Sign Search Results

How To: Tell a number story in American sign language

One of the fun and special traditions enjoyed and shared by the Deaf Community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Tell an American sign language abc story

One of the fun and special traditions enjoyed and shared by the deaf community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 10 (Identifying Signatures of a Port Scan & DoS Attack)

Welcome back, my budding hackers! As I have mentioned many times throughout this series, knowing a bit of digital forensics might keep you out of a lot of trouble. In addition, digital forensics is a burgeoning and high paying career. Some knowledge and certifications in this field will likely help you land a Security Engineer position or put you on the Incident Response Team at your employer.

Prev Page