RenierKach

68 Added | 6 Magazines | 2 Likes | 6 Following | 1 Follower | @RenierKach | Keep up with RenierKach on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “RenierKach”

Finally switching to vim

This article is just a selection of things I found helpful when switching to vim. So when someone asks for help because he or she wants to switch to …

Why (and How) We Should Learn Jimi Hendrix's Guitar Habits

1<p>SHARES<p>Jimi Hendrix is the greatest guitar player of all time. That statement can rile up some people, but if you dissect Hendrix’s guitar sorcery …

39 science fiction, fantasy, and horror novels to read this April

Dystopic futures, Moon colonies, epic fantasies, and more<p>It’s a new month, which means there is another stack of books hitting bookstores to check out.<p>I recently finished John Scalzi’s <i>The Collapsing Empire</i>, and I had a lot of fun reading it. I’ve largely enjoyed the books that I’ve read from him, …

Mobile hacking firm Cellebrite confirms server breach

The Israeli security firm, popular with governments, has had a taste of its own medicine.<p>Cellebrite, a firm hired by government and military groups …

Mystery Hackers Blow Up Secret NSA Hacking Tools in ‘Final F--k You’

A gang of elite hackers, believed by many to be Russian, say they’re quitting—just as Donald Trump gets ready to enter the Oval Office.<p>A mysterious …

Security

Here is a map highlighting the wi-fi passwords of 130 airports across the world

Everyone's traveling life just got much easier and we have computer security engineer and travel blogger Anil Polat to thank for that.<p>In a strike of …

Wi-Fi

Vuvuzela, a next-generation anonymity tool that protects users by adding NOISE

Cryptography is the science of keeping secrets, with encryption algorithms and methods such as public key encryption the gold standard. Despite …

Privacy

Online Guitar Lessons

Guitar Lessons

Tools and Resources to Prepare for a Hacker CTF Competition or Challenge

CTF or Capture the Flag is a traditional competition or war game in any hacker conferences like DEFCON, ROOTCON, HITB and some hackathons. CTF games …

Anonymous Fans South Africa

Anonymous Fans South Africa. 5,942 likes · 6 talking about this. We are Anonymous. United as one, divided by Zero.

A Peek Inside Mr. Robot’s Toolbox

Author: Yael Grauer. Yael Grauer Security<p>Date of Publication: 08.26.15.<p>Time of Publication: 7:00 am. 7:00 am<p>The bar wasn’t exactly high for dystopian …

Whonix v11 - Anonymous Operating System

<b>Whonix</b> is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by …

Attackers Using RATs to "Slave" Victims' Computers

In addition to providing tutorials, YouTube also enables would-be attackers to download tools and to watch videos of successfully deployed RATs. This …

Android fragmentation is a beautiful mess

In 2012, OpenSignal, a company specializing in rating wireless signals, published its first report on the state of Android fragmentation, detailing …

Mobile

World's Most Dangerous Hackers Say They’re Still A Step Ahead Of Security

A new documentary features interviews with several of the world's most-wanted hackers, many of whom come from a small, central Romanian town.<p>SAN FRANCISCO – The camera pans to the silhouette of a man smoking out of an apartment window, staring out onto rows of cinderblock buildings. Just out of …

30-day guitar challenge, day 5: Play rhythm across the fretboard

Introduction<p><b>30-day guitar challenge: Break away from open position rhythm playing and use the CAGED system to discover major and minor chords across</b> …

Electric Guitar

Windows 10 Privacy – Just Installed? Read This

So no big surprise here but there’s some issues with the default settings in regards to Windows 10 Privacy, if you run through the express install …

Privacy

Wait, what? TrueCrypt 'decrypted' by FBI to nail doc-stealing sysadmin

Discontinued on-the-fly disk encryption utility TrueCrypt was unable to keep out the FBI in the case of a US government techie who stole copies of …

iPhones, the FBI, and Going Dark.

What follows is a guest post from Nicholas Weaver, a computer security researcher at the International Computer Science Institute in …

Researchers create a worm that infects Macs silently and permanently

Macs have typically been heralded as the more secure of the two main operating systems. But according to researchers, at the firmware level, that's not necessarily true. Ahead of their 'Thunderstrike 2: Sith Strike' Black Hat presentation, Xeno Kovah, Trammell Hudson and Corey Kallenberg …

MIT researchers figure out how to break Tor anonymity without cracking encryption - ExtremeTech

By on July 29, 2015 at 2:01 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>The Tor network has millions of …

Hacker forum Darkode is back and more secure than ever

Illegal malware marketplace and hacker forum Darkode is back online, weeks after a US-European sting operation claimed to have arrested those behind …

Mimikatz – Gather Windows Credentials

Mimikatz is a tool to gather Windows credentials, basically a swiss-army knife of Windows credential gathering that bundles together many of the most …

Information Security

Android bug: MMS threat affects 'one billion' phones

<b>A bug in the Android mobile operating system has been discovered by researchers, who say it affects nearly a billion devices.</b><p>The flaw can be exploited by sending a photo or video message to a person's smartphone, without any action by the receiver.<p>Google said it had patched the problem, but …

Information Security

The Hacker Search Engine "Shodan" is The Scariest Search Engine on Internet

Launched in 2009, Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine. John Matherly, its …

Dmail promises self-destructing Gmail messages

Google recently promoted its little-known “Undo Send” option for Gmail users: a feature that buys us up to 30 seconds in which we can stop the …

So... What is Deep Learning?

Imagine a baby coming into the world. From the moment she opens her eyes, there is a world of learning to absorb. Every action will create an imprint …

Machine Learning

35 books everyone should read at least once in their lifetime

Whether they're written for children, sci-fi lovers, mathematicians, or fiction aficionados, certain stories transcend their genre and should be read by everyone.<p>In a Reddit thread, users were asked what is a book that everyone needs to read at least once in their life?<p>So in honor of World Book …

Literature

Six-Pack Abs in Six-Weeks: A Summer Weight Loss Program

<b></b>Six-Pack Abs in Six-Weeks: A Summer Weight Loss ProgramWant to get ripped abs? It might seem impossible. But with MEN'S FITNESS Six-Pack in Six Week …

Exercise