chinese firm accelerating hardware, not software (Wired UK)

Wired is writing about The Chinese firm accelerating hardware, not software at   http://www.wired.co.uk/magazine/archive/2016/04/features/hax-hardware-accelerator-china In four years, HAX has invested in 100 companies after vetting what general partner Benjamin Joffe says are 1,000 startups a year. “It’s an investment company that functions as a hardware accelerator,” explains Joffe. “We help them manufacture at scale. Then

Why aren’t Stingrays rendered ineffective by standard MITM defenses? – Information Security Stack Exchange

http://security.stackexchange.com/questions/117460/why-arent-stingrays-rendered-ineffective-by-standard-mitm-defenses There’s been a lot of reporting in the past few years about law enforcement agencies using IMSI catchers (also known as Stingrays after a popular brand of them) to intercept cellular communications. Stingrays and other IMSI-catchers violate the cell tower agreements by producing an illegal signal, pretending to be a cell tower.They control the

A history of the Amiga, part 9: The Video Toaster | Ars Technica

Jeremy Reimer’s long-running History of the Amiga series is back to tackle the killer app: video effects. The world of video in 1985 was very different from what we know today. Not only was there no YouTube, there was no World Wide Web to view video on. Video content was completely analog and stored on magnetic