• Weekly Cybersecurity Roundup #11

    "Companies spend millions of dollars on firewalls, encryption and secure access devices, and it's money wasted; none of these measures address the weakest link in the security chain." – Kevin Mitnick Build Your Own Botnet - Web App I made… read more »
  • LinuxCheck: Linux information gathering tool

    LinuxCheck is a small bash script for information collection, useful for emergency response on Debian and Centos systems. Features LinuxCheck [1] is a single script able to collect a large set of information: CPU TOP10, memory TOP10 CPU usage boot… read more »
  • Weekly Tech Roundup #10

    "The Internet is a telephone system that's gotten uppity." - Clifford Stoll Is Dark Mode Such A Good Idea? I’ve decided to stop using dark mode across all of my devices, because research suggests that going to the dark side… read more »
  • Bypass sites paywall WITHOUT addons? Is it possible?

    Yes, it is! With just a simple dot! It all began with a Reddit thread [1], in which visitors spoke about a strange bug in The New York Times paywall: Bypass the New York Times article paywall WITHOUT addons by… read more »
  • How to monitor battery healt and optimize power consumption on Windows 10 laptops without additional softwares

    Starting from Windows 8, Microsoft added a useful feature that allows users to monitor laptop battery health. To generate a Battery Report on Windows 10, simply follow this steps: Open a Command Prompt as administrator. To do that, press Windows Key + X… read more »
  • Weekly Privacy Roundup #10

    "I do agree that when it comes to cyber warfare, we have more to lose than any other nation on earth." - Edward Snowden IBM will no longer offer, develop, or research facial recognition technology IBM will no longer offer… read more »
  • Clive Thompson: The Secret History of Women in Coding

    From Ada Lovelace to the reVIVE's team, Clive Thompson traces the history of women in computer programming. In a great article for The New York Times, Clive Thompson retraces the history of women in computer science, starting from Ada Lovelace… read more »
  • Weekly Cybersecurity Roundup #10

    "The problem of viruses is temporary and will be solved in two years." – John McAfee, 1988 SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol Cybersecurity researchers today uncovered a new critical vulnerability affecting the Server Message Block (SMB)… read more »