Chris Lees

57 Flips | 9 Magazines | 37 Likes | 2 Following | @chrislees81 | Keep up with Chris Lees on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Chris Lees”

25 Coleslaw Recipes You Need for Your Next Backyard Barbecue

Slaw has come a long way as a side dish. The former mayonnaise-based favorite now boasts lighter ingredients with hearty greens, crunchy vegetables …

Is encrypted e-mail a must in the Trump presidential era?

ProtonMail makes a strong case, but there's a difference between privacy and secrecy.<p>With Donald Trump poised to take over the U.S. presidency, does …

Privacy

Asynchronous Python

Await the Future<p>Asynchronous programming in python has become more and more popular lately. There are many different libraries in python for doing …

JavaScript

15 Easy Fish Recipes for Guys Who Can’t Cook

Let’s get something straight: Champion bodybuilders and Dwayne “The Rock” Johnson figured out long ago that fish is the ultimate lean muscle-building …

email

Step: 1<p>We need to start by making the form with the aluminum flashing and the melamine. The circular melamine pieces will be cut out with your Ryobi …

'Thousands of popular sites' at risk of Drown hack attacks

<b>Websites have been warned they could be exposed to eavesdroppers, after researchers discovered a new way to disable their encryption protections.</b><p>The experts said about a third of all computer servers using the HTTPS protocol - often represented by a padlock in web browsers - were vulnerable to …

The best 30-minute chest workout

Colin Anderson / Getty<p>Colin Anderson / Getty<p><b>Duration</b> 30<p><b>Exercises</b> 8-9<p><b>Equipment</b> Yes<p>Guys love to train their chests. So much so, in fact, that they'll …

Best Hacking Tools Of 2017 For Windows, Linux, And OS X

<i>Short Bytes: Fossbytes has prepared a useful list of the best hacking tools of 2017 based upon industry reviews, your feedback, and its own</i> …

NSA Top Hacker: Here's How to Make My Life Hard

<i>A version of this post titled “The Tao of NSA” originally appeared in Cyber Saturday edition of Data Sheet, Fortune’s daily tech-business newsletter.</i> …

Maltrail – Malicious traffic detection system

Maltrail is an open source project that help to investigate and detect malicious traffic. The tool uses several popular feeds to blacklist or …

How To Go From 0 to Sniffing Packets in 10 Minutes

Meet Wireshark.<p>Right around the time I was learning the fine art of packet sniffing in an intro to computer networks class, my home internet network started going completely to hell. Sometimes it was fine, but, increasingly, it was slowing to a sub-dial-up trickle of around 20 Kbps. Given that I …

Cybersecurity

Use arp-scan to find hidden devices in your network

The Address Resolution Protocol uses a simple message format containing one address resolution request or response. The size of the ARP message …

How To: Linux Basics for the Aspiring Hacker: Managing Hard Drives

Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or …

Linux

The 9 worst cyberattacks of 2015

1/<p>Hackers breached the systems of the health insurer Anthem Inc., exposing nearly 80 million personal records.<p>AP Photo/Darron Cummings<p>In February, …

Here’s How To Install Kodi On The Apple TV 4

For those looking to get Kodi for their new Apple TV 4, there is a way to do so. In this guide, we will teach you how to put the pre-alpha version of …

Smart TV

The Worst Hacks of 2015

This year proved that nothing, and no one, is really safe from hackers.<p>Last year we witnessed some of the most shocking cyberattacks ever, with North Korea allegedly hacking Sony over the release of a dumb comedy movie to unknown hackers spilling the private nude pictures of dozens of celebrities. …

Security

How does the Cybersecurity Act of 2015 change the Internet surveillance laws?

The Omnibus Appropriations Act that President Obama signed into law last week has a provision called the Cybersecurity Act of 2015. The Cyber Act, as I’ll call it, includes sections about Internet monitoring that modify the Internet surveillance laws. This post details those changes, focusing on …

Could cyberattack on Turkey be a Russian retaliation?

At least 400,000 websites, including government institutions, were brought down by hackers this week<p>At least 400,000 websites in Turkey are under cyberattack, with unsubstantiated suspicions that the hackers are of Russian origin.<p>The attack, known as a Distributed Denial of Service (DDoS) attack, …

A Turning Point For Quantum Computing

Quantum computing is moving from theory and experimentation into engineering and applications.<p>But now that quantum computing is going mainstream, it is incumbent on businesses and governments to understand its potential, for universities to beef up their teaching programs in quantum computing and …

Quantum Computing

Router maker finds 'unauthorised' code

<b>Juniper Networks has issued a warning after discovering "unauthorised code" in its firewall software.</b><p>Analysis of the rogue code shows that it can decrypt scrambled data being sent through virtual private networks.<p>In a security advisory, the internet hardware maker said whoever wrote the code would …

Hacking Group 'Phantom Squad' Threaten To Take Xbox Live And PSN Offline Over Christmas

A group of hackers known as the 'Phantom Squad' have threatened to take both Xbox Live and PlayStation Network offline over Christmas - echoing the …

Boxing Day

Security Talk 2: Logjam attack, fake minecraft apps and more

Whiteboard Wednesday: Logjam Vulnerability

logjam tls vulnerablity

Big bug found in SSL called Logjam, here's what you can do

It seems like we just got over the Heartbleed vulnerability, but there’s another major flaw with SSL called “logjam” that affects a number of fundamental Web protocols.<p>The bug affects an algorithm called the “Diffie-Hellman key exchange” which allows protocols such as HTTPS, SSH, IPsec, SMTPS to …

How Logjam Might Have Enabled NSA's Mass Surveillance

A new vulnerability that is on the critical level of HeartBleed has been discovered by the security researchers. Codenamed LogJam, this latest …

LogJam: Latest internet vulnerability putting your confidential information at risk

First there was Heartbleed, then Poodle, Shellshock, and Freak, and now we have LogJam - the latest vulnerability to be uncovered which is …

'Logjam' browser vulnerability fix will block thousands of websites

Researchers have discovered a new browser and website encryption vulnerability called Logjam, and there's good news and bad news. On the plus side, the vulnerability has largely been patched thanks to consultation with tech companies like Google, and updates are available now or coming soon for …

TNW's Apps of the year: Cloak keeps you safe on dodgy WiFi

<i>In our</i> <i>Apps of the Year</i> <i>series, The Next Web team shares personal recommendations for our favorite apps of 2015.</i><p>I only discovered Cloak recently, after wasting a ton of time trying to roll my own VPN to keep myself safe abroad, and was blown away by how easy it is.<p>Put simply, Cloak creates a VPN on …

A major security flaw is letting hackers attack companies just by sending an email

Ars Technica reports that the vulnerability was unearthed by members of Google's Project Zero security research team. Google privately reported it to FireEye so it could fix the issue before the details were made public.<p>FireEye's products are essentially special computer hardware dedicated to …