Category Archives: Articles

  • Back to reality: asking random people about feminism

    The idea is simple, ask 250 random people from a chatting website their opinion of feminism. In particular, the question was “What do you think of feminism?”.We ask the question and leave two random strangers to discuss about it (without any possibility of intervention from our side).The results are of course overwhelmingly bad: In 49 […]

    Post Tagged with , ,
    Continue Reading...
  • [On the security and privacy of] messaging tools

    Messaging, either using your computer or smartphone is becoming a big deal lately in terms of security and privacy. Whether you are discussing with a friend for this cool queer movie you saw, or for details about a demonstration you are organizing, you might want to do this without making it really easy for organizations […]

    Post Tagged with , , ,
    Continue Reading...
  • This photo reminds me of something [or just a small hint on reverse image searches]

    Did you know that you can search but instead of text use images? This is called reverse image search and might be handful in several cases. For instance when you search for the original creator of a photo, painting, or whatever. In addition, it can also be used to check if a profile of someone contacting […]

    Post Tagged with
    Continue Reading...
  • Photos, privacy and the weird EXIF data

    Did you know that whenever you take a (digital) photo your camera usually saves (in the photo) a bunch of additional private (meta-)data? Most of this can be usually found in the properties of the respective file. An example is show bellow: This is called EXIF (i.e., Exchangeable image file format; also see http://en.wikipedia.org/wiki/Exchangeable_image_file_format), and can […]

    Post Tagged with , ,
    Continue Reading...
  • Homophobic wireless networks?

    When I left for germany I said well at least It will be better in terms of homophobia. I guess germany can’t even get close to the “glory” of greece, but it is quite shitty too.Anyway, new neighbor’s wireless shouting I am homophobic and I want everyone to know (along with other stupid ones like […]

    Post Tagged with
    Continue Reading...
  • Get out of my network!

    In this “guide” I will try to explain how an attacker can gain access to your Wireless Network, and suggest ways you can protect yourself.Firstly, I will not talk here about whether sharing your internet connection with your neighbors, or whoever passes by, is a good idea or not. This would be indeed an interesting […]

    Post Tagged with ,
    Continue Reading...
  • Reducing your beloved SPAM

    One of reason for the spam you get, are all these websites that, for no particular reason, require a registration – and thus your email. It could be a random forum where you are searching for something or whatever that “offers” “free” registration.There are two plus one ways you can avoid this: Well, firstly you […]

    Post Tagged with , ,
    Continue Reading...
  • Please, no more porn adds!

    The scenario is pretty common. I am searching for something (torrent or whatever) and I end up in a website where a gazillion of photos of naked women pop up. Except from the obvious (offensive content), in many cases these adds could also harm your computer in a multitude of ways.Well, no thanks! So this […]

    Post Tagged with , , ,
    Continue Reading...
  • Removing clothing (ink) security tags (without ruining the cloth)

    Before I begin, YES this is not hacking, with the cyber-security definition, but its definitely  fun :)And no this is neither a method for stealing clothes, since 1. it is considered illegal 2. the fumes would probably trigger the fire alarm 3. someone could smell this and turn you in.So, I don’t know about you, […]

    Post Tagged with ,
    Continue Reading...
css.php