Skip to main content

Home/ Science Technology Society/ Group items tagged Hack

Rss Feed Group items tagged

1More

New Scientist TV: Hack your hand to learn the guitar - 0 views

  •  
    Instead of practicing for hours, a device can now teach you a tune by taking control of your hand (see video above). The system, developed by the University of Tokyo and Sony Computer Science Laboratories, is appropriately named PossessedHand and electrically stimulates muscles in your arm that move your fingers. Tests have shown that the device can help you learn the correct fingering faster but many find the concept unsettling. Would you be willing to have your hand hacked to learn an instrument?
2More

Your own secured pocket server | Indiegogo - 0 views

  •  
    Pocket sized E-Mail server World's first ever private e-mail server that fits in your pocket. Hack free and Rent free cloud storage.
1More

Humanity Needs to Keep Pace with Technology (cont'd) | The Veracious Blog - 0 views

  •  
    When we talk about participation, we have to be a bit more specific. On the publishing side, there's clearly more participation than we've ever seen in the past. But in order for this tidal wave of information to be useful, we need to be able to separate fact from fiction. We need to encourage participation on the receiving end. What we need is evaluating participation. With the breadth of niche information and sources we have the ability to get at the best of what is known on a myriad of topics and contexts. Every niche has its experts and its hacks, its enthusiasts and detractors. But for the remaining 95% of us who are not subject matter experts, deriving the accurate or useful information from the sea of what is available can be complicated, time-consuming and simply unverifiable. We need a way to quantify the value of information, or more specifically, the veracity of information.
1More

Sony network breach shows Amazon Cloud's appeal for hackers | KurzweilAI - 0 views

  •  
    The hackers that brought down Sony's Playstation Network for more than a month used stolen credit cards to rent computing power from Amazon's Elastic Computing Cloud (EC2) to carry out their attack. Personal information, credit cards, and passwords from millions of customers were seized by hackers during the attack. Because computing power can be rented from EC2 anonymously, hacking using the service can be hard to trace. Tracing the attack may require the FBI seeking a search warrant to access Amazon's detailed records of which IP addresses accessed the service at which time, and tracing those IP addresses to homes or businesses. The Playstation Network remains down in Japan due to government concerns over its security.
1More

Anonymous exposes 1,589 internet child porn users OPDarknet | MGx - Musings, Essays & B... - 0 views

  •  
    Anonymous uses its skills to extract user information from darknet websites specializing in child pornography. Tuesday, after hacking into Lolita City, a darknet website used by pedophiles to trade in child pornography, Anonymous released usernames and other information of 1,589 pedophiles trading in kiddie porn. The move comes after the group managed to take down more than 40 pedophile websites last week which were swapping images through the Tor anonymization network. A darknet website is a closed private network of computers used for file sharing. Darknet websites are part of the Invisible Web, sometimes called the Deep Web, containing content that is not part of the Surface Web, which is indexed by standard search engines. Yesterday Pastebin release, Anonymous enthusiasts explain the technical side of how they were able to locate and identify Lolita City and access their user data base. In a prior Pastebin release, Anonymous offers a timeline of events detailing the discovery of the hidden cache of more than 100 gigabytes of child porn associated with Lolita City.
1 - 6 of 6
Showing 20 items per page