No special effects or editing. Taken without flash on camera phone
Just for my reference https://projects.drogon.net/raspberry-pi/wiringpi/pins/
The following tables give the mapping of the Raspberry Pi GPIO Pins to the GPIO connector in relation to the pin numbers and the physical location on the connector. This is a representation of the GPIO connector as viewed looking at the board from above, with the USB power at the top and the GPIO to the top-right of the board.
If using the connector pin numbering, then note that Pin 1 on the connector is the 3.3v supply. Pin 2 is the 5V supply, and pin 26 is marked SPI CE1 below.
P1: The Main GPIO connector:
|–||–||3.3v||1 | 2||5v||–||–|
|8||R1:0/R2:2||SDA0||3 | 4||5v||–||–|
|9||R1:1/R2:3||SCL0||5 | 6||0v||–||–|
|7||4||GPIO7||7 | 8||TxD||14||15|
|–||–||0v||9 | 10||RxD||15||16|
|0||17||GPIO0||11 | 12||GPIO1||18||1|
|2||R1:21/R2:27||GPIO2||13 | 14||0v||–||–|
|3||22||GPIO3||15 | 16||GPIO4||23||4|
|–||–||3.3v||17 | 18||GPIO5||24||5|
|12||10||MOSI||19 | 20||0v||–||–|
|13||9||MISO||21 | 22||GPIO6||25||6|
|14||11||SCLK||23 | 24||CE0||8||10|
|–||–||0v||25 | 26||CE1||7||11|
P5: The auxilliary GPIO connector present on Rev. 2 boards only:
|wiringPi Pin||BCM GPIO||Name||Header||Name||BCM GPIO||wiringPi Pin|
|–||–||5v||1 | 2||3.3v||–||–|
|17||28||GPIO8||3 | 4||GPIO9||29||18|
|19||30||GPIO10||5 | 6||GPIO11||31||20|
|–||–||0v||7 | 8||0v||–||–|
A small team at NASA’s Ames Research Center has set out to “boldly grow where no man has grown before” – and they’re doing it with the help of thousands of children, a robot, and a few specially customized GoPro cameras.
In 2015, NASA will attempt to make history by growing plants on the Moon. If they are successful, it will be the first time humans have ever brought life to another planetary body. Along the way, they will make groundbreaking contributions to our understanding of biology, agriculture, and life on other worlds. And though they may fail, the way they are going about their mission presents a fascinating case study of an innovative model for public-private collaboration that may very well change space entrepreneurship.
Qatar has unexpectedly delighted international pundits by unveiling the design for its 2022 World Cup Al Wakrah stadium, whose roof is designed to represent “the sails of the Arabian pearl fishing boat the Dhow”, but actually bearing more than a passing resemblance to a woman’s nether regions.
Zaha Hadid Architects and international “provider of professional technical and management support services” AECOM whipped the covers off the stadium a few days back, and the eyebrow-raising kicked off almost immediately.
Callie Beusman, down at Jezebel, declared: “Any discerning human will be quick to recognize that the building looks exactly like an enormous vagina.”
Last week, Google has released the 4.4 (KitKat) version of their omni-popular Android OS. Between the improvements, some have noticed several security-related changes. So, how much more secure is Android 4.4?
When talking about Android 4.4 (KitKat) major security improvements, they can be divided into 2 categories:
1. Digital certificates
Android 4.4 will warn the user if a Certificate Authority (CA) is added to the device, making it easy to identify Man-in-the-Middle attacks inside local networks. At the same time, Google Certificate Pinning will make it harder for sophisticated attackers to intercept network traffic to and from Google services, by making sure only whitelisted SSL certificates can connect to certain Google domains.
2. OS hardening
SELinux is now running in enforcing mode, instead of permissive mode. This helps enforce permissions and thwart privilege escalation attacks, such as exploits that want to gain root access. Android 4.4 comes compiled with FORTIFY_SOURCE set at level 2, making buffer overflow exploits harder to implement.
The last word
In summary, here is our minimum recommendation for safe storage of your users’ passwords:
Use a strong random number generator to create a salt of 16 bytes or longer.
Feed the salt and the password into the PBKDF2 algorithm.
Use HMAC-SHA-256 as the core hash inside PBKDF2.
Perform 10,000 iterations or more. (November 2013.)
Take 32 bytes (256 bits) of output from PBKDF2 as the final password hash.
Store the iteration count, the salt and the final hash in your password database.
Increase your iteration count regularly to keep up with faster cracking tools.
Whatever you do, don’t try to knit your own password storage algorithm.
It didn’t end well for Adobe, and it is unlikely to end well for you.
security hole in Samsung TVs which could have allowed hackers to get in to your television, watch you, change channels and plant malware.
Now, a UK blogger, known only as ‘DoctorBeet’, has apparently discovered that his LG Smart TV has actually been sending data about his family’s viewing habits back to the South Korean manufacturer.
After some investigation he found that his Smart TV would send data back to LG, even after he disabled an option in the system settings menu called “Collection of watching info.”
He said that his LG set, model number LG 42LN575V, connects to a non-functional URL with details of the times and channels being watched.
Worse still, he also discovered that the filenames of some media on a USB device connected to the TV were also transmitted, saying that:
My wife was shocked to see our children’s names being transmitted in the name of a Christmas video file that we had watched from USB.
This discovery prompted DoctorBeet to create a mock video file which he transferred to a USB stick. He deliberately chose a filename – Midget_Porn_2013.avi – that couldn’t possibly be confused with the TV set’s firmware. After connecting the USB drive to his TV he later found that the filename had been transmitted in an unencrypted format to GB.smartshare,lgtvsdp.com.
Strangely, not all filenames belonging to media on USB devices were transmitted:
Brilliant site for creating and publishing online brochures:
Converts from PDF. All text is searchable. Web links are clickable. Very good for SEO
Sample wedding brochure created as a test case:
Cryptolocker is a rather unpleasant strain of malware, first spotted in August, that encrypts documents on the infiltrated Windows PC and will throw away the decryption key unless a ransom is paid before a time limit. The sophisticated software, which uses virtually unbreakable 256-bit AES and 2048-bit RSA encryption, even offers a payment plan for victims who have trouble forking out the two Bitcoins (right now $1,200) required to recover the obfuscated data.