Friday Fun: Do you want to see a TCP/IP meme?
https://www.cyberciti.biz/files/memems/do-you-want-to-see-a-TCP-IP.php →
https://www.cyberciti.biz/files/memems/do-you-want-to-see-a-TCP-IP.php →
Christmas is coming soon, so How to Deliver Christmas Presents? The traditional tale way to get the Christmas presents to house in USA through chimney is not relevant in new houses without chimneys. This XKCD comic shows ideas how this problem can be solved.. https://xkcd.com/2234/ →
Now there are two attack vectors to send commands to voice assistant from distance without anyone in the room hearing: ultrasounds and laser. Audio Hotspot Attack Crosses the Ultrasonic Beams to Send Silent Commands to Voice Assistants https://www.hackster.io/news/audio-hotspot-attack-crosses-the-ultrasonic-beams-to-send-silent-commands-to-voice-assistants-6d386644111b Lasers Can Take Over Voice Assistant Systems From Long Distances, Research Finds https://securitytoday.com/articles/2019/11/06/laser-hack-alexa-voice-assistants.aspx?m=1 https://news.umich.edu/a-laser-pointer-could-hack-your-voice-controlled-virtual-assistant/ From a distance →
I saw claim that you can include /dev/stdin in C/C++ code compiled with gcc at Facebook posting https://m.facebook.com/groups/2344226875800424?view=permalink&id=2591966714359771 That post made reference to article https://blog.hboeck.de/archives/898-include-etcshadow.html It looked interesting so here is my version of C code that includes some data/code from stdin at compile time: #include <stdio.h> int main() { printf(“%s\n”, #include “/dev/stdin” ); return →
https://www.reaktor.com/blog/democratizing-ai-finland-offers-free-ai-education-to-every-eu-citizen/ Finland has promised to provide European citizens with free access to the Elements of AI, the groundbreaking online course made by Reaktor and the University of Helsinki. The course will be made available in all the official EU languages. This initiative by the Finnish Presidency aims to respond to the challenges posed by the →
It is pretty easy to do soldering ….Apply some flux, Heat the surface and apply solder .But when it comes to soldering SMD components it requires a little bit of skill and some tools and accessories. Industries use re-flow ovens with temperature profile Control to mass produce circuit boards. If you don’t have re-flow oven, →
Songs with commandments of hacking: nerdcore hip hop If you’re into any shady internet shit, listen to lyrics… Dual Core – 0x0A Hack Commandments [FREE DL] ytcracker – paint ytcracker – plead the fifth →
This is a pretty interesting hardware hacking article: https://www.bunniestudios.com/blog/?p=3554 Some SD cards contain vulnerabilities that allow arbitrary code execution — on the memory card itself. On the dark side, code execution on the memory card enables a class of MITM (man-in-the-middle) attacks, where the card seems to be behaving one way, but in fact it →
grep is a command-line utility for searching plain-text data sets for lines that match a regular expression. It was originally developed for the Unix operating system, but later available for all Unix-like systems including Linux. I use grep very much on Linux. In this video Brian Kernighan discusses the origin of grep command If you →
https://spectrum.ieee.org/computing/software/ai-and-economic-productivity-expect-evolution-not-revolution Many analysts have lately been asserting that AI-enabled technologies will dramatically increase economic output. Accenture claims that by 2035 AI will double growth rates for 12 developed countries and increase labor productivity by as much as a third. PwC claims that AI will add $15.7 trillion to the global economy by 2030, while McKinsey →