View allAll Photos Tagged hacks
This is for those who victoriously last well into the wee hours of the morning, who can stoutly hack code until 5 AM. This is for you. For those who don't understand, fear the power of the Code Red, the One True Hacker Power source - it is an economical and tasty battery for your friendly local hacker,
With this stick you can modify your Apple TV without opening the case and removing the hard disk. It contains files from OS X 10.4.8, and while I would prefer to see a completely free and Darwin based stick, this is what is currently available.
This stick is created using the guide on the AwkwardTV wiki (04/16/2007 version): [url deleted as its not public domain.. yet]- all credits go to the authors there (Mactijn, Dobedobedoh, Hblaschka, Bjdraw, Aholtzma, Mikew, Skoops and Jason). I just cobbled it together.
This stick will automatically install and activate the Mac OS X ssh server on your device and also install the Perian Quicktime component (the latter is pretty useless until you install the Files Plugin for Apple TV). After you activated ssh, you can simply copy files to your Apple TV and modify it using tools like WinSCP or PuTTY.
Probably 1960s Stella reel to reel portable tape recorder, hacked to convert it to a guitar amplifier. Dimensions (in cm. excluding handle) L30 x H20 x D11. Run on PP9 type battery. Pretty loud and distorts well when cranked full. This is one cool looking baby.
My early 2007 MacBook Pro is starting to show some signs of wear and tear... so I hacked it with some Sugru!
The plastic coating on the cable was fraying slightly so rather than cover with electrical tape I used Sugru to wrap around and bind the junction. It is still nice and flexible so I can wrap the cable away as normal. Sugru is fine up to a high temperature (silicone) so I hope this will be a good solution.
I'd lost one of the small feet on the back corner of the machine, too. For symmetry I've covered the existing three feet with a little piece of Sugru, and stuck another piece where the missing one was - presto - some nice soft feet for it to stand on.
Taz likes to hack into Javscript programs on the Khan Academy website to figure out how they work (and spend a bit more time that he should ...) It is intresting to see how quickly he has learned how to program this way.
Went to my first rodeo over the weekend. I had so much fun that I went Saturday and Sunday. I'm hooked.
First Hacks/Hackers Meetup held at Atherton Studio at HPR. Great presentations by Ben Trevino, Jared Kuroiwa and Misa Maruyama.
Newest Addition to the Geekgasm Station: Hackers Poster (ft. my beloved Angelina "acidburn" Jolie & Johnny Lee "crashoverride/zerocool" Miller)
ethical hacker ranjan raja
Ranjan Raja, Information Researcher, Computer Forensics and Mobile Forensics Investigator, Linux Architect (Red Hat), Networking and Network Security Expert (Cisco) Having more than 2 years of experience in Ethical Hacking, Network Security, Computer Forensics, Vulnerability Assessment, Penetration Testing, Red Hat Enterprise Linux, Cisco Router and Switch and Service Provider and seo “search engine optimization”, Pursuing his Bachelors (B.Tech) from Punjab Technical University, Punjab with multiple highest level of certification from world’s leading organizations.
Tremendous hands-on working skill set which includes Pentesting,Vulnerability Assessment Cisco Network Infrastructure, Network Securities, Network Exploitation, Red Hat Linux Security.
Good communication & interpersonal skills in addition to excellent Team building & leadership skills. Possesses the ability to build and maintain business relationships with decision makers and influencers.
Conducted more than 30 different training sessions on various topics related to Cyber Security, Ethical Hacking, Forensic Investigations, Linux and Network Security to an audience comprising Students, Corporate Executives, Law Enforcement Personnel, Entrepreneurs and Technical Specialists. He possesses an in-depth knowledge and insight into today's security risks and tomorrow’s potential threats.
His research interests include Computer Security, Networking and Network Security, Data Forensic, and Information Security.
Specialities: Cyber Security, Vulnerability and Penetration Testing, Ethical Hacking, Cyber Crime Investigation, Server Administration, Digital Forensics, Disaster Recovery, Designing Networks and Implementing Network Security