BrainFade

By: Tim Lucas - CC BY 2.0 1

Python Alternate Modules

Python is a great scripting language, which runs over many platforms. In order to make your script deployable over many systems without the need to recode it is useful to be able to load alternate modules which provide the same functionality, but are available on different target systems. Fortunately, Python...

By: gilipollastv - CC BY 2.0 2

iPhone 5S: Destroyed in milliseconds

Some people have too much time, money, or both in this case of the guys over at RatedRR. Plenty of people don’t like Apple, or the iPhone, but not many have the willpower to drop, sink and then shoot the hell out of one. So for all the Apple haters...

Supermicro H8QMI-2 BIOS main screen. 0

Boot Into DOS Via CD Instead Of Floppy

It’s not often that you need to boot into DOS mode nowadays, but every once in a while, especially on older hardware, you might need to get into DOS to install a firmware or BIOS upgrade that cannot be done from within Windows. While the majority of motherboard manufacturers enable...

By: thierry ehrmann - CC BY 2.0 2

Fukushima: How did it happen? (@suretenucleaire)

The Fukushima nuclear accident is one of the worst in history. Depending on which stats you read, it’s either in front or behind Chernobyl in terms of severity; but either way, it’s a pretty grim accident. Nuclear safety is always of the most paramount importance, irrespective of which side of the pro...

Piccadilly Line 0

London Underground Piccadilly Line

Originally opening in 1906, as the Great Northern, Piccadilly & Brompton Railway it has expanded to carry around 210 million passengers a year, making the Piccadilly Line the forth busiest on the London Underground. Over the years the line has been expanded several times through the Cockfosters, Uxbridge and Hounslow...

By: Saxon - CC BY 2.0 0

How Secure Is Your Software?

This years security hackathon is about to get started – the annual Pwn2Own hacking competition sponsored this year by HP and Google. Before we even get the results, you can estimate the security of each system and combination. Companies put bounties on the finding of security vulnerabilities in their software, and as such,...

submarine cable map 3

Submarine Cable Map

Have you ever wondered how the world is connected to create ‘the internet’? Essentially, it’s just a vast network of cables around the planet, a great majority of the high speed links are via undersea cables to provide fast connectivity between continents and financial centers (these things aren’t cheap, so...