Thomas J. Scharmann

182 Added | 11 Magazines | 71 Likes | 6 Followers | @ThomasJSchai35c | Keep up with Thomas J. Scharmann on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Thomas J. Scharmann”

LibreNMS - A Fully Featured Network Monitoring Tool for Linux

<b>LibreNMS</b> is an open source, powerful and feature-rich auto-discovering PHP based network monitoring system which uses the SNMP protocol. It supports …

Linux

The Sun Is Spitting Out Strange Patterns of Gamma Rays--and No One Knows Why

Our closest star remains an enigma. Every 11 years or so its activity crescendos, creating flares and coronal mass ejections—the plasma-spewing …

Universe

'Learn with Google AI' will teach you Machine Learning for free

Tech giant Google has now introduced a new easy-to-learn platform called ‘Learn with Google AI’, which are a set of educational resources developed …

Ocean array alters view of Atlantic ‘conveyor belt’

<b>PORTLAND, OREGON—</b>Oceanographers have put a stethoscope on the coursing circulatory system of the Atlantic Ocean, and they have found a skittish pulse …

How To: Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)

Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal …

KPTI/KAISER Meltdown Initial Performance Regressions

The recently revealed [Meltdown and Spectre] bugs are not just extraordinary issues of security, but also performance. The patches that workaround …

Linux

The 5 Clustering Algorithms Data Scientists Need to Know

Clustering is a Machine Learning technique that involves the grouping of data points. Given a set of data points, we can use a clustering algorithm …

Data Science

CSSReference.io is a gorgeous visual guide to CSS

The best way to learn CSS is through trial-and-error. <i>You’ve got to write code in order to learn to be a coder</i>. That’s the simple truth of the matter. But it’s always nice to have a helping hand guide you through the often confusing and contradictory technology used to style and illustrate webpages, …

3 Ways to Find Out Which Process Listening on a Particular Port

A port is a logical entity which represents an endpoint of communication and is associated with a given process or service in an operating system. In …

Linux

Unknown and forgotten CLI commands

Each developer should master his/her skills of working with the command line.<p>Being physically near a computer is not always possible, so you have to …

Linux
Linux

Katastrophe

<i>A Command-Line Interface for scraping Kickass torrents (kat.cr). Provides options to scrape top torrents in given categories, or searching for</i> …

Command-line

CHAOS Framework - Generate Payloads and Control Remote Machines

CHAOS Framework allows generate payloads and controls remote machines.<b><br>DISCLAIMER</b>The use of the CHAOS Framework is COMPLETE RESPONSIBILITY of the …

Linux
Linux

dork-cli – Command-line Google Dork Tool

dork-cli is a Python-based command-line Google Dork Tool to perform searches againsts Google’s custom search engine. A command-line option is always …

How To Build A RegEx

<i>I might at some point update this post, but over at my own blog.</i><p>I see people abusing regexes just about every day.<br>If you're really good at regexes …

Linux

How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

In this how-to, I will be demonstrating a few of the tactical applications of Besside-ng, the hidden gem of the Aircrack-ng suite of Wi-Fi hacking …

Wi-Fi

Google releases new TensorFlow Object Detection API

Google is releasing a new TensorFlow object detection API to make it easier for developers and researchers to identify objects within images. Google is trying to offer the best of simplicity and performance — the models being released today have performed well in benchmarking and have become …

Machine Learning

A Facebook AI Unexpectedly Created Its Own Unique Language

The Future of Language<p>A recent Facebook report on the way chatbots converse with each other has given the world a glimpse into the future of language.<p>…

Several Alabama cities have their coldest May 5 on record

Temperatures get back to normal starting tomorrow.

Weather

Tesla's massive batteries are powering everything from exotic islands to breweries

Tesla has had an energy division committed to selling its at-home battery, the Powerwall, and commercial battery pack, the Powerpack since 2015. But after acquiring SolarCity in a deal worth $2.1 billion in November, Tesla has doubled down on its renewable energy efforts.<p>The company released …

Tesla

U.S. Military Deepens Yemen Role With Escalating Strikes Against Al-Qaeda Affiliate

The U.S. military is deepening its involvement in Yemen, with escalating counterterrorism strikes targeting an al-Qaeda affiliate that’s gained …

Middle East

5 Cognitive Biases You Need to Put to Work ... Without Being Evil - Copyblogger

All writing is persuasion in one form or another.<p>This is more obvious in some types of writing than others, but it is nonetheless true for all.<p>When …

If you want to understand the age of Trump, read the Frankfurt School

Why now is a great time to dust off this forgotten school of criticism.<p>In 1923, a motley collection of philosophers, cultural critics, and sociologists formed the Institute of Social Research in Frankfurt, Germany. Known popularly as the Frankfurt School, it was an all-star crew of lefty theorists, …

Don Libes' Expect: A Surprisingly Underappreciated Unix Automation Tool

In this article, I will attempt to convince you that Expect is an <i>extremely</i> underappreciated tool for automating terminal applications in Unix.<p>Why do …

The codeless computers of the future and the fall of the programming elite

WHY THIS MATTERS IN BRIEF<p>Programming is one of todays most in demand skills but as we continue to train, not code our latest computer systems, the …

Domain

This is a step-by-step guide to configuring and managing a domain, remote server and hosted services, such as VPN, a private and obfuscated Tor …

Linux

How To Hack WPA2-PSK Secured Wi-Fi Password Using Kali Linux

How To Hack WPA2-PSK Secured Wi-Fi Password Using Kali Linux<p>In this post we are going to show you How to hack secured wifi with WPA2-PSK using Kali …

Sleeping While Awake

<i>“It was literally true: I was going through life asleep. My body had no more feeling than a drowned corpse. My very existence, my life in the world,</i> …

Brainwaves