Richard Tom

70 Flips | 12 Magazines | 3 Likes | @RichardTom5ion | Keep up with Richard Tom on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Richard Tom”

14 YouTube Channels You Need To Know If You Want To Work Out For Free

Everything you need if you want to get fit but don't want to spend money, leave your house, or put on a sports bra.

Exercise

Cyberattack ‘Wake-Up Call’ Puts Pipeline Sector in Hot Seat

A cyberattack that U.S. natural gas pipeline owners weren’t required to report has lawmakers taking a closer look at how the industry is handling …

​What are the fastest DNS providers?

Cloudflare is only the latest company to provide free, fast, and secure Domain Name System services. Here's how the major DNS resolvers perform on …

1.1.1.1: Cloudflare's new DNS attracting 'gigabits per second' of rubbish

Cloudflare is conducting an experiment with APNIC, and it's revealing plenty of dirty hacks.<p>Cloudflare's new speed and privacy enhancing domain name …

TensorFlow Tutorial For Beginners

<i>Originally published at</i> <i>https://www.datacamp.com/community/tutorials/tensorflow-tutorial</i><p>Deep learning is a subfield of machine learning that is a set …

Ten Machine Learning Algorithms You Should Know to Become a Data Scientist

Machine Learning Practitioners have different personalities. While some of them are “I am an expert in X and X can train on any type of data”, where …

Artificial Intelligence - Don't forget the people and process

Having the right technology and expertise in place is just the first step in profiting from AI. Ultimately, accountability and repeatability will be …

Artificial intelligence development course offered for free by Google

Artificial intelligence has been the catchphrase in the tech world in recent times, but how do you actually make one?<p>Google wants to help people …

Become A Deep Learning Coder From Scratch In Under A Year

Machine learning (AKA AI) seems bizarre and complicated. It's the tech behind image and speech recognition, recommendation systems, and all kinds of …

Machine Learning

Windows 10 null character flaw keeps malware hidden from security scanning tools

The Windows 10 interface that allows apps to connect to antivirus software is truncating files, causing compromised code to come back clean.<p>Building …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

What is cyber security? How to build a cyber security strategy

Cyber security is the practice of ensuring the integrity, confidentiality and availability (ICA) of information. It represents the ability to defend …

Cybersecurity

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

Perhaps you've been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's …

These five programming languages have flaws that expose apps to attack

Securely-developed apps may be at risk due to security issues in popular interpreted programming languages.<p>Even software that has been built with …

11 Steps to Help You Crush Your Handstand Goal

Learning how to do a Handstand is an awesome goal for 2018! Talk about a total-body move — Handstands strengthen your upper body and your core, and they challenge your sense of balance. Plus, being upside down is a fun way to get a new perspective on life and lift your mood!<p>Even though Handstands …

I Did 20 Push-Ups Every Day For 2 Weeks and Here's What I Learned

Earlier this year, I could string together a solid 14 to 16 push-ups without stopping. It was a skill that took me quite some time to master. And by …

​How to Lose Belly Fat in Seven Minutes a Day | Men’s Health

In the study, researchers recruited 29 normal-weight adults who did not exercise regularly, and had some of them complete an exercise program while the others didn’t work out at all. For six weeks, the workout group completed a seven-minute bodyweight circuit of 12 exercises each day: 30 seconds of …

Windows DNS Bug Lets Attackers Run Code on Your Computer

Microsoft has just fixed a nasty bug affecting the DNS client included with Windows 8, Windows 10, Windows Server 2012 and Windows Server 2016.<p>The …

Apache bug leaks contents of server memory for all to see—Patch now

Optionsbleed is especially threatening for people in shared hosting environments.<p>There's a bug in the widely used Apache Web Server that causes …

Information Security

Best triceps exercises: The only 7 tricep workouts you need to know

Best triceps exercises: The only 7 tricep workouts you need to know<p>While the biceps constitute a sizeable portion of your arms, the triceps comprise …

How to opt out of Equifax's rights-stripping arbitration clause

During the five weeks after hackers stole 143 million Americans' data from Equifax, and while its execs were selling off their stock by the millions, …

The .io Error - Taking Control of All .io Domains With a Targeted Registration

In a previous post we talked about taking over the <i>.na</i>, <i>.co.ao</i>, and <i>.it.ao</i> domain extensions with varying levels of DNS trickery. In that writeup we …

Ooey Gooey Butter Cake

12 servings<p>This cake is a legendary Depression-era mistake. The story goes something like this: A baker in St. Louis accidentally mixed up the ingredient proportions for his cake, resulting in a gooey texture. Because it was the Depression, they couldn’t just throw it out, so they sold it and it …

Dessert

Steganography in contemporary cyberattacks

Steganography is the practice of sending data in a concealed format so the very fact of sending the data is disguised. The word steganography is a …

Cybersecurity

5 Awesome Open Source Groupware Software Suite

Groupware (also known as "Collaborative software") is nothing but an app that helps users in everyday tasks such as calendar/scheduling, address …

Linux

Here's how malware gets inside your phone's apps

Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly.<p>The recent Judy malware, for example, was reportedly found in 41 apps in the Google Play store. It seems to have made money for its creators by repeatedly auto-clicking on …

Apps

DNS Infrastructure at GitHub

At GitHub we recently revamped how we do DNS from the ground up. This included both how we interact with external DNS providers and how we serve …

DevOps