Cj Hernandez

622 Flips | 3 Magazines | 1 Like | 7 Followers | @CjHernandez2014 | Keep up with Cj Hernandez on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Cj Hernandez”

Top Cheatsheets and Reference Guides for JavaScript

JavaScript is at the forefront of powering UI across the web. It provides us with a means to create interactive features that range from slick …

JavaScript

InfoSec Cheat Sheets

Reverse Engineering:<p>http://r00ted.com/cheat%20sheet%20reverse%20v6.png<p>Linux …

Trape - People tracker on the Internet (The evolution of phishing attacks) OSINT

Trape is a recognition tool that allows you to <b>track people</b>, the information you can get is very detailed. We want to teach the world through this, as …

Open Source Movement

8 Certifications That Actually Impress Recruiters

With the rise of online learning, there's no shortage of classes you can take that offer you a certification in a particular trade, skill or software program.<p>This story originally appeared on Glassdoor<p>With the rise of online learning, there’s no shortage of classes you can take that offer you a …

Project Management

Razer’s new webcam and microphone are made for streamers

Razer is known as a gaming laptop, mouse and keyboard maker, but it actually offers a wide variety of products, like Xbox controllers, power banks, and even an upcoming phone. Razer also makes webcams like the Stargazer, which is built for streaming video games. Now Razer is upping its streaming …

How to Make a DIY Mini Cell Phone Tower Using Parts You Can Order Online

But to get it to work long range might be pricy.<p>If you're concerned about private communication, there are a growing number of options, like Signal and PGP. Or, if you're two creative college kids, you could just build your own cell phone network.<p>Matthew May and Brendan Harlow are two recent …

Security flaw found in Broadcom chipset allows hackers to hijack WiFi connected iPhones

According to a report from Google Project Zero, a security flaw has been found in iPhones and other devices that use Broadcom Wi-Fi chips. The …

Information Security

7 tips for staying healthy during what looks to be a horrible flu season

With cold weather comes flu season, and this year isn’t looking too great when it comes to avoiding the sniffles—at least if the US follows in …

Ex-NSA hacker drops macOS High Sierra zero-day hours before launch

The vulnerability lets an attacker steal the contents of a Keychain — without needing a password.<p>Just hours before Apple is expected to roll out the …

Destiny 2 bundles, Nintendo deals, PUBG discounts, and more gaming sales

Save a few bucks on PUBG until Sept. 26<p>It’s a good week for gaming deals, especially when it comes to hardware and accessories. Not only are there new <i>Destiny 2</i> bundle deals, but you can score discounts on everything from keyboards to gaming mice to external hard drives.<p>In regards to games, you can …

The EK7000 is a 4K action cam as good as a $400 GoPro Hero5, but it only costs $73

If you’ve been toying with the idea of picking up a GoPro Hero5 Black but the sky-high price tag is causing you to balk, you’re about to be very …

dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol

dnscat2 is a DNS tunnel that WON'T make you sick and kill you!This tool is designed to create an encrypted command-and-control (C&C) channel over the …

Linux

To celebrate the 40th anniversary of the Voyager missions, NASA made these stunning, free posters

The US spacecrafts Voyager 1 and Voyager 2 were launched 16 days apart in August and September of 1977. Both the missions took advantage of a once-in-175-year alignment of planets that allowed between them to visit all the gaseous planets of the solar system.<p>PBS last month released a documentary to …

Posters

Tools For Unpacking Malware, Part 2. Weak encryption algorithms

Some days ago I started a series of posts about tools and methods for unpacking malware, here you can find the first part. Each malware/packer is …

Cybersecurity

How Hackers Hide Their Malware: The Basics

Malware depends on these four basic techniques to avoid detection.<p><i>First of a two-part series.</i><p>Antivirus (AV) and anti-malware products are among the …

How to Earn Money as a Bug Bounty Hunter

Are you a coder or white-hat hacker looking to make some money on the side? Bug bounty hunting might be the perfect gig for you.<p>What Is Bug Bounty …

Andrew Ng is raising a $150M AI Fund

We knew that Andrew Ng had more than just a series of deep learning courses up his sleeve when he announced the first phase of his deeplearning.ai last week. It’s clear now that the turn of Ng’s three part act is a $150 million venture capital fund, first noted by PEHub, targeting AI …

Venture Capital

Plasma - An Interactive Disassembler for x86/ARM/MIPS

PLASMA is an interactive disassembler. It can generate a more readable assembly (pseudo code) with colored syntax. You can write scripts with the …

Linux

The $10 Hardware Hack That Wrecks IoT Security

Most consumer tech manufacturers figure that once a hacker can physically access a device, there's not much left that can be done to defend it. But a …

Writing Windows or Linux apps? Microsoft just launched a cloud-powered bug hunter to find the flaws in your code

Microsoft's enterprise customers can soon use its Azure-hosted fuzzing service to ferret out bugs in their own Windows and Linux …

The ultimate plain English guide to cybersecurity buzzwords

Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online.<p>Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity …

Ghost Phisher – Phishing Attack Tool With GUI

Ghost Phisher is a Wireless and Ethernet security auditing and phishing attack tool written using the Python Programming Language and the Python Qt …

Linux

Raspberry Pi OCTAPI Cluster Computer System

The official Raspberry Pi Foundation website has this week published a new article discussing Raspberry Pi cluster computing and the OctaPi computer …

Create a user called '0day', get bonus root privs – thanks, Systemd!

It's not a bug, it's a featureTo obtain root privileges on a Linux distribution that utilizes systemd for initialization, start with an invalid user …

Linux

Turn an old monitor into a wall display with a Raspberry Pi

So you have an unused Raspberry Pi -- or five -- lying around and you don't know what to do with it. You're not alone, even if there are hundreds of projects at the ready.<p>You can turn it into a Minecraft machine, a music streamer for your living room, an Alexa speaker and many other things. But one …

Pi Desktop: Booting from the SSD (aka booting from USB devices on a Pi 3)

Amazingly, the Raspberry Pi booting from a USB device is a huge point of controversy. A great deal many people believe that you still require the …