Category

General

Category

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For more information please contact us at: i_-_-_s(at)outlook.com or apps(at)devcoons.com. The full version of this application will be available soon in…

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of a set of communications codes employed by vehicle computers and systems that meet the OBDII regulatory standard. Diagnostic scanners and…

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a white-paper entitled Bitcoin: A Peer-To-Peer Electronic Cash System.. This paper represents a decentralized peer-to-peer version of the electronic cash that…

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the time. Moreover, there is also a high risk of fraud. There is still a good deal of misinformation and lack…

The 3020 CNC router is a popular Chinese machine for a good reason. For around 500EUR, you can have a simple CNC with a rigid all-aluminum frame, three decent stepper motors, and pretty good resolution. However, a major disadvantage of this CNC is the out-of-date electronic parts. The motor controller is using a parallel port which is not available in any new computer(PC). For that reason, it is recommended to upgrade the motor controller to…

In short, the algorithms are trying to accomplish different goals. K-nearest neighbor is a subset of supervised learning classification (or regression) algorithms (it takes a bunch of labeled points and uses them to learn how to label other points). It is supervised because you are trying to classify a point based on the known classification of other points. In contrast, K-means is a subset of unsupervised learning clustering algorithms (it takes a bunch of unlabeled…

In this post we will introduce how to install MiKTeX plus TeXstudio on windows. This is very easy! You simply have to accept just about all the default settings. Step 1: To begin with you have to go to the MikTeX website and navigate at the downloading page. From there you could pick the appropriate installer (32bits or 64bits) based on your system. [ Link ] Step 2: Just start the installation process and accept…

An obfuscation technique (also called Polymorphism) is a way of constructing a malware that make it more difficult to detect. If a malware is hard to detect, it is likely to spread more widely. The following are commonly used obfuscation techniques: Self-Encryption and Self-Decryption. Some viruses can encrypt and decrypt their virus code bodies, concealing them from direct examination. Viruses that employ encryption might use multiple layers of encryption or randomcryptographic keys, which make each instance of the…

Markdown, originally written as a Perl script by John Gruber and Aaron Swartz in 2004, has caught fire and the technology has exploded into many different forms of “text to HTML” markup engines. The original Markdown code has largely been unchanged through the years, while alternative versions have come to build on it. Since the creators of Markdown don’t want anybody using the “Markdown” name, each fork of the project adopts another name, which gets confusing.…

In this post i will present you my first double sided custom pcb made using a simple but “effective” CNC 3020. I’m a CNC newb so my milling process, and the following outline uses what I’ve concluded to be the most common tools. These tools are Eagle CAD, PCB-gcode, Mach 3 CNC, 0.1mm 30deg V-Shaped Engraving Bit, and of course random surplus carbide PCB drill bits from Amazon and several other online markets. I have to say…