The Web Developer
Westland Warrior #155: The Web Developer

How I Became a Web Developer in 3 Months Passion, Programming, and Pragmatism by Marcella Jewell GREAT BATTLE Becoming a Web Developer is like fighting in a Great Battle. If you make a wrong move, you will lose, but gain wisdom for it, with each failure you gain more wisdom, with each rebuild, you build faster. Things can get toxic all too quickly, you will have to be ready to quit, and retry. Like a Samurai, without thought, you release your Katana, cut the job, move on. WHAT TO AVOID Below is...

The Internet Expert
Westland Warrior #156: The Internet Expert

How many Spy Cameras are Recording you right now? How hackers could use smart home devices to spy on you (Marketplace) I Remove It Before Using The Phone! - Edward Snowden Breach Leaks and Data Breaches - Cyber Secrets The Top 10 Data Breaches and Biggest Hacks Is your Browser Safe Against Tracking? - Panopticlick Review Have You Been Pwned? - Computerphile Is my phone listening to me? We tested it, here's what happened. The Story of Avast Selling Users Browsing Data The Most...

The Reactive Programmer
Westland Warrior #157: The Reactive Programmer

Ew! Meet the two guys who invented the first-ever spreadsheet The Computer Chronicles - Spreadsheet Wars (1988) Introduction to Microsoft Excel 1992 Retro Tech Bytes - The Story of VisiCalc Meet the inventor of the electronic spreadsheet | Dan Bricklin The Story of Asynchronous JavaScript The Story of React Vue.js: The Documentary Svelte Origins: A JavaScript Documentary The Story of Next.js Rich Harris - Rethinking reactivity The Future of Svelte (Interview with...

The Privacy Advocate
Westland Warrior #158: The Privacy Advocate

Stop Watching Us: The Video During oil change kid finds GPS tracking device installed by FBI Tracking Device Found in Customer's Car (contains engine kill switch) How to Deactivate OnStar as Fast As Possible OwnStar - hacking cars with OnStar to locate, unlock and remote start vehicles Could Ring's video doorbell help cut down on crime? Ethical hacker shows us how easily smart devices can be hacked and give access to your personal info How Hackers Compromise Ring Cameras and Other...

The Social Engineer
Westland Warrior #159: The Social Engineer

Social Engineering, Vishing Example Why Companies Like Google And Facebook Pay Hackers Millions What is Social Engineering? Watch this hacker break into a company Watch This Russian Hacker Break Into Our Computer In Minutes Social Engineering Tricks How hackers take over your accounts using social engineering (Marketplace) Social Engineering Fraud Social Engineering by Brian Brushwood The Dark Arts of Social Engineering Who Am I Best of Kevin Mitnick, My First Social...

The Security Analyst
Westland Warrior #160: The Security Analyst

Facial Recognition, Last Week Tonight with John Oliver (HBO) From 1 to 100 pixels by Adam Harvey Retail Surveillance / Retail Countersurveillance (33c3) Defeating Facial Recognition - Retia on Hak5 How China Tracks Everyone How to spot spy cameras in everyday objects | A Current Affair Can you find hidden spy cameras with a cheap spy camera detector or free app? How many spycams can Stacey Dooley find in a love motel bedroom? Geek Girl Spy Cam Teardown with Becky Stern and...

The Cryptographer
Westland Warrior #161: The Cryptographer

QUOTE BY CARRIE ANNE > The Enigma was a tough cookie to crack > > Carrie Anne Cryptography: Crash Course Computer Science #33 Cryptography 101 - Substitution Ciphers How to use the Frequency Analysis Tool Cryptography: Transposition Cipher Poles Escape With Secret of Enigma ENIGMA MACHINE Invented by Arthur Scherbius attacked by Polish Cipher Bureau Polish cryptologists and breaking of the Enigma Enigma Machine - Numberphile Flaw in the Enigma Code -...

The Reverse Engineer
Westland Warrior #162: The Reverse Engineer

Hacker Boy Hacker Breaks Down 26 Hacking Scenes From Movies & TV | WIRED Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 Introduction to Reverse Engineering - Mike Anderson, Introduction to Firmware Reversing Intro to Hardware Reversing, Finding a UART and getting a shell DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction Hack All The Things, 20 Devices in 45 Minutes Philippe Laulheret - Intro to...

The Decepticon
Westland Warrior #163: The Decepticon

DEF CON DEF CON (also written as DEFCON, Defcon or DC) is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be...

The Librarian
Westland Warrior #164: The Librarian

Where To Begin, Audiobooks - by Climb The Stacks Audiobook Recommendations - by Climb The Stacks My Favourite Audiobooks - by Booksand Lala What If?- Book Review - by Honeysuckle Lane Historical Fiction Recommendations - by Stacy's Stories Adam Savage's Top 5 Science Fiction Books - by Adam Savage's Tested Audiobook Reviews (1/2) - by Between Chapters Audiobook Reviews (2/2) - by Between Chapters I Love Audiobooks - by Stories For Coffee 5 books worth reading this summer (2018)...

The Highschooler
Westland Warrior #165: The Highschooler

Hans Zimmer - interview influences and backgrounds Richard Feynman's Criticism on School Systems Elon Musk knocks the college experience NOTES FROM AN IMAGINARY HIGH SCHOOL: A QUICK REMINDER We knew there was no conspiracy, no deliberate ill intent, no plan to betray a student for a paycheck. Many of the teachers were our friends, family, people we admired. Many felt bad about the level of education we were receiving. But, whether they liked it or not, consciously or subconsciously, at the end...

The Principal
Westland Warrior #166: The Principal

Why most students are getting the least out of school by Dan Cardinali POVERTY OF MIND COMES FROM LACK OF NON COGNITIVE SKILLS Dan Cardinali's definition of Non Cognitive Skills includes the following: Building grit, and resilience, and persistence, and self-regulation. He's describing skills of a Warrior, a Fighter, an Authentic Grown Up. Dan Cardinali explains that ideally families should provide Non Cognitive Skills (Child Development), and then schools will deliver Academic Development (Math...

The Teacher
Westland Warrior #167: The Teacher

Aunty Puanani Burgess ❤️ Teacher Resigns During Kansas School Board Meeting With Powerful Speech Why I Dropped Out of College KNOWLEDGE VS. COLLEGE I think, he started learning the most valuable of his lessons, once he broke out oh the Grade Point Average Prison. He selected courses that matched the wisdom he already had, he selected compatible knowledge he was naturally predisposed to integrate. QUOTE BY ABRAHAM LINCOLN > The best way to predict your future is to create it. > > Abraham...

The Student
Westland Warrior #168: The Student

Astra Taylor on the Unschooled Life Texas teacher doesn’t assign homework, and she has amazing reasons why l GMA Digital A Mathematician's Lament Skipping School by Lua Martin Wells Hackschooling makes me happy by Logan LaPlante Going natural in education by Lora Smothers Why school sucks by Jad Khoury How School Makes Kids Less Intelligent by Eddy Zhong What standardized tests don't measure by Nikki Adeli Connecting Nature and Education by Bandile Phiri QUOTE BY ALBERT...