Another super interesting thing I found: https://f3mhack.org The lack of women, queer and trans persons, and diversity in technological fields in general and hacking more specifically is acute. To change this state of affair, critical approaches towards technologies, the tech/hacking culture, among others are needed. Looking at gender issues is admittedly important, but we must […]Continue Reading... No Comments.
A quite interesting post that I found: http://www.prooffreader.com/2015/05/most-characteristic-words-in-pro-and.htmlContinue Reading... No Comments.
The idea is simple, ask 250 random people from a chatting website their opinion of feminism. In particular, the question was “What do you think of feminism?”. We ask the question and leave two random strangers to discuss about it (without any possibility of intervention from our side). The results are of course overwhelmingly bad: […]Continue Reading... No Comments.
might be interesting for the ones in Athens.Continue Reading... No Comments.
Messaging, either using your computer or smartphone is becoming a big deal lately in terms of security and privacy. Whether you are discussing with a friend for this cool queer movie you saw, or for details about a demonstration you are organizing, you might want to do this without making it really easy for organizations […]Continue Reading... No Comments.
Printed in 500 copies. December 2014. Feel free to spread the word :)Continue Reading... No Comments.
Did you know that you can search but instead of text use images? This is called reverse image search and might be handful in several cases. For instance when you search for the original creator of a photo, painting, or whatever. In addition, it can also be used to check if a profile of […]Continue Reading... No Comments.
Did you know that whenever you take a (digital) photo your camera usually saves (in the photo) a bunch of additional private (meta-)data? Most of this can be usually found in the properties of the respective file. An example is show bellow: This is called EXIF (i.e., Exchangeable image file format; also see http://en.wikipedia.org/wiki/Exchangeable_image_file_format), […]Continue Reading... No Comments.
Super cool (:Continue Reading... No Comments.
Penetration testing is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. Basically, this means that you might have a website, that you created manually (or used a CMS, e.g., Joomla, Drupal, etc.), and wonder if it is possible for a […]Continue Reading... No Comments.