Hacking campaign targets organizations through DNS hijacking attacks
infosec

Hacking campaign targets organizations through DNS hijacking attacks

Recently, a new hacking campaign, called "Sea Turtle", was launched, targeting public and private players. The characteristic...
Read More
infosec

Is the privacy of the iPhone real?

A unique ID is enabled by default on every iPhone that is available on the market, allowing advertisers to watch ...
Read More
infosec

WiFi Finder: Leak over 2 million Wi-Fi network passwords

WiFi Finder, an Android app installed by more than 100.000 users on Google Play, has leaked over ...
Read More
infosec

Cryptocurrency: Types of crime and ways of protection

When we talk about cryptocurrency always comes to our minds and crime, especially electronic crime. Cryptos are vulnerable ...
Read More
infosec tweaks

5 key steps for greater security of a data center

Data Center: We all know so far that Cloud technology has changed our lives. The cloud is here for ...
Read More
Latest Posts

What happens if we mix soda, wood and microwaves?

What can happen if you mix soda or water with microwave baking soda? Below we will see it happening on a cutting board we use in every kitchen, but we do not suggest you do it home ...

The resulting designs are called Lichtenberg figures, and their name was taken from the German natural Georg Christoph Lichtenberg. They are created exactly in the same way that lightning is created in the sky during a storm.

In this case, the branching patterns are shown by an electrically conductive baking soda solution, placed on the wood chip, and burned by a high voltage source.

As the branches are formed, heat is produced that dries the nearby surfaces. Thus burning paths are constantly changing direction and driven where there is more conductive material, ie soda.

It's an exciting experiment, which you should not try at home because you'll need several thousand volts to create Lichtenberg data. Few appliances in your home can produce as much power as the microwave.

Watch the video

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *