Remove Examples Remove Mining Remove Video Remove Workshop
article thumbnail

2023 Archive-It Partner Meeting Recap

Archive-It

Then Taylor Leigh spoke to us on video specifically to the Wildcats Histories project funded by that grant that engaged with the student activist population through web archiving workshops, exhibits, and documenting their content creation. Karl Blumenthal demonstrates Voyant for text mining analysis on ARCH datasets.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Fortunately, that didn't include driving functions, but it did include the ability to remotely manage the climate control and as you can see in the video embedded in that post, I warmed things up for my mate Scott Helme from the other side of the world whilst he sat there on a cold, damp, English night.

IoT 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

So in this episode, I'm going to share some of the conversations I've had with leaders of some of those more established villages over the last 50 episodes of the hacker mine. For example, I have a laptop and it runs Linux so I can get into network security. For example. This year, there are over 30 distinct villages available.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. There are literally dozens of other examples. Yeah but aren't there examples of stalkerware that didn't require physical contact with the device.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

In fact, those guys are all pretty good examples of the ability to build amazing things from the ground up and I'm sure that many of you reading this have sat down and started building something with the same enthusiasm as, say, Zuckerberg did with Facebook in 2004. Just over 2 years ago, my wife (Kylie) had spinal surgery. (I'm

Education 111
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

For example, I was regularly asked if I'd ever received any legal threats which is apparently pretty normal for any M&A process, but you can imagine why it'd be particularly interesting when dealing with a heap of data originally obtained via illegal methods. of the company. Collectively, we agreed to put pens down.

IT 136
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

And there are the governments around the world using it to protect their departments , the law enforcement agencies leveraging it for their investigations and all sorts of other use cases I never, ever saw coming (my legitimisation of HIBP post from last year has a heap of other examples). That's number 1 on the list here for a reason.