How To Read An Image From A URL In OpenCV-Python

1 mainReading an image from a file is fairly straightforward in OpenCV-Python. But a lot of times, we would like to read an image from a URL and process it in OpenCV. One way to do it is to download the image, save it as a jpeg file, and then read it in OpenCV. But that’s too tedious! Who wants to do manual labor? Not me! Another way would be to automatically download the image as a jpeg file using wget and then reading it in OpenCV. This is slightly better, but it’s again a roundabout way of doing it because there is an intermediate step of saving the image on disk. How do we circumvent this and directly load an image from a URL into OpenCV-Python?   Continue reading

The Art Of Password Cracking

The elusive art of password-cracking has enticed many a mortal! Everyone has, at one point or the other, contemplated cracking someone’s password to get access to their private information. Whenever people hear the term ‘hacking’, the first thing that comes to their mind is ‘cracking passwords’. A lot of people think that password-cracking is the very definition of hacking. Some people think that password-cracking is the same as stealthily looking at someone type their password. I hate to burst your bubble, but that’s not password-cracking. What exactly is it then? How do we do it?   Continue reading

The Computer Infections

Do you remember getting incensed because something slowed down your computer? You don’t remember what you did, but your computer is now slow, buggy and some of the things are not working the way they are supposed to. Sounds familiar? A layman would say “your computer has been infected with a virus”. Is that right? Sure, your computer has been infected. But not everything that infects is a virus. Just like how we have racists for races, we have softists for softwares! After reading this post, you will not be one of those. You would have come across terms like malware, spyware, worms etc. Now what exactly are these things?   Continue reading

Exposing The SSL Encryption

In my previous blog post, I couldn’t discuss much about SSL encryption. I didn’t want to deviate from the main topic. So here, I discuss about the loopholes in the protocol. I have tried to simplify it as much as possible. SSL stands for Secure Sockets Layer and it is a protocol for secure communication over the internet. It just provides enough security to keep attacks at bay, but if someone reeeeally wants to get in, SSL will not be able to stop the attack. Here’s why:   Continue reading

Deconstructing The Geek Talk In The Movie ‘The Social Network’

Recently, I was watching a random Youtube video and I stumbled across a video which showed a scene from the movie ‘The Social Network’. This is a conversation between Mark Zuckerberg and Eduardo Saverin. In this scene, Zuck is interviewing candidates for the internship job in California for his company. It goes something like this:   Continue reading