The Milky Way season kicked-off prematurely this year; astrophotographers planned late night trips at 4:30AM after its rise and just a few minutes before sunrise.
VPNs are pursued by privacy-seekers to circumvent surveillance, but not all VPNs are created equal and few of them are private. As an example, "Onavo Protect" is a Free, popular and a very handy VPN, no privacy seeker is advised to use it because it leaks some data and enables tracking.
If you run or own a website that doesn't enforce HTTPS, browsers will soon flag it as 'Not secure' (simply because it isn't). It's time to enforce HTTPS.
Many online shoppers purchased from online stores ended up giving away their money to websites that turned out being either fraudulent or non-existing.
A group of enthusiastic techies from Beirut recently launched a not-for-profit co-working hub and startup studio, that aims to build a community of freelancers, independent workers, entrepreneurs and startup teams.
Because we don't know what we don't know. Because if things are working doesn't mean they are working securely. Because if things are working securely doesn't mean they will always work securely.
We are living the post-password era. All those accounts we daily create, enclose us between a password that is 'easy' to remember and hard to 'guess'.
Hacking is the art and skill of reverse engineering, re-engineering, creating, patching, modding and upgrading things into a more useful state.
Originally posted on StepFeed: "A Lebanese amateur photographer, who goes by the moniker Moophz, has just released a time-lapse video compilation that he had shot between Lebanon and Iceland."
Photo of the Total Lunar Eclipse taken from the Cedars of Chouf in Lebanon on the 27th of September 2015.
Put some good people in a lab (here Niantic Labs), split them into competing teams, give them incrementing powers, make them feel they earn it, watch those 'Good' people turn 'Evil' and how they start abusing their powers against each other in a sadistic manner.
We encountered another twilight this morning after our first Aurora hunting overnight, we returned back to our hotel to recharge our batteries and inject some blood in our caffeine systems, just before shooting a 98.7% Solar Eclipse.
36 seconds after takeoff we were already above the sea, we heard the sound of two brutal explosions from the engine underneath, the aircraft started shaking and vibrating, it also smelled burning from the inside. The situation escalated quickly when the "EXIT" signs lit.
This timelapse was shot in Lebanon at Bcharre cedars during the occasional Camelopardalids meteor shower on May 24 2014 - Not eveyrthing moving in this video is a meteor.
Due to the solemnity of the recently discovered security loopholes (stated subsequently), 2014 is nominated to be the year of credential theft, online payment fraud and privacy violation.
People don't ship with user manuals, whether you dated on purpose or by mistake the `security gal` or `security guy` this will guide you through the do's and don'ts to tweak and maintain a sustainable relationship, full of joy and all those shits.
Today featured a partial solar eclipse and here are my shots.
Yesterday's moon underwent a Penumbral Eclipse, this happens when the moon passes through the earth's penumbra (earth's secondary shadow). Seen from earth, the moon's dish showed subtle changes and got gradually darker from one side.
Bonopha/Kyoob7 is a pyramid scheme. This post summarises my prematurely-ended drama with them.
In case you are familiar with Man in the middle attacks I don't expect you doing any of those stuff under untrusted WiFi (same for wired ones), else you should think twice before executing any activity under public access points.
Scared? Well you should be !
You daily deal with a limited number of passwords you easily memorize despite their complexity. But how about the other numerous ones you don't utilize on daily basis?
With time, we unintentionally collect several habits that end up being a trap conjoint, yet opposed with comfort. Some of those collections manage to slide into our unconsciousness to define our behavior and thoughts.
Below is a list of the versions and interpretations for Mozart's Symphony#40 collected through the years.
Gauss White, a malware hitting targeting the Lebanese Banking Sector; A Nation-state cyber-espionage Trojan, cousin of Flame and Stuxnet. Everything you need to know from a political perspective.
The last few weeks have seen what can be considered the worst period in Lebanon’s post-war era. It seems as though all of the country’s institutions have broken down altogether; from electricity to security, few characteristics of what makes a land a country can be observed currently more than ever. What is causing this chaos? And how can it be solved?
According to history books, the Olympic Games has Greek roots and is considered as the world's foremost sports competition.
According to the United States' administration, the Olympic Games has American roots and is considered as the US’s first cyber-attack program.
What is “Olympic Games” and how its root became American?
Imagine how some cultural and beliefs systems, having no relation with logic, intellectuality and realism, are affecting on different aspects of life.
What good will it be if you gained the source code of the world and yet lost your very self?
This document is about hacking and exploiting iPhone vulnerbilities in order to extract the iPhone user's SMS database. You do not need to be a Hacking Guru, many times you can rely on other people's stupidity and bad configurations in order to achieve your goals.
Lebanese independent video journalist, Nadine Mazloum has recently released an online environmental video petition entitled: "Citizens of the World Against Belo Monte".
How can we not use Sperms for computerized data storage? How can we not profit from space provided by sperm for DNA and replace it by computerized digital data?
Politics is a word often met with disgust or distrust in Lebanon; it reminds the vast majority of the Lebanese population of the misery they live in.