Eric Garza

63 Flips | 5 Magazines | 9 Likes | 6 Following | 2 Followers | @e4g4rz4 | Keep up with Eric Garza on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Eric Garza”

New wi-fi crack attack allows outsiders to snag user creds

Depending on length and complexity of password.

Information Security

15 Ways With Lime

1 of 15<p>Key Lime Margarita<p>Advertisement<p>2 of 15<p>Lime Caesar Salad<p>3 of 15<p>Yucatecan Chicken-and-Lime Soup<p>Advertisement<p>4 of 15<p>Tiradito of …

The Best Recipes from Texas

We found the best recipes from Texas—all shared by local home cooks. In this collection, you’ll find classic dishes from the Lone Star State, plus a …

How To: Hack WPA2 Wi-Fi Passwords Using Jedi Mind Tricks (& USB Dead Drops)

The latest Star Wars movie, <i>Solo: A Star Wars Story</i>, has grossed almost $350 million worldwide during its first month in theaters. This is a good …

Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into …

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration …

How To: Install & Lock Down Kali Linux for Safe Desktop Use

Kali Linux is established as the go-to operating system for penetration testing, but in its default configuration, it's less than ideal for regular …

Hackers built a 'master key' for millions of hotel rooms

New research shows how hackers can manipulate hotel room key cards to gain access to an entire building.<p>Security researchers have built a master key …

Hospitality

DIY Raspberry Pi NAS

Raspberry Pi enthusiasts interested in creating their very own networked attached storage NAS system powered by a Raspberry Pi mini PC may be …

Raspberry Pi

How To: Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on …

How to set up a GitLab server and host your own Git repositories

Jack Wallen shows you how to set up your own GitLab server, so you can enjoy the power and flexibility of a LAN (or WAN) based Git repository.<p>If …

Linux

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it

Good news: Virtually all traditional types of malware declined in the past few months. Not so good: mainly because hackers are more interested in using your computer to help them mine cryptocurrencies.<p>It's likely you, or your employer, aren't even aware it's happening. Malware miners latch onto …

Mining

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

How to Improve Your C++ Skills From Awesome Projects

Unreal Engine case study<p>The Unreal Engine is a game engine developed by Epic Games, first showcased in the 1998 first-person shooter game <i>Unreal</i>. …

Hacking Windows 10: How to Find Sensitive & 'Deleted' Files Remotely

Deleted bank statements and private photos are still within an attacker's grasp, so don't think that emptying your recycling bin is enough to keep …

How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP …

Python Regular Expressions Cheat Sheet

The tough thing about learning data is remembering all the syntax. While at Dataquest we advocate getting used to consulting the Python …

Python Programming

'Highly critical' CMS bug has left over 1 million sites open to attack

The team behind the popular open-source CMS Drupal is urging admins to update their sites to ward off a nasty bug that could leave their sites …

Hacking Windows 10: How to Steal & Decrypt Passwords Stored in Chrome & Firefox Remotely

Passwords stored in web browsers like Google Chrome and Mozilla Firefox are a gold mine for hackers. An attacker with backdoor access to a …

150 million MyFitnessPal accounts were hacked. Here's what to do

Here we go again. Another day, another security breach.<p>This time it's Under Armour's MyFitnessPal, the popular fitness app. The company reported Thursday that some 150 million MyFitnessPal accounts had been compromised by an "unauthorized party."<p>Translation: It's time to change your password. And …

Top 10 Visual Studio Code themes

My editor of choice is Visual Studio Code<p>Personally, I am a sucker for beautiful looking editors and environment. I admit if you go too deep into …

How to set up Django Environment in Linux for beginners

When I started learning Django, finding a tutorial that had everything I needed was pretty hard So hopefully this tutorial will help you get …

Hacking Windows 10: How to Break into Somebody's Computer Without a Password (Exploiting the System)

After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or …

A beginner’s guide to solar power

A beginner’s guide to solar power sponsored<p>Using the sun to power your home is now an option for New Zealand families.<p>Using the sun to power your …

Python: Multiple One-Argument Constructors

I have a Game class which has a field that's a Board object. I currently make a Game by passing in a string encoding information about the game and …

[P] A Python Library for Decoding Video in Input Pipelines: Lintel : MachineLearning

Hi, I wanted to share a simple Python library for decoding video that I have written, called Lintel. I hope that it might be useful for anyone …

Machine Learning

Yes, Even Elite Hackers Make Dumb Mistakes

On Thursday, a report from the Daily Beast alleged that the Guccifer 2.0 hacking persona—famous for leaking data stolen from the Democratic National …

Start Saving Your Dollars Because LEGO's Tron: Legacy Light Cycles Set Finally Arrives Next Week

More toymakers should take a page from Lego's book and let fans contribute fun and creative ideas. The Lego Ideas site has delivered some of the most …

Report examines how police use fingerprints of dead people to unlock iPhones & how Face ID is also vulnerable

The topic of using the fingerprint of a dead person to unlock an iPhone with Touch ID has been brought to light in the past, and now a new report from <i>Forbes</i> dives into a bit more into details regarding the practice. The report includes anecdotes from various law enforcement and FBI sources who …

How AI Can Be Applied To Cyberattacks

Nowadays, artificial intelligence is a kind of a de facto standard. One would be hard-pressed to find an industry where AI or machine learning found no applications. AI projects are popping up everywhere — from law to medicine, farming to the space industry.<p>Cybersecurity is not an exception. As …

Artificial Intelligence