The rumor mill has been churning pretty heavy leading up to NAB that Apple would be announcing a new version of their much loved Final Cut video editing suite.
As it turns out the rumors were true and Apple has officially announced Final Cut X which Apple is calling a complete rewrite of the suite bringing full 64-bit compatibility and Grand Central Dispatch integration to take advantage of up to 8 Cores, this is going to come in handy as FCX it capable of dealing with everything from SD video up to 4K formats.
Continue reading Apple Announces Final Cut X at NAB
Nmap is one of those essential tools that you find yourself always reaching for after a few years of system administration. It’s an excellent tool for network mapping but more importantly for our purposes it can be used for security auditing. The main ways I use Nmap are as a port scanner and in some cases to identify the OS of the IP being scanned. These are by no means the only uses. Nmap has a ton of option and in addition can be extended with scripts. Continue reading Ultimate portable covert Hacking device – Part 3
Stealth MAC is an absolute necessity if you’re going to be doing anything subversive from your iPod/iPhone every network enabled device has what is known as a MAC address which is a unique identifier that’s assigned to the network adapter by the manufacturer. These are supposed to be globally unique ( but that’s not always the case) and normally the first three pairs of numbers/letters identify the hardware manufacturer. This is terrible if we’re planning on doing something subversive on a network as it’s a digital footprint of our activities. Continue reading Ultimate portable covert Hacking device – Part 2
Hi everyone! Like I promised last week I’ve been hard at work sorting out my ultimate portable covert hacking device install. I’m going to jailbreak my old iPod touch (Replaced by my iPhone 3G) and turn it into a portable innocent looking mobile hacking outpost I can carry with me anywhere. I mean who’s going to suspect the guy carrying nothing more than an iPod.
Continue reading Ultimate portable covert Hacking device – Part 1
I’ve been doing a lot of toying around with Apple’s Time Machine lately and recently stumbled onto this tool that allows you to change the schedule that Time Machine uses to back up your Mac (Normally this is done every hour). Every our is a little excessive for most users in my opinion (Well at least for me it is).
Continue reading Do Time Machine/Time Capsule Backups on your Schedule