Introduction to reverse engineering
1. Introduction Reverse engineering is the process of discovering the technological principles of a device, object, or…
New version of OWASP Seraphimdroid (v2.0) is published
Dear users and security aware people, we have a great announcement. The new version of OWASP Seraphimdroid…
Expirience from Lisbon Machine Learning Summer School
I have participated on Lisbon Machine Learning Summer School (LxMLS), which took place on July 16-23 at…
Marvin – semantic annotator
We created Marvin, an semantic text annotation tool that uses external resources such as DBPedia and WordNet…
The art of cyber war
This is the post about a lecture. Very interesting one, held on New York information security meetup…
Chasing script-kiddies and hackers on my blog
This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers…
USSD Code List for Android Smartphone
Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the…
Hacker’s lament
But did you, in your three-piece psychology and 1950’s technobrain ever take a look behind the eyes…
GreatUniHack – impressions from hackathon
This weekend (17th-19th April 2015.) I was participating GreatUniHack, so I would like to share here some…
Worries about Artificial Intelligence
Recently big names in science and technology Stephen Hawking and Eon Musk showed publicly their concerns about…
Blindfolded nation
Recently a friend of mine pointed me to one interesting Pakistani video. To be honest, I don’t…
I vote for Charlie Chaplin
https://www.youtube.com/watch?v=dX25PDBb708 Definitely, if there is a politician who would think and drive as Charlie Chaplin did in…











