Esports & Computer Security Blog. For SC2 tournaments see clocks immediately below. Starts with Korean time at upper left, moves west around the world till you end with PDT/PST clock for Anaheim USA. I earn a small referral fee if you click the occasional Amazon links and then purchase item. It does not affect the purchase price. For more information see "Amazon Associates" link below & left of clocks.
Wednesday, July 31, 2013
Hardware Hacking: GTX 570 eGPU on a 2013 11" Macbook Air
From Larry Gadea https://twitter.com/lg/status/362750011655733248
Approx $250 in hardware (not counting Graphics card) instructions at http://forum.techinferno.com/diy-e-gpu-projects/4271-2013-11-macbook-air-win7-sonnet-echo-expresscard-pe4l-internal-lcd-%24250.html#post59391
I really like this idea, been waiting for Thunderbolt to provide external graphics card solution, makes a lot of sense to me, specially if you can fit external hardware in a convenient to transport case.
For those still in school, it might be hard to see the point, but if you have to travel for work, or fit a LAN party in around work schedule, being able to plug external GPU into a laptop or x86 Tablet (something like a Surface Pro/Razer Edge Pro) could make a significant difference to your gaming time.
It certainly isn't for everyone though.
Wednesday, July 24, 2013
Happy 2nd Anniversary at Brick House to TWiT!
Big fan of TWiT, about half the podcasts I listen to are produced by TWiT, appreciate the great work they do.
"On Wednesday, July 24th, TWiT will be celebrating the second anniversary of our move to the TWiT Brick House. At 3PM, we will be recording a special episode of Triangulation with Leo Laporte as the guest, interviewed in-studio by Tom Merritt and Sarah Lane." ~http://inside.twit.tv/blog/2013/7/17/twit-brick-house-2nd-anniversary-72413.html
Wish I lived closer, so I could join their open house, see link above for information on the open house.
"On Wednesday, July 24th, TWiT will be celebrating the second anniversary of our move to the TWiT Brick House. At 3PM, we will be recording a special episode of Triangulation with Leo Laporte as the guest, interviewed in-studio by Tom Merritt and Sarah Lane." ~http://inside.twit.tv/blog/2013/7/17/twit-brick-house-2nd-anniversary-72413.html
Wish I lived closer, so I could join their open house, see link above for information on the open house.
One NFC Ring to Rule Them All
NFC Ring by John McLear
I really hope this is successful, looks like a very practical solution to smartphone security for average people IMHO.
iPhone 4S and newer, and most Blackberry's (with correct settings for MicroSD card) have good device security if locked with strong password, but entering strong password on touchscreens is a major PITA!
I am thinking this would provide a way to use a very strong password, without having to manually enter it all the time, so if your smartphone was lost/stolen, your data would be secure.
Their Kickstarter link http://www.kickstarter.com/projects/mclear/nfc-ring
Their Blog is at http://blog.nfcring.com/
Their Webpage (future main site?) http://nfcring.com/
I like the Rackspace NFC ring Hacker challenge for DEFCON (can win $100 of free hosting) see
http://developer.rackspace.com/blog/steal-my-nfc-ring-data-at-defcon-for-100-dollars-of-free-hosting-with-rackspace.html or http://blog.nfcring.com/uncategorized/rackspace-nfc-ring-challenge/
Thursday, July 18, 2013
Sacriel streaming DayZ
Stream: http://www.twitch.tv/sacriel
Haven't had chance to watch Sacriel stream for some time, IRL getting in the way T_T
Haven't had chance to watch Sacriel stream for some time, IRL getting in the way T_T
So NSA admits they listen to everyone?
http://m.guardiannews.com/world/2013/jul/17/nsa-surveillance-house-hearing:
"John C Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform "a second or third hop query" through its collections of telephone data and internet records in order to find connections to terrorist organizations. "
"A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with."
"John C Inglis, the deputy director of the surveillance agency, told a member of the House judiciary committee that NSA analysts can perform "a second or third hop query" through its collections of telephone data and internet records in order to find connections to terrorist organizations. "
"A three-hop query means that the NSA can look at data not only from a suspected terrorist, but from everyone that suspect communicated with, and then from everyone those people communicated with, and then from everyone all of those people communicated with."
Subscribe to:
Posts (Atom)