The idea is simple, ask 250 random people from a chatting website their opinion of feminism. In particular, the question was “What do you think of feminism?”. We ask the question and leave two random strangers to discuss about it (without any possibility of intervention from our side). The results are of course overwhelmingly bad: […]Continue Reading... No Comments.
Messaging, either using your computer or smartphone is becoming a big deal lately in terms of security and privacy. Whether you are discussing with a friend for this cool queer movie you saw, or for details about a demonstration you are organizing, you might want to do this without making it really easy for organizations […]Continue Reading... No Comments.
Did you know that you can search but instead of text use images? This is called reverse image search and might be handful in several cases. For instance when you search for the original creator of a photo, painting, or whatever. In addition, it can also be used to check if a profile of […]Continue Reading... No Comments.
Did you know that whenever you take a (digital) photo your camera usually saves (in the photo) a bunch of additional private (meta-)data? Most of this can be usually found in the properties of the respective file. An example is show bellow: This is called EXIF (i.e., Exchangeable image file format; also see http://en.wikipedia.org/wiki/Exchangeable_image_file_format), […]Continue Reading... No Comments.
When I left for germany I said well at least It will be better in terms of homophobia. I guess germany can’t even get close to the “glory” of greece, but it is quite shitty too. Anyway, new neighbor’s wireless shouting I am homophobic and I want everyone to know (along with other stupid ones […]Continue Reading... No Comments.
In this “guide” I will try to explain how an attacker can gain access to your Wireless Network, and suggest ways you can protect yourself. Firstly, I will not talk here about whether sharing your internet connection with your neighbors, or whoever passes by, is a good idea or not. This would be indeed an […]Continue Reading... No Comments.
One of reason for the spam you get, are all these websites that, for no particular reason, require a registration – and thus your email. It could be a random forum where you are searching for something or whatever that “offers” “free” registration. There are two plus one ways you can avoid this: Well, firstly […]Continue Reading... No Comments.
The scenario is pretty common. I am searching for something (torrent or whatever) and I end up in a website where a gazillion of photos of naked women pop up. Except from the obvious (offensive content), in many cases these adds could also harm your computer in a multitude of ways. Well, no thanks! So […]Continue Reading... No Comments.
Before I begin, YES this is not hacking, with the cyber-security definition, but its definitely fun :) And no this is neither a method for stealing clothes, since 1. it is considered illegal 2. the fumes would probably trigger the fire alarm 3. someone could smell this and turn you in. So, I don’t know […]Continue Reading... No Comments.