
GPU Fingerprinting Can Track You Online
A clever and alarming way you can be tracked online.
Read More
Computerphile Explains the Mythical Man Month
Many will have heard the phrase ‘Mythical Man Month’ and assume it’s simply about whether manpower and time are interchangeable – the book is really about much more. Professor Brailsford explains how this all relates to the humble byte
Read More
Anonymous Hacks Russian Military
If you want to stay informed of the current threat landscape, you need to subscribe to Seytonic.
Read More
Inside the Hidden Git Folder
Dr Max Wilson takes us through the various elements that make Git such a useful tool.
Read More
Anonymous Hacks China Government Website (Twice)
Top news in the security space. 0:00 Anonymous Hacks China (Again) 2:41 Microsoft Kills Malicious Documents 6:20 Altium Outro
Read More
FBI: “You Should Use A Burner Phone” at the Olympics
Curious. Time stamps: 0:00 FBI Recommends Burner Phones 0:54 Was The Official App Intentionally Weakened? 2:19 Tian*nmen Sq*are 3:15 Surveillance is Only One Problem 3:49 The Successful Olympics Sabotage 5:00 It isn’t just the FBI… 5:31 Free $100 Cloud Computing Credit 6:06 Outro
Read More
Bluetooth Covid Test Kit Gets Hacked
As he says in the video, not everything needs to be computerized. Remember, kids the “S in “IoT” stands for security.
Read More
Is Big Data Getting Too Big?
- Frank
- January 6, 2022
- 1980's
- 80's
- asapscience
- Big Data
- byte
- Computer Science
- Computers
- Data
- Data Center
- data storage
- exabyte
- gigabyte
- information
- information science
- it's ok to be smart
- it's okay to be smart
- its ok to be smart
- its okay to be smart
- itsokaytobesmart
- joe hanson
- PBS
- pbs digital studios
- petabyte
- science
- SciShow
- Smarter Every Day
- Storage
- terabyte
- veritasium
- vsauce
- yottabyte
Exabyte? Petabyte? Yottabyte? What does it all mean? Itβs Okay To Be Smart’s Joe Hanson explains in a retro-themed show.
Read More
Log4J & JNDI Exploit: Why So Bad? – Computerphile
By now, you have certainly heard of the Log4J exploit and that it’s been called the “most critical vulnerability of the last decade.” Dr Bagley and Dr Pound explain why it’s so pervasive.
Read More