revengekid

56 Flips | 16 Magazines | 13 Likes | 3 Following | @revengekid | Keep up with revengekid on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “revengekid”

A $225 GPS spoofer can send autonomous vehicles into oncoming traffic *

* Some restrictions apply.<p>Billions of people—and a growing number of autonomous vehicles—rely on mobile navigation services from Google, Uber, and …

Android Phones

How To Create an Instagram Bot With Node.js

As the news broke about Instagram hitting one billion monthly active users, I couldn’t help but create an account of my own and try to win myself …

JavaScript

Here’s why Bitcoin’s blockchain has blocks that go over the 1MB limit

When you really try to nail down what makes a cryptocurrency like Bitcoin <i>really Bitcoin</i>, the more technical you get, the closer you are to discussing block size.<p>A block is really a set of data, and for Bitcoin BTC they’re mostly related to transactions. Bitcoin miners are really in the business of …

Bitcoin

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some …

Information Security

Top 15 Python Libraries

Python is one of the world most popular and widely used high-level, general-purpose Language. There are many big organization using python for …

Python Programming

One-shot object detection

Table of contents<p>One-shot object detection<p>Object detection is the computer vision technique for finding objects of interest in an image:<p>This is more …

Deep Learning

Xcode tip: Using behaviors to improve debugging

Previously, I discussed how to make Xcode’s ‘Assistant Editor’ less frustrating when writing Swift. Another trick I learned recently involves using …

iOS Programming

The truth about fasting: Does the 72-hour water fast really work? We tried it and the results were surprising

W hat it would be like if you had no food for three days? No coffee, no juice, no supplements. Just plain old water. Well, let me tell you...<p>First of …

Wellness

Personal macOS Workspace Setup

This is my personal macOS workspace setup for web development. If you’d like to install latest technologies and stay up to date, follow my guide and …

Linux

Top 5 Ethical Hacking Paid Udemy Courses for Free

Today I brought few ethical hacking courses from Udemy for free for you. Hope it’ll be helpful for you.<p><b>1. Learn Kali Linux to Hack Android Mobile</b> …

Ethical Hacking

How to recover data from Hard Disk?

Many times we accidentally delete important documents from a file or hard disk or sometimes it is simply because of hard disk being infected by the …

Operating Systems

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense)

Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. In addition, our steady flow of hacking Windows 10 …

Linux

SwiftEntryKit

Overview<p>Features<p>Example Project<p>Example Project Installation<br>• Presets<br>• Playground<p>Requirements<p>Installation<p>Usage<p>Quick Usage<p>Entry Attributes<p>Window …

iOS Programming

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a …

Information Security

Structures vs Classes in Swift

You might have heard that some of the swift native types are being converted from classes to structures. In this article, we’ll explore structures …

Astronomy

How To: Use Charles Proxy to View the Data Your Mobile Apps Send & Receive

If you're using a mobile device, it's a pretty safe bet that your apps are sending lots of information back and forth from their servers. To make …

Information Security

Prevent DNS Rebinding Attacks by Adjusting Your Router

Programmer (and artist) Brannon Dorsey wrote up a fascinating and fairly technical piece about the perils of DNS rebinding the other day. It’s worth …

Information Security

Why Everyone Missed the Most Mind-Blowing Feature of Cryptocurrency

There’s one incredible feature of cryptocurrencies that almost everyone seems to have missed, including Satoshi himself.<p>But it’s there, hidden away, …

Bitcoin

A complete beginners guide to installing a Bitcoin Full Node on Linux (2018 Edition)

How to compile a Bitcoin Full Node on a fresh installation of Kubuntu 18.04 without any Linux experience whatsoever.<p>Preface<p>I recently installed a new …

Linux

The doctor on your wrist: How smartwatches are saving lives

<i>By Caitlin McGarry</i><p>James T. Green thought he was having a panic attack.<p>He took a break from work to walk around the block during a stressful day, and noticed he felt out of breath strolling up a slight incline. This isn't normal, Green thought. He had become an avid cycler in recent months and …

Medical Technology

Hacking macOS: How to Use One Python Command to Bypass Antivirus Software in 5 Seconds

The misconception that macOS is more secure than the Windows operating system is far from the truth. With just one small command, a hacker can …

Cybersecurity

Hacking macOS: How to Create a Fake PDF Trojan with AppleScript, Part 1 (Creating the Stager)

While hackers have taken advantage of numerous vulnerabilities in Adobe's products to deliver payloads to Windows users via PDF files, a malicious …

White Hat

These Crispy Asparagus Fries Are Packed With Flavor — but Are Still Good For You!

<i>Lighten up your fries by swapping heavy potatoes with crunchy asparagus! Spears are tossed in cheesy nutritional yeast and almond meal for a dose of healthy fats and protein, via PaleoHacks.</i><p>Spring is in the air with this garden-fresh French fry alternative. No need to sacrifice flavor to achieve …

Food

100,000 Video Game Players Helped Scientists Prove Einstein Wrong

On November 30, 2016,around100,000 people all over the world logged online and played a video game. Together, they surely would have frustrated …

10 No-Knead Bread Recipes You Can Make With 10 Ingredients or Less

Requiring few ingredients and no kneading at all, these recipes are perfect for the beginner baker.<p>No-knead breads have been around for thousands of …

Hacking macOS: How to Configure a Backdoor on Anyone's MacBook

The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like …

BBQ Chicken Quinoa Bowls — What's Gaby Cooking | Kitchn

Kitchn's Delicious Links column highlights recipes we're excited about from the bloggers we love. Follow along every weekday as we post our …

Chocolate Hummus Is Better Than Cookie Dough—Here’s How to Make it at Home

Not going to lie, when I first heard chocolate hummus was a new thing, I couldn't decide whether it was genius or downright weird. Now that I've made …

Tiny Creatures, Part Plant and Part Animal, May Control the Fate of the Planet

Summer sunlight flickers through warm waters off the coast of Spain. The sea looks calm and peaceful. Near the surface, invisible to the naked eye, a …

Biology

How To: Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing

After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of …