Computers

Mathematics

Computerphile Explains the Mythical Man Month

Many will have heard the phrase ‘Mythical Man Month’ and assume it’s simply about whether manpower and time are interchangeable – the book is really about much more. Professor Brailsford explains how this all relates to the humble byte

Read More
Developer DevOps

Inside the Hidden Git Folder

Dr Max Wilson takes us through the various elements that make Git such a useful tool.

Read More
Security

Anonymous Hacks China Government Website (Twice)

Top news in the security space. 0:00 Anonymous Hacks China (Again) 2:41 Microsoft Kills Malicious Documents 6:20 Altium Outro

Read More
Security

FBI: “You Should Use A Burner Phone” at the Olympics

Curious. Time stamps: 0:00 FBI Recommends Burner Phones 0:54 Was The Official App Intentionally Weakened? 2:19 Tian*nmen Sq*are 3:15 Surveillance is Only One Problem 3:49 The Successful Olympics Sabotage 5:00 It isn’t just the FBI… 5:31 Free $100 Cloud Computing Credit 6:06 Outro

Read More
IoT Security

Bluetooth Covid Test Kit Gets Hacked

As he says in the video, not everything needs to be computerized. Remember, kids the “S in “IoT” stands for security.

Read More
Java Security

Log4J & JNDI Exploit: Why So Bad? – Computerphile

By now, you have certainly heard of the Log4J exploit and that it’s been called the “most critical vulnerability of the last decade.” Dr Bagley and Dr Pound explain why it’s so pervasive.

Read More