Category

General

Category

The purpose of this application is just for fun. It started initially by figuring out a way to fake skype that you are in front of your PC but also to randomly create a picture. The application takes control of your mouse and start drawing random pixels in the main area of the window thus…

HackRF One is a Software Defined Radio (SDR) peripheral capable of transmission or reception (half-duplex) of radio signals from 1MHz to 6GHz. This device is mostly designed for testing and development of modern and next generation radio technologies. It is an open source hardware platform that can be used as a USB peripheral or programmed…

Poweroff Timer is a windows universal application(UWP) in Microsoft Store written in C#. This application enables you to set a timer to shutdown your PC at a specific time. It makes your power management much easier and more convenient. When you assign the timer, PowerOff Timer will minimize in the system tray and run silently…

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For…

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of…

Data Preparation is the core of data science and it is crucial for any data analysis. It involves data cleansing and feature engineering. Usually, this takes 60 to 80 percent of the whole analytical pipeline. However, it is a mandatory task in order to get the best accuracy from machine learning algorithms on your data-sets…

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a…

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the…

The 3020 CNC router is a popular Chinese machine for a good reason. For around 500EUR, you can have a simple CNC with a rigid all-aluminum frame, three decent stepper motors, and pretty good resolution. However, a major disadvantage of this CNC is the out-of-date electronic parts. The motor controller is using a parallel port…