Black Hat hacker gains access to 4 million hotel rooms with Arduino microcontroller
Posted on | July 25, 2012 | No Comments
Bad news: With less than $50 of off-the-shelf hardware and a little bit of programming, it’s possible for a hacker to gain instant, untraceable access to millions of key card-protected hotel rooms. Read more
Also there is his personal paper site here
Java: Speed of Math
Posted on | July 15, 2012 | No Comments
Java: Speed of Math
by ROYVANRIJN on JULY 15, 2012
Last week I’ve created a ray marcher 3d engine which renders the Mandelbulb. And I’ve translated it into pure Javascript a couple of days later. After the translation I decided I should optimize the code a little for speed, so I made some speed improvements in the Javascript code. The main optimization was using an array for the vector3d instead of a class/function. Read more
We’re no strangers to code golf, you know the rules, and so do I
Posted on | June 3, 2012 | No Comments
Write the shortest program that prints the entire lyrics of “Never Gonna Give You Up” by Rick Astley.
Rules:
Must output the lyrics exactly as they appear in the above pastebin. Here’s the raw dump: http://pastebin.com/raw.php?i=wwvdjvEj
Cannot rely on any external resources – all lyrics must be generated by / embedded in code.
No use of existing compression algorithms (e.g. gzip / bzip2) unless you include the full algorithm in your code.
Use any language, shortest code wins.
British MPs want Google to censor certain search results
Posted on | March 28, 2012 | No Comments
http://www.ubergizmo.com/2012/03/british-mps-want-google-to-censor-certain-search-results/
Google’s search engine is a pretty popular search tool and is undoubtedly one of the most popular search engines around, but it seems that while you can pretty much search for anything on Google, a committee of MPs in the UK have decided that the best way…
THC-SSL-DoS is a tool to verify the performance of SSL.
Posted on | October 26, 2011 | No Comments
Establishing a secure SSL connection requires 15x more processing power on the server than on the client. THC-SSL-DOS exploits this asymmetric property by overloading the server and knocking it off the Internet. This problem affects all SSL implementations today. The vendors are aware of this problem since 2003 and the topic has been widely discussed. This attack further exploits the SSL secure Renegotiation feature to trigger thousands of renegotiations via single TCP connection.
read more
NetcraftSurveyAgent/1.0
Posted on | September 29, 2011 | No Comments
50.17.122.30 - - [23/Sep/2011:16:17:45 +0300] "HEAD / HTTP/1.1" 200 - "http://www.netcraft.com/survey/" "Mozilla/4.0 (compatible; Netcraft Web Server Survey)"
% host 50.17.122.30 30.122.17.50.in-addr.arpa domain name pointer ec2-50-17-122-30.compute-1.amazonaws.com.
107.20.43.220 - - [26/Sep/2011:22:58:44 +0300] "GET / HTTP/1.0"
200 9534 "-" "Mozilla/5.0 (compatible; NetcraftSurveyAgent/1.0; +info@netcraft.com)"
% host 107.20.43.220 220.43.20.107.in-addr.arpa domain name pointer ec2-107-20-43-220.compute-1.amazonaws.com.