CategoryGeneral

J-Lock Encryption Tool

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For more information please contact us at: apps[at]devcoons.com. The full...

Automotive most used protocols – KWP2000 and UDS.

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of a set of communications...

How to manipulate an enormous Data Set

Data Preparation is the core of data science and it is crucial for any data analysis. It involves data cleansing and feature engineering. Usually, this takes 60 to 80 percent of the whole analytical pipeline. However, it is a mandatory task in order to get the best accuracy from machine learning algorithms on your data-sets [1]. The first part of this process is the Data Cleansing is the process...

The blockchain technology

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a white-paper entitled Bitcoin: A Peer-To-Peer Electronic Cash System...

Bitcoin and the Greater fool theory

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the time. Moreover, there...

Upgrading CNC 3020 to support USB connection

The 3020 CNC router is a popular Chinese machine for a good reason. For around 500EUR, you can have a simple CNC with a rigid all-aluminum frame, three decent stepper motors, and pretty good resolution. However, a major disadvantage of this CNC is the out-of-date electronic parts. The motor controller is using a parallel port which is not available in any new computer(PC). For that reason, it is...

Difference between K-means and K-nearest neighbor algorithm

In short, the algorithms are trying to accomplish different goals. K-nearest neighbor is a subset of supervised learning classification (or regression) algorithms (it takes a bunch of labeled points and uses them to learn how to label other points). It is supervised because you are trying to classify a point based on the known classification of other points. In contrast, K-means is a subset of...

How to install Latex (texStudio) in a Windows PC

In this post we will introduce how to install MiKTeX plus TeXstudio on windows. This is very easy! You simply have to accept just about all the default settings. Step 1: To begin with you have to go to the MikTeX website and navigate at the downloading page. From there you could pick the appropriate installer (32bits or 64bits) based on your system. [ Link ] Step 2: Just start the installation...

Obfuscation techniques for Malwares

An obfuscation technique (also called Polymorphism) is a way of constructing a malware that make it more difficult to detect. If a malware is hard to detect, it is likely to spread more widely. The following are commonly used obfuscation techniques: Self-Encryption and Self-Decryption. Some viruses can encrypt and decrypt their virus code bodies, concealing them from direct...

Markdown Typography – Windows GUI Editor

Markdown, originally written as a Perl script by John Gruber and Aaron Swartz in 2004, has caught fire and the technology has exploded into many different forms of “text to HTML” markup engines. The original Markdown code has largely been unchanged through the years, while alternative versions have come to build on it. Since the creators of Markdown don’t want anybody using the “Markdown” name...

Disclaimer: The present content may not be used for training artificial intelligence or machine learning algorithms. All other uses, including search, entertainment, and commercial use, are permitted.

Categories

Tags