Search
Results
Hacking SenseWear / GoWearFit / BodyBugg: A Trivial Activity Classifier (that works!)
The Nitty Gritty: from rpy import * import csv import sys import string from PIL import Image import numpy f=open("tmp/z709a-full-serial-24hr.csv","r") lns = f.readlines() f.close() rdr = csv.reader(lns, delimiter='\t') rx = [x for x in rdr] recs=[[int(y) for y in x[2:-1]] for x in rx if x[0][:3] == '124'] nil=[sys.stdout.write(rx[i][1] + " " + str(foo[i])+"\n") for i in range(0, len(foo))] mrecs=matrix(recs) cl = r.kmeans(mrecs, 3) foo=[[cl['cluster'][i]] + [z for z in mrecs[i].tolist()[0]] for i in range(0, len(mrecs))] cmap=[255, 0, 128] cline=[[cmap[x[0]-1]]*50 for x in foo] cm=numpy.array(cline,dtype='uint8') # Display image Image.fromarray(cm).show()
BodyBugg Hacks: Help is always welcome
Gadget Teardowns - iFixit
Hack a Day
The Harp Project
Twelve ways how hackers bypass your desktop firewall (1 of 3)
Code Golf | Home
Tamper Data :: Firefox Add-ons
Build The COSMAC "ELF" Part 1
One of the pivotal articles that made me who I am.
Handbook of hardware pinouts, cables schemes and connectors layouts @ pinouts.ru
Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security
YouTube - Making an Astrocam from a Webcam
Electronics
XSS (Cross Site Scripting) Cheat Sheet
Web Application Security Consortium - Web hacking Incidents Database (WHID) - The Web Hacking Incidents Database
A/I :: Home
Welcome to Appropedia - Appropedia: The sustainability wiki
HC_Home
Dr. Dobb's | Windows NT System-Call Hooking | julio 22, 2001
Top 15 free SQL Injection Scanners - Security-Hacks.com
EFF: DocuColor Tracking Dot Decoding Guide
This guide is part of the Machine Identification Code Technology project. It explains how to read the date, time, and printer serial number from forensic tracking codes in a Xerox DocuColor color laser printout. This information is the result of research
[ www.try2hack.nl ]
(IN)SECURE Magazine
Undocumented CreateProcess
אתר אבטחת מידע ממשלתי
I-Appliance BBS
Stylistic 3400 links & tips
Ettus Research LLC
The Universal Software Radio Peripheral, or USRP, is device which allows you to create a software radio using any computer with a USB 2 port. Various plug-on daughterboards allow the USRP to be used on different radio frequency bands. Daughterboards are a
THE NEW GUIDE TO PLAYSTATION 2 CD-2-MEM
KeyBoard Hooks - The Code Project - DLLs
Trap CtrlAltDel; Hide Application in Task List on Win2000/XP - The Code Project - System
The Ethical Hacker Network - Home
The Digital Construction Company (TDCC) was formed last year to be the force behind ideas for contributing and giving back to the IT community. TDCC proudly supports The Certified Security Professional Online Magazine as well as this site, The Ethical Hac
Justin’s Flash Blog » H4X0R1Ng the U10 Interface ;)
Want to be able to customize the Flash Lite UI that runs the rest of the device I’ve gotten pretty far, so I thought I’d share what I learned in hopes that others are looking into this and can share what they have learned.
Tips on CallerID info
How to Send Anonymous/Traceless Email » BlogIsEverything.com
Ynet - דו"ח סימנטק: הווירוסים בירידה, גידול בפשיעה המקוונת - מחשבים
Detecting and Removing Trojans and Malicious Code from Win2K
Basic Computer Intrusion Detection and Forensics Checklist
Google Hacking: Ten Simple Security Searches That Work
A chapter excerpted from the book titled "Google Hacking for Penetration Testers" by Johnny Long, Ed Skoudis; Published by Syngress; ISBN: 1931836361; Published: June 2001; Copyright; Pages: 528
CodeFromThe70s.org
poke game cracker - changes the game "money" in the ram