Sirisak

1,090 Flips | 6 Magazines | 6 Likes | 3 Following | 16 Followers | @ic2dot | Keep up with Sirisak on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Sirisak”

Hacker Unlocks 'God Mode' and Shares the 'Key'

At Black Hat USA and DEF CON, researcher Christopher Domas showed how he found backdoors that may exist in many different CPUs.<p>When a room filled …

Information Security

How to Read Programming Error Messages

Maybe software-development used to be different. Maybe you spent hours devising algorithms, huddled together over whiteboards until your markers ran …

How Hacked Water Heaters Could Trigger Mass Blackouts

When the cybersecurity industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of …

Princeton University

Linux zcat Command Examples for Newbies

Normally, files compressed using <b>gzip</b> can be restored to their original form using <b>gzip -d</b> or <b>gunzip</b> commands. What if you want to view the contents of …

Linux

Ask yourself these questions before saying “yes” or “no” to anything

Your approach should change depending on your circumstances.<p>A LinkedIn connection that you’ve never met in person asks if you’d like to meet for a coffee. Your boss invites you to a networking dinner with several executives from the office. Your former college professor asks if you would be …

Shonda Rhimes

These Are 15 Free Excel Templates You Can Use to Make More Money

Use them...and profit.<p>In these days of cloud-based systems, mobile applications, and web-based services, why use a spreadsheet for any other purpose than analysis?<p>Three reasons: ease, customization, and cost. A spreadsheet can be easily saved, updated, and reused again and again. A good template …

Project Management

Linux vulnerability could lead to DDoS attacks

A Linux kernel vulnerability affecting version 4.9 and up could allow an attacker to carry out denial-of-service attacks on a system with an …

Linux

60 Keyboard Shortcuts Everyone Should Master [Infographic]

Of course, you may not need all 60 of these, but knowing them will make you flexible, fast, and ready to work with whatever tool you're presented …

Keyboard Shortcuts

New genre of artificial intelligence programs take computer hacking to another level

The nightmare scenario for computer security - artificial intelligence programs that can learn how to evade even the best defenses - may already have …

Artificial Intelligence

Chrome OS can now install Linux apps from .deb packages

Linux applications are usually distributed in one of two ways - through a software repository, or by downloading an installer package from a website. …

Linux

Grilled Octopus with Korean Barbecue Sauce and Baby Bok Choy Slaw

If you’ve ever ordered a delightfully meaty and tender, charred octopus dish at a restaurant and immediately thought to yourself, “Wow, I wish I …

Choy

New Wi-Fi attack cracks WPA2 passwords with ease

The common Wi-Fi security standard is no longer as secure as you think.<p>A new way to compromise the WPA/WPA2 security protocols has been accidentally …

Information Systems

How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it …

Wi-Fi

New Method Discovered for Cracking WPA2 Wi-Fi Passwords

<b>Developers of the popular password cracking tool Hashcat have identified a new method that can in some cases be used to obtain a network’s Wi-Fi</b> …

10 Ways to Make Python a Dangerous Tools For Data Science

People are still crazy about Python after twenty-five years,which I find hard to believe.<p>Python has numerous applications — web development, desktop …

Python Programming

How to Copy Your Windows Installation to an SSD

If you’re looking to upgrade your computer to a solid-state drive but don’t want to start everything back up from scratch, here’s how to transfer …

Linux

How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet

Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that …

White Hat

A beginner's guide to AI: Algorithms

<i>Welcome to TNW’s beginner’s guide to AI. This (currently) four part feature should provide you with a very basic understanding of what AI is, what it can do, and how it works. The guide contains articles on (in order published) neural networks, computer vision, natural language processing, and</i> …

Artificial Intelligence

How to install the Grafana Monitoring Tool on Ubuntu 18.04

Jack Wallen walks you through the steps of installing the open source, enterprise-grade monitoring and data visualization tool, Grafana, on Ubuntu …

Linux

How To: Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The …

Cybersecurity

[TA Deals] Master Microsoft Excel with the Ultimate All-Level Bootcamp Bundle

It’s always great to pad out your resume with new skills, and right now you can add Microsoft Excel to that list thanks to our latest discounted …

Microsoft Excel

Swatchdog - Simple Log File Watcher in Real-Time in Linux

<b>Swatchdog</b> (the “<b>Simple WATCH DOG</b>”) is a simple Perl script for monitoring active log files on Unix-like systems such as Linux. It watches your logs …

Linux

How to recover deleted files

You need a document, photo or other file that you're sure was deleted. You've searched your hard drive. You've scoured the Recycle Bin. No sign of it? Don't panic. As long as you act quickly, you can usually bring that file back to life. And to accomplish that feat, you'll want to turn to a …

Operating Systems

Why you're using Tor wrong

If you're concerned about online security, you may use Tor to access or manage anonymous servers. But you're probably using it wrong. Here's</i> …

Privacy

These Free Online Courses From Google Will Boost Your Career No Matter What Business You're In

From product design to LinkedIn strategies, Google has a lot to teach executives and entrepreneurs.<p>Google has a lot it wants to teach us. The search giant offers a massive number of online courses, many of them targeted to students or recent graduates through Grow with Google. Others will teach you …

Online Life

11 Wilderness Survival Tips That Could Save Your Life in Critical Situations

Learning self-defense techniques or creating a Medical ID on your iPhone are all things you hope to never have to use; however, it provides you with …

Cool Stuff

Documenting Python Code: A Complete Guide

Welcome to your complete guide to documenting Python code. Whether you’re documenting a small script or a large project, whether you’re a beginner or …

Python Programming

10 companies hiring for remote jobs where you can literally work from anywhere

The majority of remote jobs require workers to live in specific regions or locations, but these 10 companies let you work remotely without geographic …

Remote Working

Microsoft introduces the Python Language Server in Visual Studio Code

Microsoft is continuing its commitment to Python with the release of the Python Language Server. It is currently available as part of the July …

Microsoft Visual Studio

Every Netflix secret category for porn, revealed

If you want to find porn on Netflix, we’ve already done the hard work for you. Here are our guides to the sexiest movies and TV series on Netflix. …

Critically-Acclaimed