background preloader

Open source blogs

Facebook Twitter

Online Mirror of the Encyclopedia of Graphics File Formats: Table of Contents. Tutorial: Skin Detection Example using Python and OpenCV. So last night I went out for a few drinks with my colleague, James, a fellow computer vision researcher who I have known for years.

Tutorial: Skin Detection Example using Python and OpenCV

You see, James likes to party. He’s a “go hard” type of guy. He wanted to hit every single bar on Washington St. (there’s a lot of them)…and then hit ‘em again on the way back. It’s safe to say that by the end of the night that James was blotto. Anyway, it was getting late. 1:47am, to be exact. Aprende a codificar. The Next Big Programming Language You’ve Never Heard Of. Getty Andrei Alexandrescu didn’t stand much of a chance.

The Next Big Programming Language You’ve Never Heard Of

The Ultra-Simple App That Lets Anyone Encrypt Anything. Original illustration: Getty Encryption is hard.

The Ultra-Simple App That Lets Anyone Encrypt Anything

When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video. Nadim Kobeissi wants to bulldoze that steep learning curve. At the HOPE hacker conference in New York later this month he’ll release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds. Is This The Crowdfunding Site App Developers Have Been Wishing For? The basic idea behind Bountysource seems easy enough to explain--it’s a crowdfunding site for open source software.

Is This The Crowdfunding Site App Developers Have Been Wishing For?

But when the site first launched about a decade ago, those were still fairly esoteric concepts for potential users and investors. Even the founders, then fresh out of college, had never heard the term “crowdfounding,” says cofounder and COO David Rappo. The project died fast. The Next Big Thing You Missed: A Social Network That Could Truly Reform Our Schools. Photo: Getty The federal government has spent 12 years trying to impose reform on primary and secondary schools from above, using things like financial incentives and standardized tests.

The Next Big Thing You Missed: A Social Network That Could Truly Reform Our Schools

Edmodo is working from the other direction, hoping to improve our schools from the bottom up. Edmodo is a social network specifically designed for primary and secondary schools, offering a way for teachers to more easily assess students and trade tips. At a time when many teachers feel hamstrung by standardized tests and associated performance standards, Edmodo helps them exchange techniques in a peer-to-peer, ad hoc fashion. It also provides a relatively unfettered playground where they create and share educational videos and software that can compete with the Facebook posts, texts, YouTube videos, and others things that distract students from their work.

How to Anonymize Everything You Do Online. One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

How to Anonymize Everything You Do Online

But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. “Hide in the network,” security guru Bruce Schneier made his first tip for evading the NSA. “The less obvious you are, the safer you are.” Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito.

Email. Certified Ethical Hacker, Information Security Certifications, Computer Security Training, Network Security Courses, Internet Security, Hacking. WPA/WEP/WPA2 Cracking Dictionary Wordlist - Tricks Ninja. Cool Tips and Tricks. Tricks Ninja. Latest Hacking News. How to become Professional Hacker. IEEE Spectrum: Technology, Engineering, and Science News.

EEP - Electrical Engineering Portal. Top 10 Android Apps That Turn Your Phone into a Hacking Device. 1.SpoofApp SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone.

Top 10 Android Apps That Turn Your Phone into a Hacking Device

It's a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009. 2.Andosid The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. 3.Faceniff Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. 4.Nmap Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a "map" of the network. 5.Anti-Android Network Toolkit.

Here Are Top 20 Hacking Forums! Open Source For You - The Complete Magazine on Open Source. Electronics Projects Circuits. Open source electronic projects.