Search Results

Search found 865 results on 35 pages for 'kinect hacking'.

Page 3/35 | < Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >

  • Is it worth hiring a hacker to perform some penetration testing on my servers ?

    - by Brann
    I'm working in a small IT company with paranoid clients, so security has always been an important consideration to us ; In the past, we've already mandated two penetration testing from independent companies specialized in this area (Dionach and GSS). We've also ran some automated penetration tests using Nessus. Those two auditors were given a lot of insider information, and found almost nothing* ... While it feels comfortable to think our system is perfectly sure (and it was surely comfortable to show those reports to our clients when they performed their due diligence work), I've got a hard time believing that we've achieved a perfectly sure system, especially considering that we have no security specialist in our company (Security has always been a concern, and we're completely paranoid, which helps, but that's far as it goes!) If hackers can hack into companies that probably employ at least a few people whose sole task is to ensure their data stays private, surely they could hack into our small business, right ? Does someone have any experience in hiring an "ethical hacker"? How to find one? How much would it cost? *The only recommendation they made us was to upgrade our remote desktop protocols on two windows servers, which they were able to access because we gave them the correct non-standard port and whitelisted their IP

    Read the article

  • Nuads : les débuts de la publicité interactive avec Kinect, par Microsoft

    Nuads : les débuts de la publicité interactive avec Kinect Par Microsoft Le capteur de mouvements de Microsoft peut être exploité dans de multiples scénarios différents. Y compris la publicité. Il fallait s'y attendre, lors du salon International Advertising Festival qui se déroule actuellement à Cannes, Microsoft a levé le voile sur une nouvelle technologie exploitant les capacités du Kinect pour ouvrir la voie à la publicité interactive à la télévision. La technologie, baptisée Nuads (Natural User Interface Ads), utilise la reconnaissance gestuelle couplée à la reconnaissance vocale, qui a été introduite récemmen...

    Read the article

  • Hacking your own application

    - by instigator
    I am a web developer that is very conscious of security and try and make my web applications as secure as possible. How ever I have started writing my own windows applications in C# and when it comes testing the security of my C# application, I am really only a novice. Just wondering if anyone has any good tutorials/readme's on how to hack your own windows application and writing secure code.

    Read the article

  • piece of php code for prevent hacking.

    - by artmania
    Hi friends, I have a php file at my site, and I connect to db, get some records and list them in same file. mysql_connect("localhost", "blabla", "blabla") or die(mysql_error()); mysql_select_db("blabla") or die(mysql_error()); $blabla1 = mysql_query("SELECT * FROM gallery WHERE id_cat=1"); $blabla2 = mysql_query("SELECT * FROM gallery WHERE id_cat=2"); $blabla3 = mysql_query("SELECT * FROM gallery WHERE id_cat=3"); So, is there anything I need to do for security? :/ like sql-injection or anything else. there is nothing going to url. it is just www.blabla.com/gallery.php appreciate advises!!! thanks a lot!

    Read the article

  • Kinect office demo ideas

    - by Tedd Hansen
    I'm thinking of placing a Kinect (connected to a PC) in the office and have something fun on it. Just a small thing people can interact with. Basically I get a depthmap (image) and a color image from the Kinect which I can analyze and do stuff with. My limited imagination came up with: Count people passing by. Measure average width of people passing by. Some ball with physics people can play with. Audible alert when someone is walking too fast. Anyone have any good ideas? :)

    Read the article

  • Deux chercheurs transforment Kinect en assistant pour chirurgien, grâce à des drivers open-source

    Deux chercheurs transforment Kinect en assistant pour chirurgien, grâce à des drivers open-source Mise à jour du 24.12.2010 par Katleen Et une nouvelle exploitation de Kinect, une ! Celle-ci a été mise sur point en Suisse, par deux chercheurs de l'Université de médecine de Berne. Partant du principe qu'en cours d'opération, lorsqu'un chirurgien à besoin d'informations relatives au dossier de son patient ou à l'intervention en cours, il lui faut se lancer dans un protocole lui faisant perdre un temps précieux : enlever ses gants, aller à l'ordinateur, empoigner la souris, naviguer grâce à elle, puis remettre ses gants avant de reprendre le travail. Or, ces précieuses secondes peuvent de...

    Read the article

  • Microsoft présente ses recherches sur les Interfaces Utilisateur Naturelles dont une devrait être adaptée sur Kinect

    Microsoft présente ses recherches sur les Interfaces Utilisateur Naturelles Dont une devrait être adaptée sur Kinect Microsoft aime les Interfaces Utilisateur Naturelles (NUI). Ses laboratoires de recherche viennent de poster une démonstration d'une technologie baptisée « 3D Photo-Real Talking Heads » et d'autres concernant les affichages intelligents, toutes réalisées grâce à l'utilisation d' appareils photo pour créer de nouveaux types d'expériences inter-actives. La 3D Photo-Real Talking Head produit un visage en 3D à partir de photos et permet de suivre les mouvements de la tête, et des lèvres. Elle devrait bientôt être adaptée au capteur de mouvement Kinect pour la X...

    Read the article

  • Une variante de Kinect adaptée aux ordinateurs sortira en 2011, Asus remplacera Microsoft dans ce projet

    Une variante de Kinect adaptée aux ordinateurs sortira en 2011, Asus remplacera Microsoft dans ce projet PrimeSense. Ce nom ne vous dit rien ? Il s'agit de l'entreprise israélienne qui a vendu les technologies clés du Kinect à Microsoft. Cette dernière travaille actuellement au développement d'un appareil similaire pour les PC... mais sans Microsoft ! A la place, la compagnie a décidé de s'associer avec le fabriquant Asus, pour offrir dans les mois à venir une interface de contrôle gestuel pour les ordinateurs (qui fonctionnera d'ailleurs avec toutes les machines, et pas seulement celles d'Asus). Le produit répondra au nom de Wavi Xtion et ne sera pas axé vers les jeux, mais plutôt vers la navigation (...

    Read the article

  • Les développeurs amateurs se mettent aux hacking avec la prolifération des kits de piratage « tout-e

    Mise à jour du 29/04/10 Les développeurs amateurs se mettent aux hacking Avec la prolifération des kits de piratage « tout en un », mais ils restent très professionnels Les kits de hacking « do-it-yourself » (en vf « faîtes le vous même ») se propageraient à grande vitesse. Ces solutions « tout en un » facilitent en effet la création et l'utilisation de malwares (un constat également fait par Microsoft dans son rapport semestriel de sécurité - lire ci-avant). Leurs prix relativement bas aura fait le reste pour leur démocratisation auprès de tous les développeurs malveillants, y compris les moins doués. Dans son étude, M8...

    Read the article

  • Mythbusters- Programming/hacking myths [closed]

    - by stephen776
    Hey guys. I am a big fan of the Discovery show Mythbusters, as Im sure some of you are as well. I have always wanted them to do an episode on programming/hacking. They get a lot of their show ideas from fans so I though we could compile a list of possible myths to bust. Lets hear your ideas! (sorry if this is not appropriate, close if necessary) Edit: I am not necessarily looking for subjective "This is what I want to see" answers. I am talking more along the lines of interesting computer/programming/hacking stories that would appeal to a general audience. I do not expect them to do a show on "Whats faster i++ or i + 1".

    Read the article

  • [Livre]:Chaînes d'exploits: Scénarios de hacking avancé et prévention, de A.Whitaker, K.Evans, J.Vot

    Bonjour La rédaction de DVP a lu pour vous l'ouvrage suivant: Chaînes d'exploits: Scénarios de hacking avancé et prévention de Andrew Whitaker, Keatron Evans, Jack Voth paru aux Editions PEARSON [IMG]http://images-eu.amazon.com/images/P/274402371X.08.LZZZZZZZ.jpg[/IMG] Citation: Un pirate informatique s'appuie rarement sur une unique attaque, mais utilise plutôt des chaînes d'exploits, qui impliquent plusie...

    Read the article

  • Pwn2Own 2011 : Safari vaincu en 5 secondes lors du concours de hacking, Internet Explorer 8 exploité

    Pwn2Own 2011 : Safari vaincu en 5 secondes, Internet Explorer 8 exploité La célèbre compétition de hacking Pwn2Own, qui se déroule une fois par an à Vancouver, a commencé hier. Et à l'occasion de cette première journée, deux navigateurs ont été franchement asticotés. Les spécialistes de la sécurité informatique qui participent au concours devaient choisir chacun un browser à malmener. Et ces derneirs...ont délaissé Firefox, qui n'a été choisi par personne ! Puis, un seul a décidé de s'occuper de Chrome, mais il ne s'est jamais présenté. Les autres concurrents se sont quant à eux concentrés sur Internet Explorer et Safari. Et le logiciel d'Apple n'aura pas résisté très longtemps. Ainsi, en cette première journée, Safa...

    Read the article

  • Using terminal in hacking way (Xubuntu 10.04)

    - by user1163511
    I am beginner in using terminal in Linux. I have some questions about it. First of all, I want to ask you question out of the issue-What is the name of th Terminal in Xubuntu 10.04(for example- bash or anything like this)? My main question is - Is there any way of using the terminal for hacking (e.g. port scanning, whois, gaining root account and take a look of the file system of the server or another things). I will be very pleased to get answers. Thank you for patience and tolerance!

    Read the article

  • WPB .Net User Group 11/29 Meeting - Kinect SDK with Joe Healy - New Meeting Location

    - by Sam Abraham
    We are excited to share great news and updates regarding the West Palm Beach .Net User Group. Our upcoming meeting will feature Joe Healy from Microsoft as speaker for the November 29th, 2011 6:30 PM meeting.   He will be covering the Kinect SDK and answering all our questions regarding the latest Windows Phone 7 Release. We will be also raffling many valuable items as part of our usual free raffle and hope each of our members leaves with a freebie.   We are also honored to share that we will be hosting our special meeting at a new location:   PC Professor 6080 Okeechobee Blvd.,  #200 West Palm Beach, FL 33417 Phone: 561-684-3333.   This is right by the Florida Turnpike entrance on Okeechobee Blvd.   PC Professor will be also providing our free pizza/soda and some additional surprise items for this meeting to mark the debut of our meetings at their location!   We would like to use this opportunity to thank our current host, CompTec, for its generous support and for hosting us for the past 2 years and look forward to their continued support and sponsorship.   A lot of work and effort is put into hosting a meeting that we hope translates into added value and benefit for our membership. We always welcome your feedback and participation as we strive to continuously improve the group.   Special thanks to our group member, Zack Weiner, for helping us find this new location.   For more details and to register please visit: http://www.fladotnet.com/Reg.aspx?EventID=536   Hope to see you all there.   --Sam Abraham & Venkat Subramanian Site Directors – West Palm Beach .Net User Group

    Read the article

  • Kinect bientôt dans l'espace ? Des chercheurs utilisent la technologie comme système d'amarrage dans le nano-satellite STRaND-2

    Kinect bientôt dans l'espace ? Des chercheurs utilisent la technologie comme système d'amarrage dans le nano-satellite STRaND-2 Le capteur de Microsoft Kinect fait son entrée dans le domaine spatial, et ira où aucun humain n'est encore allé. Des ingénieurs britanniques de l'Université de Surrey et ceux du constructeur de satellites Surry Satellite Technology (SSTL) travaillent sur un nouveau système d'amarrage des satellites en utilisant Kinect. [IMG]http://rdonfack.developpez.com/images/kinect.jpg[/IMG] Les scientifiques ont construit un satellite (STRaND-2) équipé d'une caméra de profondeur Kinect qui lui permettra de localiser et de se joindre à d'autres ...

    Read the article

  • 2D XNA Game Engine with a Good Wiki [closed]

    - by gcx
    I'm a newbie game developer. I'm planning to develop a XBOX (with a Kinect to double the fun) game. I've researched some 2D game engines that i can use in my project. After some research I've found IceCream engine and it looks delicious with its Milkshake editor. But I can't seem to find "working" game source examples for that engine and its own website's tutorial is not very sufficent. (If you are familiar with this engine) do you know any community that has helpful resources for this particular engine? If not, which engines do you recommend (that has a great wiki) for a XNA based XBOX - Kinect game?

    Read the article

  • Steps to rebuild gspca_kinect driver module?

    - by Bobby Ray
    I recently purchased a Kinect for Windows and quickly discovered that the camera drivers included in linux kernel 3.0+ aren't compatible with the Kinect for Windows hardware revision. After looking at the source code it seems like a tiny modification is all that is required for compatibility, so I've been trying to recompile the driver - to no avail. I've been referring to this article and this one as well, though they are a bit outdated. When I try to compile the module, I get an error because the header file "gspca.h" can't be found in the include path. I located the missing header in my filesystem, but the file itself is empty. I've also tried downloading the kernel source (3.2.0-24-generic), which allowed me to compile the module, but when I load the module I get an error. -1 Unknown symbol in module Is there a standard way to go about this without first building the kernel? Will building the kernel ensure that I can build the module? Thanks

    Read the article

  • Day 3 - XNA: Hacking around with images

    - by dapostolov
    Yay! Today I'm going to get into some code! My mind has been on this all day! I find it amusing how I practice, daily, to be "in the moment" or "present" and the excitement and anticipation of this project seems to snatch it away from me frequently. WELL!!! (Shakes Excitedly) Let's do this =)! Let's code! For these next few days it is my intention to better understand image rendering using XNA; after said prototypes are complete I should (fingers crossed) be able to dive into my game code using the design document I hammered out the other night. On a personal note, I think the toughest thing right now is finding the time to do this project. Each night, after my little ones go to bed I can only really afford a couple hours of work on this project. However, I hope to utilise this time as best as I can because this is the first time in a while I've found a project that I've been passionate about. A friend recently asked me if I intend to go 3D or extend the game design. Yes. For now I'm keeping it simple. Lastly, just as a note, as I was doing some further research into image rendering this morning I came across some other XNA content and lessons learned. I believe this content could have probably been posted in the first couple of posts, however, I will share the new content as I learn it at the end of each day. Maybe I'll take some time later to fix the posts but for now Installation and Deployment - Lessons Learned I had installed the XNA studio  (Day 1) and the site instructions were pretty easy to follow. However, I had a small difficulty with my development environment. You see, I run a virtual desktop development environment. Even though I was able to code and compile all the tutorials the game failed to run...because I lacked a 3D capable card; it was not detected on the virtual box... First Lesson: The XNA runtime needs to "see" the 3D card! No sweat, Il copied the files over to my parent box and executed the program. ERROR. Hmm... Second Lesson (which I should have probably known but I let the excitement get the better of me): you need the XNA runtime on the client PC to run the game, oh, and don't forget the .Net Runtime! Sprite, it ain't just a Soft Drink... With these prototypes I intend to understand and perform the following tasks. learn game development terminology how to place and position (rotate) a static image on the screen how to layer static images on the screen understand image scaling can we reuse images? understand how framerate is handled in XNA how to display text , basic shapes, and colors on the screen how to interact with an image (collision of user input?) how to animate an image and understand basic animation techniques how to detect colliding images or screen edges how to manipulate the image, lets say colors, stretching how to focus on a segment of an image...like only displaying a frame on a film reel what's the best way to manage images (compression, storage, location, prevent artwork theft, etc.) Well, let's start with this "prototype" task list for now...Today, let's get an image on the screen and maybe I can mark a few of the tasks as completed... C# Prototype1 New Visual Studio Project Select the XNA Game Studio 3.1 Project Type Select the Windows Game 3.1 Template Type Prototype1 in the Name textbox provided Press OK. At this point code has auto-magically been created. Feel free to press the F5 key to run your first XNA program. You should have a blue screen infront of you. Without getting into the nitty gritty right, the code that was generated basically creates some basic code to clear the window content with the lovely CornFlowerBlue color. Something to notice, when you move your mouse into the window...nothing. ooooo spoooky. Let's put an image on that screen! Step A - Get an Image into the solution Under "Content" in your Solution Explorer, right click and add a new folder and name it "Sprites". Copy a small image in there; I copied a "Royalty Free" wizard hat from a quick google search and named it wizards_hat.jpg (rightfully so!) Step B - Add the sprite and position fields Now, open/edit  Game1.cs Locate the following line:  SpriteBatch spriteBatch; Under this line type the following:         SpriteBatch spriteBatch; // the line you are looking for...         Texture2D sprite;         Vector2 position; Step C - Load the image asset Locate the "Load Content" Method and duplicate the following:             protected override void LoadContent()         {             spriteBatch = new SpriteBatch(GraphicsDevice);             // your image name goes here...             sprite = Content.Load<Texture2D>("Sprites\\wizards_hat");             position = new Vector2(200, 100);             base.LoadContent();         } Step D - Draw the image Locate the "Draw" Method and duplicate the following:        protected override void Draw(GameTime gameTime)         {             GraphicsDevice.Clear(Color.CornflowerBlue);             spriteBatch.Begin(SpriteBlendMode.AlphaBlend);             spriteBatch.Draw(sprite, position, Color.White);             spriteBatch.End();             base.Draw(gameTime);         }  Step E - Compile and Run Engage! (F5) - Debug! Your image should now display on a cornflowerblue window about 200 pixels from the left and 100 pixels from the top. Awesome! =) Pretty cool how we only coded a few lines to display an image, but believe me, there is plenty going on behind the scenes. However, for now, I'm going to call it a night here. Blogging all this progress certainly takes time... However, tomorrow night I'm going to detail what we just did, plus start checking off points on that list! I'm wondering right now if I should add pictures / code to this post...let me know if you want them =) Best Regards, D.

    Read the article

  • What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?

    - by David Kaczynski
    At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game development, and hacking / security. I am introducing some basic agile development concepts to a couple of the teams, such as user stories, estimating complexity of tasks, and continuous integration for version control and automated builds/testing. I am familiar with some basic development life-cycles, such as waterfall, spiral, RUP, agile, etc., but I am wondering if there is such a thing as a software development life-cycle for hacking / breaching security. Surely, hackers are writing computer code, but what is the life-cycle of that code? I don't think that they would be too concerned with maintenance, as once the breach has been found and patched, the code that exploited that breach is useless. I imagine the life-cycle would be something like: Find gap in security Exploit gap in security Procure payload Utilize payload What kind of differences (if any) are there for the development life-cycle of software when the purpose of the product is to breach security?

    Read the article

< Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >