Daniel
More ideas from Daniel
The Feynman Technique, helps you can learn anything faster by quickly identifying gaps in your understanding. It's also a versatile thinking tool.

The Feynman Technique, helps you learn anything faster by quickly identifying gaps in your understanding. It's also a versatile thinking tool.

Penetration Testing Tools Cheat Sheet

Penetration testing tools cheat sheet, a high level overview / quick reference cheat sheet for penetration testing.

Top 10 Web Application Vulnerability Scanners  infosechackingethical hacking

Top 10 web application vulnerability scanners through which we can discover security flaws before being targeted.

Magic Mirror | another Raspberry Pi project -- I want one of these too!

And there it is: The end result of the Magic Mirror. Read the full story: Part I - The Idea & The Mirror Part II - The Monitor Part III - The Casing Part IV - Install The Hardware Part V - Installing the Raspberry Pi Part VI - Production of the Interface

Common Computer Ports Chart

Port - Most input/output devices are outside the computer case. These devices communicate with components inside the computer case through a wireless connection or through pcables attatched to the case at a connection called a port.

Solar Powered Pi

Solar power pack Given the Raspberry Pi is so small, one of its key advantages is mobility. Should you go walkabouts the tiny device can harness the power of the sun thanks to a kit that hooks it up to a solar panel.

Raspberry Pi Handlheld - Make a handheld Pi based computer with keyboard and touch screen. Runs Linux, or course.

This simple Raspberry Pi-Powered Linux laptop uses off-the-shelf parts, can be hooked up to a TV or monitor, and it fits in your pocket.

Infographic w/ server image... The State of Cybersecurity in U.S. federal government (from Fedscoop)

Infographic w/ server image. The State of Cybersecurity in U. federal government (from Fedscoop)

Is Apples iMessage Secure?  infosechackingethical hacking

Is Apples iMessage Secure?