This semester, I've been teaching a USC undergrad class called Pwned: Everyone on Campus is a Copyright Criminal
. Back in February, one of my students did a great post about the AACS processing key crack
on the class blog.
Last week, I received a legal threat from the AACS licensing authority, promising a lawsuit if I didn't removing the
processing key and the link to the Doom9 forum.
On advice from lawyers, I've censored this material off the post. However, Google maintains a list of over 100 sites that link to the Doom9 post, including one from Boing Boing.
We just got the Sport model of the EPIKGO hoverboard at my office. Besides being terribly chic, it’s apparently bulletproof.
Ok, it’s not just solar powered. It’s also an anti-theft, waterproof marvel that keeps my phone’s power bar from ever getting into the red.Sure the idea seems obvious now – tuck a gigantic solar powered battery pack into an exposed slot and turn the wearer into a walking energy harvester. Simple maybe, but I didn’t […]
The office I work in is full of things old people buy to make themselves feel young again. I can honestly say that our awesome new toy, The Swagtron T3 Hoverboard, makes me feel very, very old. I’ll explain why later. Swagtron T3 Pros There’s no way to overcharge the battery and that means no […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]