This is cute. What better way to diffuse your morning than by figuring out the correct sequence on your bomb clock?
Wake you up every morning with Explosion Sound! To stop the bomb, you have to pull out just one code from three. The safty code is set randomly every morning.
Seems to me popping the batteries out might be the best reaction.
The same site sells a USB SD card reader disguised as a pen.
Such a clever spreadsheet; I wish there were something similar for computer security managers. I suspect it might involve bourbon or shots of tequila instead of wine.
I have been spending a lot of time working on video and voice streaming vulnerabilities.
You would be surprised how at risk companies are today simply by nature of their voice systems, if not properly secured, especially those that try to maintain a globally coherent communications fabric.
What do you get if you mix the dream of a 1980s phreaker with the fantasy of a 1990s blackhat? Today’s multimedia business platforms.
It therefore seems oddly appropriate to read about several personal computer-based multimedia formats that have just been flagged for critical vulnerabilities.
Don’t go—let me explain.
There’s no one else.
Just this hanger-on,
eating in the dark and fearing
for its life. For the life of me
I can’t get rid of it.
It’s feeding at the heartmeat,
making scrimshaw of the bone.
For some reason I wish she had said gnawing….
a blog about the poetry of information security, since 1995