Declared Search Results

News: Meet the Nokia 8 — The First Android Flagship from the Iconic Brand

Long before Apple and Android became household names, Nokia dominated the mobile industry. The Finnish company was one of the first to develop smartphones, and their classic N95 with 2G "high-speed" internet connectivity was declared the "best smartphone ever" by some in 2007. Outside of the US, before the iPhone became all the rage, owning a Nokia phone was a status symbol akin to wearing a Rolex or Omega watch.

News: The People at Boston Dynamics Are Going to Kill Us All

I'm starting to wonder if the people at Boston Dynamics have ever watched a Terminator movie. Not just because the robotics company with the oxymoronic name develops machines that are able to move around environments with animal- and human-like agility, but because the people testing them seem to take such joy in openly antagonizing their creations. It's one thing to tempt fate by creating superhuman robots that could potentially end mankind. You've reached a whole new level of hubris when yo...

How To: Security-Oriented C Tutorial 0x08 - A Trip Down Memory Lane

Before I continue with a topic on strings, we first require some fundamental understanding of how memory works, i.e. what it is, how data looks in memory, etc. as this is crucial when we are analyzing vulnerabilities and exploitation. I highly suggest that your mind is clear and focused when reading the following article because it may prove to be confusing. Also, if you do not understand something, please verify all of your doubts, otherwise you may not completely understand when we touch on...

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

How To: Writing 64-Bit Shellcode - Part 2 (Removing Null-Bytes)

Welcome to the sequel to the latest post on writing 64 bit shellcode! This tutorial will assume that you are aware of everything mentioned in the last one, as I will try to make this tutorial void of formalities and straight to the point! If you have not read the last one, I suggest doing so unless you are familiar with basic assembly programming and system calls. This is by no means rocket science, so therefore I will simply repeat my TL;DR from last time before we get started, so that the a...

How To: Take Control of the Mouse & Keyboard in Python

While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we have complete control over the device. Today, I'm going to introduce to you the PyAutoGUI module, which does just that, and just how much fun you can have with it!

News: Magic Leap Made Me Cry, Probably for the Last Time. Here's Why That's the Good News

A lot of digital ink has been spilled heaping scorn on Magic Leap. Much of that media schadenfreude was due to what some believed were unmet promises versus some of the early hype around the product. Others just seemed to be rubbed the wrong way by the startup's Apple-esque secrecy and penchant for attempting to coin new terms and frameworks for things that were, mostly, already in play.

Analyzing the Hacks: The Girl in the Spider's Web Explained

The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centered around hacker Lisbeth Salander. Of course, with the quick pace of some scenes, the hacks can be hard to follow.

How To: Play the pirate-filled board game Jamaica

Have you ever heard of Jamaica? Of course you have. It's that island right next to Cuba and Haiti. Well, that's not really what I'm talking about though. I'm talking about the board game Jamaica. This video series will show you how to play the board game with a presentation of the playing cards, the game round, the action types, combat, cost of spaces, penury, treasures, and the end of the game.

Understanding Electricity: Nikola Tesla

Nikola Tesla In my opinion, one of the most neglected inventors of all time. The names Edison and Marconi come to mind as familiar, but Tesla? Most think of a car. Few know that Tesla is responsible for alternating current, florescent lights, radar, remote control, generators that preform efficiently, the spark plug, and many others. The U.S Supreme Court declared in 1943 that Tesla, not Marconi, was the true inventor of the radio.

News: Girl Time

Dress up the Jackass guys like women, including high heels. Place them in a rodeo arena. Have the Jackass crew sit at a table in the middle of the rodeo. Act out a bad theatre play with the crew discussing random thing and drinking coffee. Release a bull into the arena to chase down each of the Jackass guys. The last person to leave the arena is declared the winner. The losers get to enjoy a nice cup of bull piss.

News: Metalworker Builds Tiny Marriage-Proposing Robot to Pop the Question for Him

What's the geekiest way to propose to your girlfriend? Make a robot do it for you. As a self-declared dork, RangerX52 wanted to take a simple task like proposing and make it as utterly complicated as possibly—by having a DIY robot do it for him. With knowledge of his lady's infatuation with the childlike personality of GIR, one of the main characters from the animated Invader ZIM series, he went ahead and built a tiny robotic replica of GIR to do his bidding.

News: Supreme Court Deems Violent Video Games Protected Under Freedom of Speech

Video games are the newest major expressive media. As such, their role in society is still being defined continuously. A monumentally important example of this took place yesterday at the US Supreme Court. After a long deliberation, the highest court in the land handed down a decision invalidating a California law banning the sale of violent video games to minors on the grounds that video games are protected speech under the First Amendment, like movies and books.

News: Freakish Fanatical Facts on FarmVille

Get a little perspective on FarmVille hysteria, via FarmVille World, written by tenebrism: Did you know it only took five weeks to make FarmVille?  That it currently has over 80,000,000 users?  That FarmVille farmers outnumber real farmers in the United States by a ration of 80 to 1?

News: The Value and Worth of Daily Positive Affirmations

I've been dealing with emotional difficulty for many years. It started when I had surgery for the epilepsy I was dealing, and quite literally, dying with. Since the surgery on March 28, 1990 I have had no seizures, but I have had plenty of emotional difficulty. Along with that, surviving some traumatic events has added some emotional baggage...in other words struggling...along the way.

Top 10: Best Ethical Destinations for 2011

By Ethical Traveler As the world becomes ever more interconnected, being an ethical traveler becomes both easier and more urgent. Travelers today have access to far more information than we did even 10 years ago. We can observe–almost in real time–the impact that smart or selfish choices, by governments and individuals, have on rainforests and reefs, cultures and communities.

News: Donkey kong

Okay so everyone remembers the classic video game donkey kong right? Well we basically do something along the lines of that. Have a larger person dressed up or painted to look like a gorilla standing at the top of a hill or path that is on a hill, and then have someone else running up the hill while the person dressed as a gorilla throws giant barrels down at them. As the barrels get to the person they have to try and jump over them while running up the hill.

Next Page