Laplinker
Wednesday, October 2, 2013

Step by step guide - Beagle Bone Black voice recognition on an LED matrix

›
So after I made a BeagleBone black output voice recognition to an LED Matrix, I thought I will post a "How-to" guide to make one y...
29 comments:
Sunday, September 15, 2013

BeagleBone Black based voice recognition on an LED Matrix.

›
A little over a month ago I was at the BrainSilo hacker space in Portland with some friends, we were playing around with our HackRF JawBr...
3 comments:
Tuesday, July 9, 2013

Example - Reporting a security vulnerability when there is no clear security contact

›
Today I wanted to report an authentication bypass vulnerability in a router to it's vendor, I went online to the company web site and l...
2 comments:
Thursday, May 9, 2013

CVE 2013-3518 - Belkin WeMo Information Exposure

›
# Title: Belkin WeMo Information Exposure # Date: 5/9/13 # Author: Mickey Shkatov # Vendor Homepage: http://www.belkin.com/us/wemo ...
3 comments:
Saturday, November 24, 2012

The end of Windows sidebar gadgets

›
So... after doing the con-tour at Blackhat, Defcon, Brucon and BsidesPDX (which was AWESOME!!! btw) It is time to summarise it all and s...
3 comments:
Tuesday, July 10, 2012

XSS in iPhone iOS

›
I am going to share my thoughts on an XSS vulnerability I discovered in Apple iPhone iOS, Question : What is the "Content-dispositi...
5 comments:
Monday, May 7, 2012

Python proxy - Custom reply to requests with pattern in headers

›
I have been doing some research and i needed to reply to certain requests for specific domains in a constant and certain way,What I normally...
›
Home
View web version

About Me

laplinker
I can be contacted via twitter @HackingThings or via email at my handle [at] gmail.com
View my complete profile
Powered by Blogger.