RenierKach

68 Flips | 6 Magazines | 2 Likes | 6 Following | 1 Follower | @RenierKach | Keep up with RenierKach on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “RenierKach”

Finally switching to vim

This article is just a selection of things I found helpful when switching to vim. So when someone asks for help because he or she wants to switch to …

Why (and How) We Should Learn Jimi Hendrix's Guitar Habits

Jimi Hendrix is the greatest guitar player of all time. That statement can rile up some people, but if you dissect Hendrix’s guitar sorcery and …

39 science fiction, fantasy, and horror novels to read this April

Dystopic futures, Moon colonies, epic fantasies, and more<p>It’s a new month, which means there is another stack of books hitting bookstores to check out.<p>I recently finished John Scalzi’s <i>The Collapsing Empire</i>, and I had a lot of fun reading it. I’ve largely enjoyed the books that I’ve read from him, …

Mobile hacking firm Cellebrite confirms server breach

The Israeli security firm, popular with governments, has had a taste of its own medicine.<p>Cellebrite, a firm hired by government and military groups …

Mystery Hackers Blow Up Secret NSA Hacking Tools in ‘Final F--k You’

A gang of elite hackers, believed by many to be Russian, say they’re quitting—just as Donald Trump gets ready to enter the Oval Office.<p>A mysterious …

Here is a map highlighting the wi-fi passwords of 130 airports across the world

Everyone's traveling life just got much easier and we have computer security engineer and travel blogger Anil Polat to thank for that.<p>In a strike of …

Vuvuzela, a next-generation anonymity tool that protects users by adding NOISE

Cryptography is the science of keeping secrets, with encryption algorithms and methods such as public key encryption the gold standard. Despite …

Guitar Membership

4k and 1080p<p>Our lessons are filmed and produced in a professional studio with (7) 4k cameras and stream to you in 1080p quality. All content is …

Tools and Resources to Prepare for a Hacker CTF Competition or Challenge

CTF or Capture the Flag is a traditional competition or war game in any hacker conferences like DEFCON, ROOTCON, HITB and some hackathons. CTF games …

Anonymous Fans South Africa

The Telkom branded "D-Link 2750U" ADSL Modem has a built-in backdoor that will let anyone (with some basic knowhow) retrieve sensitive data, such as …

A Peek Inside Mr. Robot's Toolbox

The bar wasn’t exactly high for dystopian hacker suspense thrillers when USA Network’s <i>Mr. Robot</i> launched, but the show has gone on to surprise …

Whonix v11 - Anonymous Operating System

<b>Whonix</b> is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by …

Attackers Using RATs to "Slave" Victims' Computers

In addition to providing tutorials, YouTube also enables would-be attackers to download tools and to watch videos of successfully deployed RATs. This …

Android fragmentation is a beautiful mess

In 2012, OpenSignal, a company specializing in rating wireless signals, published its first report on the state of Android fragmentation, detailing …

Android News

World's Most Dangerous Hackers Say They’re Still A Step Ahead Of Security

A new documentary features interviews with several of the world's most-wanted hackers, many of whom come from a small, central Romanian town.<p>SAN FRANCISCO – The camera pans to the silhouette of a man smoking out of an apartment window, staring out onto rows of cinderblock buildings. Just out of …

30-day guitar challenge, day 5: Play rhythm across the fretboard

Introduction<p>The CAGED system makes it easy to access any chord across the neck; here, we’re applying the approach to major and minor chords.<p>"The …

Windows 10 Privacy – Just Installed? Read This

So no big surprise here but there’s some issues with the default settings in regards to Windows 10 Privacy, if you run through the express install …

Windows 10

Wait, what? TrueCrypt 'decrypted' by FBI to nail doc-stealing sysadmin

Discontinued on-the-fly disk encryption utility TrueCrypt was unable to keep out the FBI in the case of a US government techie who stole copies of …

iPhones, the FBI, and Going Dark.

What follows is a guest post from Nicholas Weaver, a computer security researcher at the International Computer Science Institute in …

Researchers create a worm that infects Macs silently and permanently

Macs have typically been heralded as the more secure of the two main operating systems. But according to researchers, at the firmware level, that's not necessarily true. Ahead of their 'Thunderstrike 2: Sith Strike' Black Hat presentation, Xeno Kovah, Trammell Hudson and Corey Kallenberg …

MIT researchers figure out how to break Tor anonymity without cracking encryption - ExtremeTech

By on July 29, 2015 at 2:01 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>The Tor network has millions of …

Privacy

Hacker forum Darkode is back and more secure than ever

Illegal malware marketplace and hacker forum Darkode is back online, weeks after a US-European sting operation claimed to have arrested those behind …

Mimikatz – Gather Windows Credentials

Mimikatz is a tool to gather Windows credentials, basically a swiss-army knife of Windows credential gathering that bundles together many of the most …

Android bug: MMS threat affects 'one billion' phones

<b>A bug in the Android mobile operating system has been discovered by researchers, who say it affects nearly a billion devices.</b><p>The flaw can be exploited by sending a photo or video message to a person's smartphone, without any action by the receiver.<p>Google said it had patched the problem, but …

Information Security

Dmail promises self-destructing Gmail messages

Google recently promoted its little-known “Undo Send” option for Gmail users: a feature that buys us up to 30 seconds in which we can stop the …

The Hacker Search Engine "Shodan" is The Scariest Search Engine on Internet

Launched in 2009, Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine. John Matherly, its …

So... What is Deep Learning?

Imagine a baby coming into the world. From the moment she opens her eyes, there is a world of learning to absorb. Every action will create an imprint …

Machine Learning

35 books everyone should read at least once in their lifetime

Whether they're written for children, sci-fi lovers, mathematicians, or fiction aficionados, certain stories transcend their genre and should be read by everyone.<p>In a Reddit thread, users were asked what is a book that everyone needs to read at least once in their life?<p>So in honor of World Book …

Literature

Six-Pack Abs in Six-Weeks: A Summer Weight Loss Program

<b></b>Six-Pack Abs in Six-Weeks: A Summer Weight Loss ProgramWant to get ripped abs? It might seem impossible. But with MEN'S FITNESS Six-Pack in Six Week …