In this video I’ll show you a funny way to protect your SSH server from hackers, script kiddies and Chinese botnets, using Endlessh by Chris Wellons Endlessh (GitHub): https://github.com/skeeto/endlessh
Pwnagotchi is a modern day take on the Tamagatchi of the 90s, but with a Cyber Security twist. This digital pet derives his happiness by sniffing WPA and WPA2 handshakes which can then be run through hashcat to guess the password. Two or more Pwnagotchis in range of each other will communicate and split the workload. The Pwnagotchi can also send its stats back to the internet to rank your Pwnagotchi against other Pwnagotchis from around the world.
The Nintendo Game Boy has a clever form of Anti Tamper that made it difficult for unofficial and bootleg games to be developed for it and it was all thanks to the Nintendo Logo thats displayed when you power on the handheld. Lets take a closer look at the Boot process of the Game Boy.
This Black Box Reads RFID Cards in Your Pocket
APU2, APU3 and APU4 have four 1Ghz CPU cores, pfSense by default uses only 1 core per connection. This limitation still exists, however, a single-core performance has considerably improved. With new BIOS, and settings described below, pfSense can route about 750-800Mbit/s on one connection.
APU2*4 have very performant Intel I210-AT Network Interfaces. These NICs have 4 transmit and four receive queues, being able to work simultaneously on 4 connections. With some fine0tuning, pfSense can take advantage of this and route at 1Gbit when using more than one connection.
Cool projects are rare. Here I found one I want to show to you. An undercover personal communicator. It includes a lot of new technologies: ESP32, Smartphones, LoRa, BLE, GPS, Mesh, and as you see, 3D printing. And it solves a problem which could be seen as a human right: Personal SMS style communication everywhere in the world, without the need for any infrastructure, and without mass surveillance. In addition, it shows the location of all your friends in your group on a map on your Smartphone. Everything open source, of course. How cool is that? Even “Sexycyborg” Naomi Wu likes it.
The Throwing Star LAN Tap is a passive Ethernet tap, requiring no power for operation. There are active methods of tapping Ethernet connections (e.g., a mirror port on a switch), but none can beat passive taps for portability. To the target network, the Throwing Star LAN Tap looks just like a section of cable, but the wires in the cable extend to the monitoring ports in addition to connecting one target port to the other.
The monitoring ports (J3 and J4) are receive-only; they connect to the receive data lines on the monitoring station but do not connect to the station’s transmit lines. This makes it impossible for the monitoring station to accidentally transmit data packets onto the target network.
To combat unlicensed games and win back confidence of retailers in North America and Europe, the NES and all licensed games came with a lockout chip known as the 10NES or CIC. In this episode we take a look at this chip , the clone chip that was developed by Atari and how it took 20 years for the homebrew community to reverse engineer the chip and the challenges they faced.
Qubes OS securely divides a user’s digital life into separate domains (or “qubes”) that are isolated in different virtual machines. This video covers Qubes OS system requirements, installation and setup, along with a demo including workspaces, copying data between Qubes, block device handling, and installing and accessing applications.
You can download and support Qubes OS at: https://www.qubes-os.org/