Adorable Pwnagotchi
Adorable Pwnagotchi
Image from kienthuc

Pwnagotchi is an A2C-based AI, powered by bettercap and running on a Raspberry Pi Zero W, that learns from its surrounding Wi-Fi environment to maximize crackable WPA key material it captures, either through passive sniffing or by performing de-authentication and association attacks. This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs.

It also has an adorable user interface that displays different “moods” depending on what it’s doing and echoes the Tamagotchi digital pets of the 90s. The idea is for its user…


Lenovo ThinkPad P1
Lenovo ThinkPad P1
Image by Lenovo from CNET

Laptop batteries are built to handle certain charge cycles, usually somewhere around five hundred full cycles and sometimes even more. Essentially, a charge cycle equals one full discharge down to zero percent and then a recharge back up to one hundred percent.

A discharge down to fifty percent and then back to one hundred percent would equal half a cycle. Over time, each charge cycle decreases a battery’s capacity from its design specifications, meaning that the fewer times you drain it, the longer the battery lasts, all other things being equal.


Hormone therapy stock photo
Hormone therapy stock photo
Image by Kentoh from iStock

Biohacking is applying the hacker ethic to improve your own body with do-it-yourself cybernetic devices or to introduce biochemicals into the body to enhance or change your bodies’ functionality. Many biohackers identify with the biopunk movement, open-source transhumanism, and techno-progressivism. Biohacking emerged in a growing trend of non-institutional science and technology development.

The term can also refer to managing one’s own biology using a combination of medical, nutritional and electronic techniques. This may include the use of nootropics, non-toxic substances, and cybernetic devices for recording biometric data. This can be described as do-it-yourself biology. …


Hand destroy wall
Hand destroy wall
Image by RomoloTavani from iStock

So this is quite entertaining. U.S. retailer GameStop is a large chain that sells physical media of video games and related products. Since physical media is going the way of the Dodo with everything moving to direct digital downloads, its revenues have been negative, and its share price slumped as you would expect.


Join the great folding@home coronavirus race
Join the great folding@home coronavirus race
Image by Ryan Smith from Anandtech

Folding@home is a distributed computing project currently based at the Washington University in St. Louis School of Medicine for performing molecular dynamics simulations of protein dynamics. Its initial focus was on protein folding but has shifted to more biomedical problems, such as fighting Alzheimer’s disease, cancer, Coronavirus Disease 2019 (COVID-19), and Ebola.

The project uses the idle processing resources of personal computers owned by volunteers who have installed the software on their systems. …


Neuromancer
Neuromancer
Image by Rafael Moco from ArtStation

In 1980s Cyberpunk science fiction, a cyberdeck is a device used to access the virtual representation of Cyberspace. It is a simulated, “consensual hallucination” that facilitates the handling and exchanging of massive data, humanity’s extended electronic nervous system. The deck is connected to a tiara-like device that uses electrodes to stimulate the user’s brain while drowning out other external stimulation.

A standard cyberdeck is about the size of a paperback book, is made of plastic and weighs about half a kilogram. A standard trope in the fiction was users with these devices testing and penetrating data networks via this virtual…


What is a brute force attack?
What is a brute force attack?
Image by mrsecurity from mrsecurity

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. In a standard attack, an attacker chooses a target and runs possible passwords against that username. These are known as dictionary attacks.

Automated tools are also available to help with brute-force attacks, with names like Brutus, Medusa, THC Hydra, Ncrack, John the Ripper, and Aircrack-ng. Many can find a single dictionary word password within one second. …


Man and woman going to lift barbells
Man and woman going to lift barbells
Image by FlamingoImages from iStock

Over the last few years, I’ve picked up the activity of barbell strength training and trained in the sport of powerlifting. Starting from being unable to correctly lift the empty 20kg/45lbs standard Olympic bar, I’ve progressed to what is generally regarded as an intermediate level of strength.

That is being able to overhead press 60kg/138lbs, bench press 100kg/220lbs, squat 140 kg/309lbs, and deadlift 180 kg/399lbs comfortably for 5 repetitions or so at a bodyweight of 93 kg/205 lbs; what is referred to on fitness and bodybuilding forums as 1/2/3/4 plates for reps (based on the amount of 20kg/45lb plates loaded…


What is a rootkit?
What is a rootkit?
Image by Paolo Tarsitano from Cyber Security 360

A rootkit is a collection of software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed, for example, to an unauthorized user, and often masks its existence or the existence of other software. It is software used by a hacker to gain constant administrator-level access to a computer or network. Today rootkits are generally associated with malware such as trojans, worms, viruses that conceal their existence and actions from users and other system processes.


Secure data exchange
Secure data exchange
Image by C-Data Exchange from CIT

Web application security is a central component of any web-based system. The global nature of the Internet exposes web properties to attack from different locations and various levels of scale and complexity. Web application security deals specifically with websites, web applications and web services such as APIs.

This article covers basic securing of access to your web application or service using an Nginx reverse proxy, HTTP authentication, Transport Layer Security encryption with certificates from Let’s Encrypt, and the Uncomplicated Firewall commonly used with Debian based Linux distributions.

Syed R Ali

Londoner, desi, financial technologist, geek, weight training & combat sports junkie.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store