hitsaru

WiFi Pulse Oximeter Update

Filed under Projects |

Disclaimers: I am not a health care professional. Nothing in this article is medical advice. In my previous article Build a DIY Wifi connected MQTT reporting IoT Pulse Oximeter and Heart Rate Monitor  I provided code for a pulse oximeter project. That provided code was error-riddled and was not the correct code for the project. Indeed, […]

Deepfakes: Social Engineering and Advertising

Filed under Security |

Introduction In the past few months I’ve come across several video advertisements on Youtube that are obvious deepfakes (https://en.wikipedia.org/wiki/Deepfake) . Seeing these, my curiosity was piqued, and I wanted to examine these videos closer. There has been a history of advertisement on the internet being used as a vector for social engineering (https://www.bitdefender.com/en-us/blog/hotforsecurity/facebook-ad-scam-tricks-investors-with-fake-messages-and-malware-disguised-as-verified-facebook-app, https://consumer.ftc.gov/consumer-alerts/2023/04/ads-fake-ai-and-other-software-spread-malicious-software, https://finance.yahoo.com/news/hackers-exploit-ad-tools-track-184948118.html), […]

Disclaimers: I am not a health care professional. Nothing in this article is medical advice. The links contained in this article to products on Amazon are affiliate links. Purchase of products via these links will produce a commission for me, and I thank you for your support. What is this project?   Short story: The […]

DEF CON 27 WiFi Project

Filed under Projects |

Last year, at DEF CON 26, my wife Sunfire and I debuted our Wifi Project in the Jean Vest, fitting the declared 80s theme of DEF CON 26. It got a lot of attention that year and this year, for DEF CON 27, I decided to keep the project going, but to change the project […]

I am not an affiliate of any of the links provided in this entry. No product referenced in this blog is an endorsement. I’m just a guy posting a thing.   Because I’ve been working extensively with Bitmain’s ASIC line for quite a while, I’ve naturally had to create tools and scripts for this line […]

No system can be made 100% secure. I take no responsibility for the misuse or lack of effectiveness in implementation of any security methods or techniques described, alluded to, or linked in this blog. Treat everything as hypothetical and experimental. I am not an affiliate of any of the links provided in this entry. No […]

What I’ve learned from the Web Application Security Beginner’s Guide

Filed under Research | Topics covered: , ,

Over the past couple of weeks, I’ve been reading through “Web Application Security – a Beginner’s Guide” from Bryan Sullivan and Vincent Liu (2012, McGraw Hill) with a highlighter in hand. Now that I’ve finished reading through it, I wanted to record some of my thoughts on what I’ve learned, and what I need to […]

Tic Tac Toe – another browser game

Filed under Development | Topics covered: , ,

** Disclaimer: I’m not an affiliate for anything here, just sharing my honest opinion. ** In an effort to keep working on code, I found another browser game to play with. It’s not as entertaining as my Feed the Snake game, but it’s good practice for looking over code and trying to figure out a […]

HashChecker – a tool for duplicate file detection

Filed under Development | Topics covered: , , , ,

If you are anywhere near as ‘techie’ as I am you have tons of media: thumbdrives, SD cards, hard drives. I even have CDs. I won’t confess if I have floppy disks. Guess. As the year closed out I finally started the massive project of attempting to consolidate all the media I’ve had lying around […]

Feed the Snake game

Filed under Development | Topics covered: , ,

Disclaimer: I’m not an affiliate for anything here, just sharing my honest opinion. A few years back, after graduating college with my degree, I decided it was important to keep learning and exploring in my field of study. One of the first things I did was look into Udemy, a site full of online courses […]