Category

General

Category

Windows CMD (Command Line) supports an easy way to automate some task. This can be archived by creating *.bat files and edit them using a simple text editor. The syntax is something that can be found easily by searching. Below is a simple script which can be used to schedule the execution of applications in a sequential way. It means that the .bat script will wait for the X application to finish before it executes…

The purpose of this application is just for fun. It started initially by figuring out a way to fake skype that you are in front of your PC but also to randomly create a picture. The application takes control of your mouse and start drawing random pixels in the main area of the window thus generating mouse position and click events. Below is a sample picture as well as the binary: 

HackRF One is a Software Defined Radio (SDR) peripheral capable of transmission or reception (half-duplex) of radio signals from 1MHz to 6GHz. This device is mostly designed for testing and development of modern and next generation radio technologies. It is an open source hardware platform that can be used as a USB peripheral or programmed for stand-alone operation. In the following experiment, i tried the simplest replay attack to a real-world device (Ford Fiesta) in…

Poweroff Timer is a windows universal application(UWP) in Microsoft Store written in C#. This application enables you to set a timer to shutdown your PC at a specific time. It makes your power management much easier and more convenient. When you assign the timer, PowerOff Timer will minimize in the system tray and run silently in the background. if you right-click on its icon, the menu that appears will allow you to immediately cancel or…

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For more information please contact us at: apps[at]devcoons.com. The full version of this application is available in Microsoft Store:  https://www.microsoft.com/en-us/store/p/j-lock-encryption/9nddldh0fz1g Below are…

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of a set of communications codes employed by vehicle computers and systems that meet the OBDII regulatory standard. Diagnostic scanners and…

Data Preparation is the core of data science and it is crucial for any data analysis. It involves data cleansing and feature engineering. Usually, this takes 60 to 80 percent of the whole analytical pipeline. However, it is a mandatory task in order to get the best accuracy from machine learning algorithms on your data-sets [1]. The first part of this process is the Data Cleansing is the process of altering data in a given…

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a white-paper entitled Bitcoin: A Peer-To-Peer Electronic Cash System.. This paper represents a decentralized peer-to-peer version of the electronic cash that…

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the time. Moreover, there is also a high risk of fraud. There is still a good deal of misinformation and lack…

The 3020 CNC router is a popular Chinese machine for a good reason. For around 500EUR, you can have a simple CNC with a rigid all-aluminum frame, three decent stepper motors, and pretty good resolution. However, a major disadvantage of this CNC is the out-of-date electronic parts. The motor controller is using a parallel port which is not available in any new computer(PC). For that reason, it is recommended to upgrade the motor controller to…