What was the real reason behind the big universal cyber crack, π€ we should say it??
But was that really cyber attack, watch this.... π or up maybe π€ π π
But was that really cyber attack, watch this.... π or up maybe π€ π π
Getting opportunities for participating in hackathons π», at first sight seems very tough finding but this website will help you find what you are searching for starting from low code(beginner level development) to DevOps and AI hackathons, don't be afraid just dive in and investigate.
https://devpost.com/hackathons
https://devpost.com/hackathons
New & upcoming hackathons Β· Devpost
Devpost powers hackathons and app contests around the world. Sign up to make new friends, explore new APIs / tech, and win prizes & recognition.
And also have you heard about the 5 million Ethiopian coders initiative recently, it was announced that Ethiopian government, collaborating with United Arab Emirates and don't miss up register
https://www.ethiocoders.et/
https://www.ethiocoders.et/
Hi there fellas π,
Anyone of you with previous experience in CTFs, oh for those of you who say what the heck is CTF, oh wait a moment we will investigate what they are in no time. But if anyone participated before comment below.
CTF as Wikipedia defines, it is
They are like hackathons for cyber experts and also newbies in the cyberspace who want to develop their skill through fun experiences. The common kind of problems in the problem set involve problems on:
-Cryptography, i.e.,starting from the simple Caesar cipher to RSA encryption
-Steganography - which involves twikering the hex of media files, particularly images to extract hidden flags - how it needs some knowledge of how image files work, if interested let me know, I will make a heck new blog for you.
- Binary - and this involves reverse engineering and exploiting binary files to find flags
- Web - I think this is the common of all that most of us know which involves sal injections, xss attacks and web vulnerabilities
And if I teased your curiosity enough that would make you say another clarifying post react, not the frame work π
Thanks, π for your time
Anyone of you with previous experience in CTFs, oh for those of you who say what the heck is CTF, oh wait a moment we will investigate what they are in no time. But if anyone participated before comment below.
CTF as Wikipedia defines, it is
an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully-vulnerable programs or websites.
They are like hackathons for cyber experts and also newbies in the cyberspace who want to develop their skill through fun experiences. The common kind of problems in the problem set involve problems on:
-Cryptography, i.e.,starting from the simple Caesar cipher to RSA encryption
-Steganography - which involves twikering the hex of media files, particularly images to extract hidden flags - how it needs some knowledge of how image files work, if interested let me know, I will make a heck new blog for you.
- Binary - and this involves reverse engineering and exploiting binary files to find flags
- Web - I think this is the common of all that most of us know which involves sal injections, xss attacks and web vulnerabilities
And if I teased your curiosity enough that would make you say another clarifying post react, not the frame work π
Thanks, π for your time
How many of you noticed I hadn't written what the acronym CTF means?π€If any body knows what it stands for, write in the comments π
I can safely say the results of AlphaCode exceeded my expectations. I was sceptical because even in simple competitive problems it is often required not only to implement the algorithm, but also (and this is the most difficult part) to invent it. AlphaCode managed to perform at the level of a promising new competitor. I can't wait to see what lies ahead!MIKE MIRZAYANOV, FOUNDER, CODEFORCES
Any competitive programmer here, what is your rank world wide regarding competitive programming? Are you within the top 54% participants? If not you should run for your money before google's alphacode is going to beat you πππcheck it out(doesn't have a good ui, and knowing it is google's, ππ)
https://alphacode.deepmind.com/
For those of you who say what the heck is competitive programming, it is a sport we can say in which participants, not ordinary people but programmers like you, are given algorithmic problems to be solved which can either be heuristic programming(optimization problems) or the common find the answer kind of questions. It is very fun and also worth the trip, you are going to learn a lot of DSA(data structure and algorithm) which are basically what you would be asked if you are invited for interviews at Google, Facebook, Microsoft or any other savvy tech companies, check it out. If you want to learn more
https://codeforces.com/blog/entry/66909
And for those of you who want to participate in competitive programming, sign up and start by now leetcode and code force, competitive programming platforms
https://leetcode.com/
https://codeforces.com/
https://codeforces.com/blog/entry/66909
And for those of you who want to participate in competitive programming, sign up and start by now leetcode and code force, competitive programming platforms
https://leetcode.com/
https://codeforces.com/
Codeforces
[Tutorial] A way to Practice Competitive Programming : From Rating 1000 to 2400+
Dear Codeforces community. Finally red :) Today, I want to share about some ways to practice competitive and gain your rating. I hope that this is helpful for those who is practicing competitive programming harder but rating is sluggish. There are 54,000+β¦
Forwarded from Col John C. Robinson American Corner
Introduction to Electronics with Arduino Workshop - Cohort I
Unleash your inner maker! Our Electronics with Arduino workshop is perfect for beginners. From blinking LEDs to creating complex projects, you'll gain hands-on experience and learn the basics of electronics and programming.
Join us to embark on a thrilling journey of discovery and innovation.
Apply: https://tinyurl.com/cjcrac-eac1
@addisamcenter
Unleash your inner maker! Our Electronics with Arduino workshop is perfect for beginners. From blinking LEDs to creating complex projects, you'll gain hands-on experience and learn the basics of electronics and programming.
Join us to embark on a thrilling journey of discovery and innovation.
Apply: https://tinyurl.com/cjcrac-eac1
@addisamcenter
Long time no see, Hi everyone, π for internet I have been deprived of it in the times I write you posts and blogs. nd Ok apologies finished, π Has any body figured out what the difference between the images I have sent is, I'd no don't worry it is your first time CTF(ing)π
, you should have a Linux machine or a image hex editor to view what is wrong with those pictures, the first image was just a plain image no extra thing but the second one has been tampered with and I added these whole post π
and encoded it within the image, how?, that is the power of steganography. π
How does it work?
Before we talk about how steganography works first we should talk about how image is stored in our computers memory. There are two kinds of images; images in gray scale(mostly called black and white) and those with colors(real images) with the rgba(red, green, blue, alpha or opacity) scale commonly. If we say that what about the text?
So when we need to store a single letter let's say 'A' it is first converted to its corresponding ASCII value which is 65 and this number is converted to its binary equivalent which will be 01000001. so now the trick is here to encode this letter we need three pixels, as we have said don't forget every pixel have three values and three pixels will have 9 values,so we can encode our binary value(8 digit) with in the first 8 digit of rgb of three pixels values, not clear, let's see an example. Let's say we have pixels [(20, 220, 98), (67, 76, 09), (45, 76, 56)] and the letter 'A' is 01000001 then what we do is we convert the pixel value to the preceding even number if 0 and the pixel value is odd or to the preceding odd number if 1 occurs and the pixel value is even or else keep it as it is. So 20 and 0(from the binary of A) will result itself, 220 and 1 will be 219(to the preceding odd number) and soon which will result in the pixel values [(20, 219, 98), (66, 76, 10), (44, 75, 56)].As you see in the values there is not much of a difference which is what happened when you see the images I have sent you, isn't that fun, here is the python code you can mess up with.
Hi there fellas π,
Anyone of you with previous experience in CTFs, oh for those of you who say what the heck is CTF, oh wait a moment we will investigate what they are in no time. But if anyone participated before comment below. .......soon
and encoded it within the image, how?, that is the power of steganography. π
How does it work?
Before we talk about how steganography works first we should talk about how image is stored in our computers memory. There are two kinds of images; images in gray scale(mostly called black and white) and those with colors(real images) with the rgba(red, green, blue, alpha or opacity) scale commonly. If we say that what about the text?
So when we need to store a single letter let's say 'A' it is first converted to its corresponding ASCII value which is 65 and this number is converted to its binary equivalent which will be 01000001. so now the trick is here to encode this letter we need three pixels, as we have said don't forget every pixel have three values and three pixels will have 9 values,so we can encode our binary value(8 digit) with in the first 8 digit of rgb of three pixels values, not clear, let's see an example. Let's say we have pixels [(20, 220, 98), (67, 76, 09), (45, 76, 56)] and the letter 'A' is 01000001 then what we do is we convert the pixel value to the preceding even number if 0 and the pixel value is odd or to the preceding odd number if 1 occurs and the pixel value is even or else keep it as it is. So 20 and 0(from the binary of A) will result itself, 220 and 1 will be 219(to the preceding odd number) and soon which will result in the pixel values [(20, 219, 98), (66, 76, 10), (44, 75, 56)].As you see in the values there is not much of a difference which is what happened when you see the images I have sent you, isn't that fun, here is the python code you can mess up with.
Encyclopedia Britannica
ASCII
ASCII, which is an abbreviation of American Standard Code for Information Interchange, is a standard encoding format for electronic communication between computers. ASCII was first developed in the 1960s as a common format, but it did not see widespread usageβ¦
# Python program implementing Image Steganography
# PIL module is used to extract
# pixels of image and modify it
from PIL import Image
# Convert encoding data into 8-bit binary
# form using ASCII value of characters
def genData(data):
# list of binary codes
# of given data
newd = []
for i in data:
newd.append(format(ord(i), '08b'))
return newd
# Pixels are modified according to the
# 8-bit binary data and finally returned
def modPix(pix, data):
datalist = genData(data)
lendata = len(datalist)
imdata = iter(pix)
for i in range(lendata):
# Extracting 3 pixels at a time
pix = [value for value in imdata.next()[:3] +
imdata.next()[:3] +
imdata.next()[:3]]
# Pixel value should be made
# odd for 1 and even for 0
for j in range(0, 8):
if (datalist[i][j] == '0' and pix[j]% 2 != 0):
pix[j] -= 1
elif (datalist[i][j] == '1' and pix[j] % 2 == 0):
if(pix[j] != 0):
pix[j] -= 1
else:
pix[j] += 1
# pix[j] -= 1
# Eighth pixel of every set tells
# whether to stop ot read further.
# 0 means keep reading; 1 means thec
# message is over.
if (i == lendata - 1):
if (pix[-1] % 2 == 0):
if(pix[-1] != 0):
pix[-1] -= 1
else:
pix[-1] += 1
else:
if (pix[-1] % 2 != 0):
pix[-1] -= 1
pix = tuple(pix)
yield pix[0:3]
yield pix[3:6]
yield pix[6:9]
def encode_enc(newimg, data):
w = newimg.size[0]
(x, y) = (0, 0)
for pixel in modPix(newimg.getdata(), data):
# Putting modified pixels in the new image
newimg.putpixel((x, y), pixel)
if (x == w - 1):
x = 0
y += 1
else:
x += 1
# Encode data into image
def encode():
img = input("Enter image name(with extension) : ")
image = Image.open(img, 'r')
data = input("Enter data to be encoded : ")
if (len(data) == 0):
raise ValueError('Data is empty')
newimg = image.copy()
encode_enc(newimg, data)
new_img_name = input("Enter the name of new image(with extension) : ")
newimg.save(new_img_name, str(new_img_name.split(".")[1].upper()))
# Decode the data in the image
def decode():
img = input("Enter image name(with extension) : ")
image = Image.open(img, 'r')
data = ''
imgdata = iter(image.getdata())
while (True):
pixels = [value for value in imgdata.next()[:3] +
imgdata.next()[:3] +
imgdata.next()[:3]]
# string of binary data
binstr = ''
for i in pixels[:8]:
if (i % 2 == 0):
binstr += '0'
else:
binstr += '1'
data += chr(int(binstr, 2))
if (pixels[-1] % 2 != 0):
return data
# Main Function
def main():
a = int(input(":: Welcome to Steganography ::\n"
"1. Encode\n2. Decode\n"))
if (a == 1):
encode()
elif (a == 2):
print("Decoded Word : " + decode())
else:
raise Exception("Enter correct input")
# Driver Code
if name == 'main' :
# Calling main function
main()
Oh hello there, how is everything going, are you on a project this week or learning something new.....or what else?
Forwarded from A2SV | Africa to Silicon Valley (A2SV)
Opportunity to Join A2SV Remote Education: Apply now!
π Exciting News! A2SV is welcoming new members to join our remote education program.
The A2SV Remote Education Program is designed to provide the best software engineering education for every university student in Africa for free. We are seeking individuals who value teamwork, prioritize humanity, and have a resilient mindset. If you're ready for a journey of problem-solving and tech excellence, this is the opportunity for you!
π Application Registration starts Today
π Eligibility
Our Remote Education program is open to all African university students, except those from the following universities who are only eligible for our in-person education programs:
- Addis Ababa University
- Addis Ababa Science and Technology University
- Adama Science and Technology University
- University of Ghana (Legon Campus)
β³ Act now! Apply today to secure your spot, as we have limited seats and follow a rolling-based admissions process. If you have any questions, feel free to contact us via email at a2sv.remote.recruitment@a2sv.org.
π Application Deadline: August 31, 2024, 11:59 PM EAT
π To express your interest and secure your early access, please apply on our portal here: remote.a2sv.org.
π Exciting News! A2SV is welcoming new members to join our remote education program.
The A2SV Remote Education Program is designed to provide the best software engineering education for every university student in Africa for free. We are seeking individuals who value teamwork, prioritize humanity, and have a resilient mindset. If you're ready for a journey of problem-solving and tech excellence, this is the opportunity for you!
π Application Registration starts Today
π Eligibility
Our Remote Education program is open to all African university students, except those from the following universities who are only eligible for our in-person education programs:
- Addis Ababa University
- Addis Ababa Science and Technology University
- Adama Science and Technology University
- University of Ghana (Legon Campus)
β³ Act now! Apply today to secure your spot, as we have limited seats and follow a rolling-based admissions process. If you have any questions, feel free to contact us via email at a2sv.remote.recruitment@a2sv.org.
π Application Deadline: August 31, 2024, 11:59 PM EAT
π To express your interest and secure your early access, please apply on our portal here: remote.a2sv.org.