Remove 2013 Remove Examples Remove Exercises Remove Libraries
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. There's a smart IoT enabled toothbrush for example, I mean, a toothbrush is a stick with bristles. Vamosi: The book Practical IoT Hacking is full of useful examples.

IoT 52
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. There's a smart IoT enabled toothbrush for example, I mean, a toothbrush is a stick with bristles. Vamosi: The book Practical IoT Hacking is full of useful examples.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Working internationally

CILIP

John Dolan and Ayub Khan have long shared an interest in the international library scene and how different countries and cultures can share and benefit from each other. Our involvement started when we answered a British Council advertisement, in October 2014, for help with reinstating libraries in Lahore and Karachi, Pakistan.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

Vamosi: One sunny morning in 2013. In the very quiet science fiction section of the Glen Park Public Library in San Francisco. SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Why glorify the criminal hackers? I mean, they’re criminals, right? Not so easy.

Privacy 52
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

It will ensure that libraries can continue to archive material, that journalists can continue to enjoy the freedoms that we cherish in this country, and that the criminal justice system can continue to keep us safe. Withdrawal from the EU means that we stand to lose the institutional platform from which we have exercised that influence.

GDPR 120
article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Visual Studio Code, for example, is open source. Most of the libraries HIBP uses are open source. For example, people have often questioned whether I'm logging searches in order to build up a new list of email addresses. Open Source is Everywhere A heap of really amazing projects are open source these days.

Passwords 145