Communications Systems Search Results

News: How to Win a Trip to Explore Antarctica (Sponsored)

Air New Zealand is looking for a spokesperson for the Antarctica: No Ordinary Place, No Ordinary Assignment project, a two-week adventure in Antarctica, where the chosen candidate will join National Geographic photographer Jason Edwards to document environmental issues and important research being conducted by research teams sponsored by Air New Zealand and Antarctica New Zealand.

How To: Send Your Secret Spy Messages Wirelessly Through Light with This DIY Laser Audio Transmitter

Looking to transmit some super-secret audio communications to your other spy buddies? A laser is the perfect tool for getting your sounds heard from a small distance—without anyone intercepting them— even if it's just a cover of your favorite pop song. A laser audio transmitter uses light rather than radio waves to transmit sound. This is a much more secure way to send audio communications because the laser is a focused beam of light, whereas radio waves are not controlled, so they can be pic...

How To: Establish a Remote Desktop connection in Windows XP

This video from Michael presents how to establish a Remote Desktop connection in Windows XP Professional.This type of connection allows you to access your computer via Internet from any place and manage files, local resources, or perform any other remote activity.To establish Remote Desktop connection click Start button, right click My Computer, from the opened menu select Properties. System Properties window will open. Choose Remote tab. Check Remote Desktop - Allow users to remotely connect...

Hack Like a Pro: How to Create a Nearly Undetectable Backdoor with Cryptcat

Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).

How To: Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot. Thanks to free MacOS tools called ReiKey and KnockKnock, we can detect suspicious programs to discover keyloggers and other persistent malware lurking on our system.

News: Why the iPhone X Needs a $25 USB Type-C Cable to Fast Charge

After learning that you'll need to spend at least $74 on a special charger and a USB Type-C Lightning cable to enable fast charging on the new iPhone X and iPhone 8 models, you may be wondering why you can't just use the standard Lightning cable. While we can't answer why Apple didn't include the USB-C cable in the box with their new phones, we can explain why you need USB-C to enable fast charging.

News: This LEGO Mindstorms Submersible Can Be Piloted by Your Xbox Controller

Making little robots with a LEGO Mindstorms NXT set is already cool, but putting one underwater? Now that's just crazy. That didn't stop this engineer, who built a LEGO submarine that can not only maneuver around his fish tank, but can also be remotely controlled with his Xbox controller. The craft has a sealed battery compartment, exposed Power Functions motors, and features real-time communication between it and a laptop using a NXTbee wireless module.

Video: Haptics Make Holograms Touchable on the HoloLens

Imagine wearing your HoloLens, then reaching out to touch a hologram and actually feeling it. Mind blown, right?! Now imagine that same hologram responding to your touch. I don't mean in the way holograms currently respond to an air tap, but a much more refined and precise touch. Maybe you touch a character on the shoulder and it turns around to see you, or maybe you hit a button in the air and it reacts accordingly.

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.

How To: DIY Flanagan Neurophone Lets You 'Hear' Sounds Through Your Skin

In 1958, Patrick Flanagan invented the Neurophone, a device patented in 1962 that allows radio signals to be picked up by the human nervous system. The skin is the organ that receives the signal, converting it into a modulated molecular vibration, which the brain interprets into sound. Basically, it gives one the ability to 'hear' through the skin, making it sound like the audio you're hearing is actually in your head. It's kind of like having headphones in your brain. The only problem was th...

How To: Back Up Your Gmail Account (5 Ways of Archiving Gmail Data)

Last weekend, some unlucky Gmail users inadvertently had their email accounts wiped out. Actually, it was 0.02 percent of all Gmail users—or roughly 40,000 of the 200 million who use the email service, due to an "unexpected bug" which affected copies of the data. Gmail does make backup files of everything, so eventually everyone will reclaim their email history. In fact, as of yesterday, Google has successfully restored all information from their backup tapes and has started returning everyon...

News: Unencrypted Air Traffic Communications Allow Hackers to Track & Possibly Redirect Flights

Considering how often many of us fly on commercial airlines, the idea that a hacker could somehow interfere with the plane is a very scary thought. It doesn't help to learn that at Defcon, a researcher found that the Automatic Dependent Surveillance Broadcast (ADS-B), transmissions that planes use to communicate with airport towers are both unencrypted and unauthenticated.

How To: Get System Restore to use less disk space in Windows 7

In this video tutorial, viewers learn how to make the System Restore feature use less space in Windows 7. Begin by clicking on the Start menu. Right-click on Computer and select Properties. Under Tasks, click on System protection. In the System Properties window, select the hard drive and click Configure. Under Disk Space Usage, drag the slider to the left for a lower amount. Then click on Apply and OK to confirm. This video will benefit those viewers who have a Windows 7 computer and would l...

How To: Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend the usability of an app, but it can also open up critical vulnerabilities that allow it to be compromised by an attacker.