Theodore Baschak

39 Flips | 1 Magazine | 58 Likes | @TheodoreBaschak | Keep up with Theodore Baschak on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Theodore Baschak”

Grow Your Own Marijuana with Leaf Plug N’ Play Cannabis Growing System

The legal status of pot is evolving rapidly, cannabis is legalized in more and more places. You can buy marijuana from retail stores, but you can …

Killer deal: Save $30 on a case that adds a second screen to your iPhone 6 or 6s

We can’t state conclusively that this is the coolest iPhone 6 and iPhone 6s case that has ever existed, but if it’s not it’s pretty darn close. The …

Apple has reportedly dumped VMware in a move that could save it millions

According to the report, Apple was using VMware ESXi internally to run its internal server infrastructure. Originally, Apple was planning to renew its four-year-old licensing deal with VMware at a cost of around $20 million for the next two years.<p>VMware, a $33 billion publicly traded company, makes …

Vmware

Python If statements

An <b>if statement</b> lets you perform a test to decide whether or not to run certain lines of code.<p>If statements<p>Lines of code are normally executed one …

PiDrive Raspberry Pi HDD from Western Digital gives the little PC big storage

Although Raspeberry Pi computers tend to be used for quite small and simple tasks, which are well suited to their (relatively) low powered hardware, …

Psychedelic drugs as treatment for anxiety, addiction

In a carefully controlled setting, psychedelic drugs such as LSD or "magic mushrooms" may benefit patients with hard-to-treat anxiety, addiction or …

Zen Foxes: Photographer Documents Wild Foxes Enjoying Themselves

These photos by Roeselien Raimond, a Dutch nature photographer who specializes in taking beautiful photos of wild foxes, show how foxes are experts …

VW Has Spent Two Years Trying to Hide a Big Security Flaw

Thousands of cars from a host of manufacturers have spent years at risk of electronic car-hacking, according to expert research that Volkswagen has …

Freedom of Information

Why super-fast internet may come from a company you've never heard of

​Coming soon to a city near you: the next generation of super-speed internet access.<p>Canada's cities, lagging behind many global metropolises — and …

Lenovo used shady 'rootkit' tactic to quietly reinstall unwanted software

Even when users reinstalled a clean version of Windows on some Lenovo devices, the software would still reappear.<p>Lenovo has been caught using a …

How NatGeo's Traveler Photo Contest Proved that the Camera Doesn't Matter

Whale Whisperers. © Anuar Patjane<p>When National Geographic announced the winners of its Traveler Photo Contest, all anyone could talk about was the …

What is a Computer Hacking Forensic Investigator?

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct …

OpenSSH password guessing attacks may be 10,000 times easier than you thought

An interesting problem with OpenSSH – let’s call it a feature that turned out to be a vulnerability – has been publicised on the Full Disclosure …

Phishing attacks targeting government agencies linked to Hacking Team breach

In an alert on Friday, the FBI has issued a warning about an active phishing campaign targeting various government agencies in the U.S.<p>The alert says …

10 Simple Yet Useful Tips on Python Programming (Tricks)

July 16, 2015 | Category: Technology | Email this post<p><b>Tips on Python Programming –</b> In today’s world, Python is one of the most used language. It’s …

Python Programming

Malwarebytes releases Mac security software to get rid of Apple malware, adware

Purchase of Mac-based security specialist AdwareMedic helps target new audience

Malware

How to Find the Wi-Fi Password of your Current Network

Your computer is connected to a Wi-Fi network but you do not remember the password that you had earlier used to connect to this particular WiFi …

Wi-Fi

Hacking Team stealthy spyware rootkit stays entrenched through hard disk removal

Scrubbing simply isn't going to work with Hacking Team's virulent rootkit.<p>A rootkit used by Hacking Team avoids destruction even in the cases of hard …

Researchers find new Adobe Flash zero day in Team Hacking leaks

A new Adobe Flash flaw could let hackers lock you out of your computer. Reuters Pictures<p>Hackers are using a previously undiscovered vulnerability in Adobe’s commonly used Flash software to install blackmailing malware on victims’ machines.<p>The Adobe Flash zero day vulnerability was uncovered by …

System level Access and Plain Text Passwords using Bypass UAC and Mimikatz

If you can get a remote shell during a penetration test, Metasploit’s Bypass UAC module is great for disabling that pesky UAC and escalating an …

Information Security

TEMPEST Attack

There's a new paper on a low-cost TEMPEST attack against PC cryptography:<p>We demonstrate the extraction of secret decryption keys from laptop …

How to build your own public key infrastructure

A major part of securing a network as geographically diverse as CloudFlare’s is protecting data as it travels between datacenters. Customer data and …

IT security

UK Companies in Mass Tech Exodus Over Controversial Snoopers' Charter

Following the 2015 general election in Britain, David Cameron announced the re-introduction of the Communications Data Bill, dubbed the 'Snoopers' …

Linux 4.2 Adds New Public Key Encryption API, Jitter RNG

The latest subsystem update worth commenting on for the Linux 4.2 merge window are the crypto(graphy) updates with this new kernel version.<p>With the …

Linux

US to establish cyber truce with China following recent hacks

In the wake of recent cyber attacks on American organizations, President Obama has urged China to take initiatives to reduce tensions between the two nations, according to The BBC.<p>At the end of talks over two days earlier this week, US Secretary of State John Kerry said that the US and China will …

Hacking

Luxury hotel offers internet kill switch to help guests disconnect

For when turning off your phone is too difficult<p>A luxury hotel in Germany has installed an internet "kill switch" in its rooms, giving guests an easy way to completely disconnect during their stays. As the <i>Financial Times</i> reports, the silver switches have been installed at the Villa Stéphanie, a spa …

Cyber crime: PSNI say hack attack almost shut NI firm

<b>A Northern Ireland company employing 20 people was almost forced to close after its computer systems were hacked by an international crime gang, police have revealed.</b><p>The PSNI says firms are being targeted every day by criminals trying to steal data, commit fraud and blackmail.<p>Business organisations …

Cybersecurity

A new chapter in secure "Data at Rest" using cryptography

Cryptography has evolved over many years to prevent unauthorized access to communications, whether the information was transported by courier, …

Internet Test Reveals Americans Are Not Getting the Speeds They Paid For

For too long Internet users had to take it on faith that our Internet access providers were making good on their promises to give us what we pay for.<p>But even those who pay a premium for top speeds have found that certain sites and services sputter out at the pace of dial-up. And calling your ISP's …

Stolen US government passwords leaked across Web

Login credentials and passwords belonging to the majority of federal agencies have been leaked online.<p>A CIA-backed startup has discovered login …