Links
AddWelcome back to Week in Review. This week, we're coming at you right off the heels of TechCrunch Disrupt! If you missed it, we’re highlighting
Here, you'll find a list of free, open-source cybersec tools that are ready to be added to your organization's arsenal.
Ever wanted to play the worlds second most popular videogame without actually playing it? Well, I will guide you through it! First of all, what do I mean by 'Pl
AWS Config enables continuous monitoring of your AWS resources, making it simple to assess, audit, and record resource configurations and changes. AWS Config does this through the use of rules that define the desired configuration state of your AWS resources. AWS Config provides a number of AWS managed rules that address a wide range of […]
Ransomware is one of the biggest scourges we face as Internet citizens today. What happens when you have been struck by it? The most obvious option would be to pay the ransom. You would not be alone if you did – even lar…
Electric Power Monitor. Residential and Commercial. Single, split and three-phase. Any voltage. Local data storage and analysis and also upload to your cloud service. Economical. Ships worldwide, in use in dozens of countries on four continents.
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
I recently learned an interesting fact about Fibonacci numbers while watching a random number theory video on YouTube. Fibonacci numbers can be used to approximately convert from miles to kilometers and back. Here is how. Take two consecutive Fibonacci numbers, for example 5 and 8. And you're done converting. No...
We invent groundbreaking, original toys that fascinate, delight, and educate.
All the resources you need to give yourself a world class computer science education
Internet Archive's "The Wayback Machine" has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.
Turning Outlook into a keylogger via VBA macros
I work from home everyday, I am susceptible to eye strain, eye pain, and dizziness. Having a working environment that’s as easy on my eyes as possible is of critical importance. I'd like to share what I've learned over the years in hopes that it can be helpful to you if you work from home, and like many, have experienced WFH eye strain.
This post isn’t a detailed line-by-line tutorial on how to set up each individual piece of the setup as those types of guides tend to get out of date really easily, but if you know your way around Linux and the command line, then you can definitely replicate this setup on your own. Over the past few years I’ve been interested in learning about how much energy my computing setup and home appliances use. I’ve used a simple digital energy meter before to get instantaneous readings, but that was not ideal for monitoring how an electrical appliance consumes power over a longer time period.
May 23, 2022: This blog post is out of date. Please refer here for current info: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS made it easier to use […]
A wise colleague once told me I should never have anything on in the background just to have it on. He’s probably right, but I still like to pop on a show