Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 4 Comments

We recently had a contest following our release of the Raspberry Pi builds to see what our users could do with Raspberry Pi for fun projects. This is Espen. Espen, maybe you wanna say what this is. This is my contribution for this competition. This is a coffee monitoring solution. It’s for figuring out how

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , 100 Comments

What if I told you that there is a special chip in your computer that has absolute control over your entire system, is remotely accessible, has secret proprietary code that you can’t look at, and there’s no way to disable it? Well, it’s true, and it’s scary. Let me introduce you to two things you’ve

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , 100 Comments

How’s it going guys I’m Thio Joe now you may remember way back in March of this year I made a video called is your CPU spying on you it might sound a little bit Sensationalist and it had to do with two different types of technologies first is the Intel management engine and also

Read More

Articles, Blog , , , , , , , , , , 1 Comment

Alright! Welcome to another episode of the OSINT Curious podcast Or, to the OSINT Curious project webcast. How about that? Thank you for joining us. We’ve got a special guest this week & we’ve got a couple of other people from the OSINT Curious project as well, so we’ll go around and introduce ourselves. Tracy,

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , 100 Comments

Encryption is the process of taking a message and scrambling it’s contents so that only certain people can look at your message. There are two types of encryption: symmetric and asymmetric encryption. Let’s first take a look at symmetric encryption to understand why asymmetric encryption was created. To do that, let me introduce you to

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , 1 Comment

Welcome to Episode #238 of CxOTalk. I’m Michael Krigsman, industry analyst, and your host. I want to thank Livestream for being our video streaming partner because those guys are great. And if you go to Livestream.com/CxOTalk, they will give you a discount. Today on CxOTalk, we are speaking about one of the most important topics

Read More

Articles, Blog , , , , , , , , , , , , , , , , , , , , , 90 Comments

All right, thank you everybody for coming out. This is “How Do I Tails?: A Beginner’s Guide to Anonymous Computing”. First off, I’d like to thank the EFF for providing an awesome space and the opportunity to be able to talk and help share this information with you guys. It is a little strange to

Read More

Articles, Blog , , , , , , , , , 0 Comments

Top 12 Smart Computing Tips What is the combination for safeguarding personal data and UW’s institutional information? 1. Update and patch 2. Antivirus 3. Passwords 4. Be selective 5. Know your data 6. Back up data 7. Encryption 8. Use caution with links 9. Lock your workstation 10. Use https 11. Check privacy settings 12.

Read More

Articles , , , , , , , , , , , , , , , , , , , , , , , , , , 10 Comments

SPEAKER: This is CS50. DAVID MALAN: Hello, world. This is episode two of the CS50 podcast. My name is David Malan,and I'm here with– COLTON OGDEN: Colton Ogden. You know, in the last couple episodes–just to get us kicked off here– we've had this theme of robocalls. And recently I haven't been receivingany robocalls– at

Read More