The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

It is an open-source project whose purpose is to bring macOS game emulation into the realm of first-class citizenship. The project leverages modern macOS technologies, such as Cocoa, Metal, Core Animation, and other third-party libraries. One third-party library example is Sparkle, which is used for auto-updating. OpenEmu uses a modular architecture, allowing for game-engine plugins, allowing OpenEmu to support a host of different emulation engines and back ends while retaining the familiar macOS native front end.

Currently, OpenEmu can load the following game engines as plugins:

  • Atari 2600 (Stella)
  • Atari 5200 (Atari800)
  • Atari 7800 (ProSystem)
  • Atari Lynx (Mednafen)
  • ColecoVision (CrabEmu)
  • Famicom Disk System (Nestopia)
  • Game Boy / Game Boy Color (Gambatte)
  • Game Boy Advance (mGBA)
  • GameCube (Dolphin)
  • Game Gear (Genesis Plus)
  • Intellivision (Bliss)
  • NeoGeo Pocket (Mednafen)
  • Nintendo (NES) / Famicom (FCEUX, Nestopia)
  • Nintendo 64 (Mupen64Plus)
  • Nintendo DS (DeSmuME)
  • Odyssey² / Videopac+ (O2EM)
  • PC-FX (Mednafen)
  • SG-1000 (Genesis Plus)
  • Sega 32X (picodrive)
  • Sega CD / Mega CD (Genesis Plus)
  • Sega Genesis / Mega Drive (Genesis Plus)
  • Sega Master System (Genesis Plus)
  • Sega Saturn (Mednafen)
  • Sony PSP (PPSSPP)
  • Sony PlayStation (Mednafen)
  • Super Nintendo (SNES) (BSNES, Snes9x)
  • TurboGrafx-16 / PC Engine (Mednafen)
  • TurboGrafx-CD / PCE-CD (Mednafen)
  • Vectrex (VecXGL)
  • Virtual Boy (Mednafen)
  • WonderSwan (Mednafen)

The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

I recently came across this amazing website & thought of sharing.

Here is how it works.

STEP 1 - Search any property

Find leading physical climate risk modeling for any property in the U.S. Enter a property address above to get started.

STEP 2 - Review the risks

Get a comprehensive risk overview and access detailed reports about past, present and future risks as well as high-level solutions to help mitigate risk. Free for all residential properties.

STEP 3 - Make informed decisions

Dive deeper into the cause of the risk, explore interactive maps, estimate damage and downtime for the building, and explore preventative solutions after creating a free Risk Factor account.

The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

The cursor will be moved to zero coordinates (can be changed, line 23) after starting the application.

If the cursor is moved, the computer camera will take 1 photo, and the mss module will take 1 screenshot of the screen, all this will be sent to the telegram channel (need to be created), after a delay of 1-3 seconds. the procedure will be repeated again. Then there will be a delay of 5 seconds, the cursor will be moved to the coordinate that is written on line 76, this is done in case someone accidentally hits the computer mouse!

To work, you need to create a telegram bot and write down its token on line 13, and on line 14, enter the id of the channel where the photos will be sent. Bot needs to be added as an admin!

After you have filled in the 13th and 14th scale, you can build the .exe file by running the command in cmd:  pyinstaller -F --onefile --nocosole

Create a shortcut to the program and add to startup: c:\Users\ACCOUNT LOGIN\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup this will allow the program to start even after a system reboot.

The key combination alt + a (line 41) will put the program into standby mode and move the cursor to coordinates 500, 500 (to understand that the program is not active)

The key combination ctrl + alt (line 33) will put the program into active mode

Download Watcher

The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

Forensic Image Analysis is the application of image science and domain expertise to interpret the content of an image and/or the image itself in legal matters. Major subdisciplines of Forensic Image Analysis with law enforcement applications include: Photogrammetry, Photographic Comparison, Content Analysis, and Image Authentication." (Scientific Working Group on Imaging Technologies)

It is not meant as an automatic tool that decide if an image is forged or not (that tool probably will never exist...), but as a companion in experimenting with various algorithms found in the latest research papers and workshops.

While many commercial solutions have high retail prices and often reserved to law enforcement and government agencies only, this toolset aims to be a both an extensible framework and a starting point for anyone interested in making experiments in this particular application of digital signal processing.

Modern Qt-based GUI with multiple tool window management

Support for many formats (JPEG, PNG, TIFF, BMP, WebP, PGM, PFM, GIF)

Highly responsive image viewer with real-time pan and zoom

Many state-of-the-art algorithms to try out interactively

Export both visual and textual results of the analysis

Extensive online help with explanations and tutorials


  • Original Image: display the unaltered reference image for visual inspection
  • File Digest: retrieve physical file information, crypto and perceptual hashes
  • Hex Editor: open an external hexadecimal editor to show and edit raw bytes
  • Similar Search: browse online search services to find visually similar images


  • Header Structure: dump the file header structure and display an interactive view
  • EXIF Full Dump: scan through file metadata and gather all available information
  • Thumbnail Analysis: extract optional embedded thumbnail and compare with original
  • Geolocation Data: retrieve optional geolocation data and show it on a world map


  • Enhancing Magnifier: magnifying glass with enhancements for better identifying forgeries
  • Channel Histogram: display single color channels or RGB composite interactive histogram
  • Global Adjustments: apply standard image adjustments (brightness, hue, saturation, ...)
  • Reference Comparison: open a synchronized double view for comparison with another picture


  • Luminance Gradient: analyze horizontal/vertical brightness variations across the image
  • Echo Edge Filter: use derivative filters to reveal artificial out-of-focus regions
  • Wavelet Threshold: reconstruct image with different wavelet coefficient thresholds
  • Frequency Split: split image luminance into high and low frequency components


  • RGB/HSV Plots: display interactive 2D and 3D plots of RGB and HSV pixel values
  • Space Conversion: convert RGB channels into HSV/YCbCr/Lab/Luv/CMYK/Gray spaces
  • PCA Projection: use color PCA to project pixel onto most salient components
  • Pixel Statistics: compute minimum/maximum/average RGB values for every pixel


  • Noise Separation: estimate and extract different kind of image noise components
  • Min/Max Deviation: highlight pixels deviating from block-based min/max statistics
  • Bit Planes Values: show individual bit planes to find inconsistent noise patterns
  • PRNU Identification: exploit sensor pattern noise introduced by different cameras


  • Quality Estimation: extract quantization tables and estimate last saved JPEG quality
  • Error Level Analysis: show pixel-level difference against fixed compression levels
  • Multiple Compression: use a machine learning model to detect multiple compression
  • JPEG Ghost Maps: highlight traces of different compression levels in difference images


  • Contrast Enhancement: analyze color distribution to detect contrast enhancements
  • Copy-Move Forgery: use invariant feature descriptors for cloned area detection
  • Composite Splicing: exploit DCT statistics for automatic splicing zone detection
  • Image Resampling: estimate 2D pixel interpolation for detecting resampling traces


  • Median Filtering: detect processing traces left by nonlinear median filtering
  • Illuminant Map: estimate scene local light direction on estimated 3D surfaces
  • Dead/Hot Pixels: detect and fix dead/hot pixels caused by sensor imperfections
  • Stereogram Decoder: decode 3D images concealed in crossed-eye autostereograms

The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

This sample deploys a Lambda function that monitors IPv4 utilization for Amazon VPC Subnets and published the metrics to CloudWatch as custom metrics.


The following metrics are published.


Gives a count of the total number of IPv4 addresses available in the subnet.


Gives a count of the total possible IPv4 addresses in the subnet CIDR (based on the prefix, not usable IPs).


Gives the count of IPv4 addresses current used including reserved IP addresses and IP addresses used by ENIs.


Shows the percentage (as a float, not decimal representation of the percentage) of IPv4 space unusable in the subnet. 

The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting


This program alerts you to take micro breaks, rest breaks and limits your daily computer usage.

It monitors your keyboard and mouse usage and uses this information to prevent your health from getting worse.

Microbreaks: Workrave often reminds you of a little break. Usually every 3 minutes there is a micro-break that lasts about 30 seconds. The exact duration and frequency of the microblock can be fully customized. During a micro break, you can let go of your keyboard and mouse, take your eyes off the screen, and relax a bit.

Rest breaks: Several times a day, Workrave reminds you to take a break from your computer. The rest break usually lasts about 10 minutes every 45 minutes, but the duration and frequency are configurable. During your rest break, you can walk, stretch and relax.

Daily limit: Workrave tracks the amount of time you use your computer. When you have reached your configured daily computer usage limit, you will be prompted to stop using your computer for the day.

Statistics: You can see the number of breaks per day you have taken as well as the number of breaks you have ignored and postponed. Also available is the amount of time you use your computer daily, weekly, and monthly.

Download workrave

no image
The Secure Planet, Cyber Security, Audit Compliance, Digital Forensics, Corporate training, CISSP, CISA, CISM, Information Security consulting

Job Description :

- The DPO will play a crucial role in ensuring compliance with data protection laws and regulations, establishing data protection policies, and fostering a culture of data privacy within manufacturing operations.

- Monitor and ensure compliance with data protection laws and regulations relevant to the manufacturing sector.

- Stay updated with evolving data protection requirements and recommend necessary changes to company practices.

- Collaborate with relevant departments to ensure adherence to data protection policies and guidelines.

- Develop, implement, and update data protection policies, procedures, and guidelines tailored to the manufacturing sector.

- Provide guidance to employees on data protection matters, ensuring awareness and adherence to policies.

- Conduct Privacy Impact Assessments for new projects, processes, and technologies that involve the processing of personal data.

- Identify potential privacy risks and recommend mitigating measures.

- Review and assess data processing agreements with third-party vendors, suppliers, and partners to ensure compliance with data protection standards.

- Collaborate with legal and procurement teams to address data protection clauses in contracts.

- Manage data subject access requests and inquiries related to data protection rights, ensuring timely and accurate responses.

- Facilitate the exercise of data subject rights, including requests for data deletion, rectification, and portability.

- Establish and maintain procedures for managing data breaches, including investigation, notification to authorities, and affected individuals, as required.

- Coordinate with relevant stakeholders to mitigate potential harm and prevent future breaches.

- Organize data protection training sessions for employees to promote a culture of privacy and data security.

- Raise awareness about data protection among various levels of the organization.

Qualifications :

- Bachelor's + Master's degree in law, information technology, or a related field. Advanced degrees or certifications in data protection and privacy (e.g., CIPP/E, CIPM, FIP, CT-DPO) are preferred.

- Proven experience in data protection, privacy, or legal roles, preferably within a manufacturing or industrial context.

- In-depth knowledge of data protection laws and regulations relevant to the manufacturing sector.

Note: Job link is active at the time of posting. It may not work if you are checking this post at a later date. I don't get/charge any referral/commission for posting jobs. It's purely to help other professionals. Click Apply for detailed job description & application process.