Agustin Guzman

544 Flips | 8 Magazines | 428 Likes | 4 Following | 9 Followers | @aguie420 | Keep up with Agustin Guzman on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Agustin Guzman”

A new layer of blockchain tech is emerging: inter-chain mediators

In the beginning was Bitcoin, the only blockchain we thought we’d need. Then Ethereum came along and launched us into a multi-blockchain world. Since then we’ve seen many new blockchains emerge with their various different protocols, financed by their various different tokens.<p>One of the the key …

Blockchain will make things even harder for blackhat hackers

Hacking can be fun. It’s also educational. And to be clear, I’m not talking about the steal-your-stuff type of hacking.<p>I’m referring to taking things to the extreme — finding interesting ways to solve things, discovering secret entryways, maximizing hidden features, and other cool stuff.<p>Hacking …

NFL, College Sports, NBA and Recruiting

• Tymon Mitchell<br>• DT / 6-3 / 309<br>• NA<br>• Predicted by: Kipp Adams<p>Micah Bernard<br>• RB / 6-0 / 200<br>• NA<br>• Predicted by: Steve Bartle<p>Peyton Powell<br>• ATH / 6-2 / 182<br>• NA<br>• Predicted …

College Football

Test Opensuse 13.2: Entschlackter Installer, Wicked konfiguriert das Netzwerk

Mit etwas Verspätung ist Version 13.2 der Linux-Distribution Opensuse freigegeben worden. Die Verzögerung war nicht Bugs im System geschuldet, …

Linux Hotplug a CPU and Disable CPU Cores At Run Time - nixCraft

I would like to dynamically enable or disable a CPU on a running system. How do I hotplug a CPU on a running Linux system? How do I disable cpu cores …

Google Authenticator will add a formidable layer of protection to your e-mail account

Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process …

Information Systems

Website is under construction

Master Excel like the boss you are for less than $30

Microsoft's beloved WordArt feature of the 1990s helped your childhood self give homework assignments the ol' razzle-dazzle — all under the watchful …

Best Ever Chocolate Mudslide Cake

Steps<p>1<p>Done<p>For the cake:<p>Preheat oven to 350° F. Grease three 8-inch cake pans with Crisco and dust with cocoa powder to help easily release the cake …

The 5-Minute Guide on How to Invest in Marijuana Stocks

Do you have a few moments? Interested in marijuana stocks? Here's a brief look at the numerous titles available on the market.<p>For those wondering how …

Cannabis

Misty from Pokemon cosplay by mayuyu0405

Build an Image Recognition API with Go and TensorFlow

Build an Image Recognition API with Go and TensorFlow<p>Tin Rabzelj18 October, 2017<p>This tutorial shows how to build an image recognition service in Go …

Wikileaks gets hacked on the same day it dumps CIA hacking tools data

In a supreme bit of irony, Wikileaks has been hacked on the same day it dumped data on a number of Central Intelligence Agency hacking tools.<p>The data …

Wi-Fi security has been breached, say researchers

This is your Wi-Fi on KRACK<p>At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by <i>Ars</i> …

Information Security

Elliptic Curve Cryptography for Beginners

I find cryptography fascinating, and have recently become interested in elliptic curve cryptography (ECC) in particular. However, it's not easy to …

The Science Behind Cryptocurrencies Cryptography

In this guide, we will be going deep into symmetric and asymmetric cryptography and the science behind cryptocurrencies cryptography.<p>Cryptocurrencies …

After WannaCry, the Shadow Brokers promise to unleash more NSA exploits soon

The good news is that the “WannaCry” ransomware isn’t spreading as quickly as it was just a few days ago, in large part thanks to an enterprising …

Fun with secrets

Security in computer science is a huge point every individual and company. Communications (either between humans or human-network or whichever online …

Breaking DKIM - on Purpose and by Chance

October 2017<p><b>For the impatient</b><br>See here for how to create a mail which looks like it comes from DHL, passes DKIM and DMARC validation, but shows a …

Army’s ‘Multi-Domain Battle:’ Jamming, Hacking & Long Range Missiles

Days before the biggest defense conference of the year, one of the Army’s top thinkers is unveiling the service’s new push to expand its role beyond …

Git and Visual Studio 2017 part 16 : Find out who introduced the issue and when

In previous article, I explain how to revise local commits afterwards via Git. In this article, I explain how to find the commit which causes the …

Pie Crust Designs, These Pie Crust Masters Show you How it’s Done Recipe

There's an art to creating a beautiful pie crust, and it doesn't have to be intimidating. If you're looking to move beyond a simple, basic crust this …

Nintendo’s mini SNES has already been hacked to run more games

Nintendo SNES Classic owners should be glad to learn that more games aren’t out of your reach.<p>Cluster, the Russian coder who originally cracked the NES Classic Edition, has now figured out how to side-load more games to the SNES CE through his Hakchi tool. With the release of Hakchi v2.20, users …

Retrogaming

Why SQL is beating NoSQL, and what this means for the future of data

<i>After years of being left for dead, SQL today is making a comeback. How come? And what effect will this have on the data community?</i><p><i>(Update: #1 on</i> …

This Is A $2,200 Retro Gaming Machine

This is the Zette System, handcrafted from wood by Swedish artist Love Hultén. In its resting state it resembles a stylized wooden boombox, but it’s …

Headless Browser Testing using Selenium WebDriver

In this post, we learn what is Headless Browser Testing and what we could achieve with Headless Browser Testing using Selenium WebDriver. Selenium …

What is Monero? Most Comprehensive Guide 2018

According to Monero’s site: Monero is a secure, private and untraceable currency system. Monero uses a special kind of cryptography to ensure that …

11 Ways to Find User Account Info and Login Details in Linux

This article will show you eleven useful ways to find the information about users on a Linux system. Here we’ll describe commands to get a user’s …