Ken Shirriff's blog
Computer history, restoring vintage computers, IC reverse engineering, and whatever
Inside the Firesheep code: how it steals your identity
›
You may have heard about Firesheep , a new Firefox browser add-on that lets anyone easily snoop over Wi-Fi and hijack your identity for serv...
6 comments:
A visit from The Great Internet Migratory Box of Electronics Junk
›
A mysterious package showed up on my doorstep today - box "INTJ-28", an instance of the The Great Internet Migratory Box of Elec...
1 comment:
Car radio repair made difficult
›
My wife's car radio suddenly quit working, so I figured I'd take a look and see if I could fix it. The first problem was that it wa...
4 comments:
Getting the (literal) bugs out of a driveway gate controller
›
My driveway has a gate that automatically opens when you drive up, and then closes. Recently it stopped working and this blog post describe...
9 comments:
Using Arc to decode Venter's secret DNA watermark
›
Recently Craig Venter (who decoded the human genome) created a synthetic bacterium . The J. Craig Venter Institute (JCVI) took a bacterium...
6 comments:
Decoding the secret DNA code in Venter's synthetic bacterium
›
Craig Venter recently created a synthetic bacterium with a secret message encoded in the DNA. This is described in more detail at singulari...
2 comments:
Your relationship: mathematically doomed or not?
›
I came across an interesting paper that uses a mathematical model of relationships to show that relationships are likely to fall apart unles...
1 comment:
‹
›
Home
View web version