View allAll Photos Tagged hacks
Probably 1960s Stella reel to reel portable tape recorder, hacked to convert it to a guitar amplifier. Dimensions (in cm. excluding handle) L30 x H20 x D11. Run on PP9 type battery. Pretty loud and distorts well when cranked full. This is one cool looking baby.
Taz likes to hack into Javscript programs on the Khan Academy website to figure out how they work (and spend a bit more time that he should ...) It is intresting to see how quickly he has learned how to program this way.
We were on of the fields being evacuated. Believe it or not, my tent was absolutely dry! The floor just felt like a waterbed ;)
First Hacks/Hackers Meetup held at Atherton Studio at HPR. Great presentations by Ben Trevino, Jared Kuroiwa and Misa Maruyama.
Kinect hacks instead of your motion controlling an avatar on a screen, you get to control a flipped fighting robot.
This is my latest "3D Hack" experiment. The horizon is all thanks to playing with that nifty "perspective" feature.
Newest Addition to the Geekgasm Station: Hackers Poster (ft. my beloved Angelina "acidburn" Jolie & Johnny Lee "crashoverride/zerocool" Miller)
It moves freely so you can adjust length when you're not pulling on the bottom strap.
I added an airline seat belt buckle to my commuter bag! Check it out here.
4 days toy hacking and circuit bending workshop with a group of 20 students from Willem de Kooning academy, Rotterdam.
ethical hacker ranjan raja
Ranjan Raja, Information Researcher, Computer Forensics and Mobile Forensics Investigator, Linux Architect (Red Hat), Networking and Network Security Expert (Cisco) Having more than 2 years of experience in Ethical Hacking, Network Security, Computer Forensics, Vulnerability Assessment, Penetration Testing, Red Hat Enterprise Linux, Cisco Router and Switch and Service Provider and seo “search engine optimization”, Pursuing his Bachelors (B.Tech) from Punjab Technical University, Punjab with multiple highest level of certification from world’s leading organizations.
Tremendous hands-on working skill set which includes Pentesting,Vulnerability Assessment Cisco Network Infrastructure, Network Securities, Network Exploitation, Red Hat Linux Security.
Good communication & interpersonal skills in addition to excellent Team building & leadership skills. Possesses the ability to build and maintain business relationships with decision makers and influencers.
Conducted more than 30 different training sessions on various topics related to Cyber Security, Ethical Hacking, Forensic Investigations, Linux and Network Security to an audience comprising Students, Corporate Executives, Law Enforcement Personnel, Entrepreneurs and Technical Specialists. He possesses an in-depth knowledge and insight into today's security risks and tomorrow’s potential threats.
His research interests include Computer Security, Networking and Network Security, Data Forensic, and Information Security.
Specialities: Cyber Security, Vulnerability and Penetration Testing, Ethical Hacking, Cyber Crime Investigation, Server Administration, Digital Forensics, Disaster Recovery, Designing Networks and Implementing Network Security