Chances are that you've encountered a CAPTCHA in the wild: they protect web forms by asking you to type over weirdly rendered characters or by asking you to select photos containing a particular thing. Why are they used and is there a user friendly alternative?
This month I received a shipment from China containing some special hardware, Android devices with embedded printers! To make life easier for the restaurant and business owners that use my food ordering app, I want these devices to automatically print new orders. If only I can get these machines to work with my software... challenge accepted!
For some years now I use a tablet as main computer, I like its versatility. But, most tablets come with a locked down operating system, like iPadOS, Windows 10S or Android. As I like things my own (weird) way, I wondered if I could escape these "software jails" by installing a free operating system on a tablet. It's possible, read along to find out how I escaped!
This month I was lucky enough to attend Global AppSec Amsterdam, an international conference for hackers and security specialists. There were presentations from former intelligence agents, bounty hunters, academics and software vendors. I learned about some of the newest hacking techniques, met with interesting people and played some cool retro games. Read along for more.
You probably use the world's most famous search engine to find things everyday, but you might not know about some of its advanced search operators. You can use these special search phrases to find things that are otherwise burried in the search results. Read along for a comprehensive list of advanced Google search operators.
A lot of people use WordPress to manage their website, therefore it's no surprise people ask me to have a look at their site's security. As ethical hacker, I encounter WordPress in different shapes, sizes and states. Some of them are really badly protected against hacks. Prevent your site from being hacked using these 10 practical tips.
People pay me to hack them, provided I'll explain how it was done, so future hacks can be prevented. As security consultant, I scan for weaknesses in my clients' apps, webshops and websites. Very often a hack starts by exploiting a security hole that is visible remotely. Read along to learn how hackers find security holes and what you can do to secure them.
Yesterday a young woman brought me her laptop, it didn't start anymore and it only showed an error message. It turned out to be a broken harddisk. It startled her when I told her that all data on the disk was lost. She told me it contained precious photos of her pregnancy and young child. What could I do?
This week a man brought his laptop to the community centre where I help people with computer problems as volunteer. The old laptop wouldn't start anymore and had to be reinstalled. Instead of Windows, I installed a free operating system. I think it is important to tell you how and why I did it.
There is beauty in raw, unfinished material that is often hidden with superfluous layers of paint. I like things to be true to the nature of the material. My bike was painted black - not bad - but I wondered what it really looked like from a material point of view.
Today I created a minimal iPhone stand from oak wood. While it's much faster to buy one online, I wanted one to fit my phone horizontally, with its case on. I like minimal design, so I opted to machine a single piece of wood to get it done.
For the past 10 days I have powered my personal electronic devices (phone, computer, wearables) using nothing but energy collected using a small solar panel. I disconnected all grid-connected chargers. I hoped that by going off the grid, even in such a small way, I would gain insights that enable me to save energy (and money).
This week one of my clients was hacked and asked me for emergency assistance to help secure their server infrastructure. It was a web server that ran WordPress websites on Apache (with PHP/MySQL), including a few webshops with customer data. This hack could easily have been prevented with the following best practices, is your server secure?
Right next to the house were I was born there was this chestnut tree, sadly it died one and a half year ago. When it was taken down, my brother saved me a slab of wood. I intended to create something from it, a nice "do it yourself" adventure, worthy of a blog post!
Last night I had a nasty surprise: my original MacBook Air was swollen due to an exploded battery. I immediately had to take action, for reasons of safety and to preserve this piece of modern computer history. Don’t try this at home, but if you do... read along for some practical tips.
At my home I have this crazy fast optical internet connection. It is a 600MB up and down fibre connection which directly arrives in my home (no copper cables involved). It's like a private internet highway. Reason enough to find out if I could do something to make better use of all this speedy fiber galore...
Today I called my provider to quit my office's ADSL internet subscription, I don't need it anymore. I have turned off my local area network and switched my workflow onto mobile internet only. The simplicity and savings actually surprised me so much, that I made blog post for it.
This month Nintendo released the Switch with Zelda "Breath of the Wild". The new console received positive reviews. The new Zelda game is amazing and can be played on-the-go, thanks to the portability of the Nintendo Switch. But it its hardly the first Nintendo device that features the mythical kingdom of Hyrule with Link and princess Zelda. I found an old Gameboy Advance, perfect for playing classic Zelda games... but it was in need for repair!
Over the past years I have been no stranger to crazy experiments, but this time I really wanted to push it into the extreme: programming on an Apple Watch. Would it be possible to actually write code on such a tiny device? Why even bother? This post is about the case for crazy experiments, and why you should try too!
Almost a year ago I bought an old steel racing bike from 1978. I wanted to figure out if using a bike to commute worked for me. It did! I used it to ride more than 1000KM before I decided to get a modern road bike. Now, almost a year later, I decided to put the powers of the internet into good use: to bring the bike back to its retro glory!
One must be a bit crazy to come up with the idea to build a blog (as in: actual programming) on an old 486 laptop with just 16MB RAM. I happen to be that crazy: I took my very first laptop from the 90s and decided to find out if it was possible to turn it into a development machine.