Author Archive

Map of submarine telecom cables

The international backbone of Internet is largely based on a network submarine fiber optic cables. There are lots of them.  TeleGeography’s free interactive Submarine Cable Map is based on Global Bandwidth research, and depicts active and planned submarine cable systems and their landing stations. Selecting a cable on the map projection provides access to the cable’s

Information leaking on apps, pictures and video

It seem that you are almost always leaking some information without you knowing about them. Tracking the users is the invisible business that funds the web. Also spies target ‘leaky’ phone apps because they transmit users’ private information across the Internet. Also photos can reveal more information that you can see with your eyes. Your

Chrome + LEGO: You can build whatever you like

Think back: you’ve just dumped a bin of LEGO® bricks onto the floor with a satisfying crash, and you have the whole day ahead of you to build whatever you want. There’s something pretty amazing about being able to piece together your ideas with just a collection of colorful bricks. Google has released an interesting Build

Richard Stallman to speak in Finland

Richard Stallman, the father of open source software movement, is going to give two speeches in Finland in February. If you are into open source software, then it might be a good idea to check if you can listen to those talks. Dr. Richard Stallman launched the free software movement in 1983 and started the

Redundancy with Raspberry Pi

Linux Journal has an interesting article series on building redundant systems out of Raspberry Pis. Even though an individual Raspberry Pi is not that redundant, two Pis configured as redundant systems are. Two Pi R articled describes how to set up two Raspberry Pis as a fault-tolerant file server using the GlusterFS clustered filesystem. It

Spies target ‘leaky’ phone apps

New York Times, Guardian and ProPublic have reported that Spy Agencies Probe Angry Birds and Other Apps for Personal Data. In their globe-spanning surveillance for terrorism suspects and other targets, the National Security Agency and its British counterpart have been trying to exploit a basic byproduct of modern telecommunications: With each new generation of mobile

Battery teardowns

3x Battery Teardown article shows you what is inside different batteries. So if you open up a 9 V battery, you find 6 thin 1.5 V cells inside. But what was inside that lantern battery, the rechargeable PP3, or the funny shaped lump on the back of my laptop? Check 3x Battery Teardown article to see. If you

Friday Fun: Internet memes

An Internet meme (/ˈmiːm/ MEEM) is an idea, style or action which spreads, often as mimicry, from person to person via the Internet, as with imitating the concept. What Is a ‘Meme’? What Are Examples of Modern Internet Memes? and The 100 Greatest Internet Memes of All Time articles will give you some examples. Know

RTL-SDR receives Bluetooth LE

  Sniffing and Decoding NRF24L01+ and Bluetooth LE Packets For Under $30 article points to an interesting hack: able to decode NRF24L01+ and Bluetooth Low Energy protocols using RTL-SDR (=a cheap USB digital TV tuner based digital radio). So cheap practicality anyone can obtain the equipment quickly. Some special hacking was needed because there are