• Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
Log In
April 25, 2018

User Panel Banner
Log In

  • Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
HomeWeb SecurityCanada Hid the Konami Code In Its Commemorative $1...

Canada Hid the Konami Code In Its Commemorative $10 Bill Launch

  • April 12, 2017
  • 0 comments
  • Simon Steed
  • Posted in Web Security
  • 0
0
SHARES
ShareTweet

The Bank of Canada has hid a “Konami Code” Easter egg on its website celebrating their new $10 bank note. The Konami Code is a cheat code that appears in many Konami video games, allowing players to press a sequence of buttons on their game controller to enable the cheat. “The Bank of Canada’s web team thought the Konami code [Easter egg] was a fun way to celebrate Canada’s 150th anniversary of Confederation,” Bank of Canada spokeswoman Josianne Menard told CTV news. Engadget reports: On top of being laden with anti-counterfeiting tech that makes it extremely difficult to copy (holograms, raised ink, color-changing images and polymer materials), the new ten is a who’s who and what’s what of Canadian history. It features Canada’s founding Prime Minister John A. MacDonald, Agnes Macphail, first woman parliamentarian, and Indigenous peoples pioneer James Gladstone, known in his Blackfoot language as Akay-na-muka. It also shows Canada’s prairies, the coastal mountains of British Columbia, the Canadian Shield, Atlantic coast, northern lights, Metis Assomption Sash, maple leaf and much more (no poutine, though). All of that is squeezed on the 152.4 x 69.85 mm note — that’s exactly 6 x 2.75 inches, because Canada uses the metric system but probably still buys its printing presses from the U.S. The Konami code is in keeping with Canada’s tradition of doing cute, pop-culture things with its history.


Share on Google+

Read more of this story at Slashdot.

https://slashdot.org/slashdot-it.pl?op=discuss&id=10476693&smallembed=1

Share this

ShareTweet

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

Twitter Allegedly Deleting Negative Tweets About U...

  • April 12, 2017
  • 0 comments

Google Ruins the Assistant's Shopping List, T...

  • April 12, 2017
  • 0 comments

Share this

0
SHARES
ShareTweet

About author

Simon Steed

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

0 comments
Web Security

Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools

Tags

  • IT
  • security
  • threats

Leave a Reply Cancel reply

Do not miss

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)

Top Posts

Health trust rapped on illegal use of patient data...

  • July 5, 2017
  • 0

GDPR: who needs to hire a data protection officer?

  • July 5, 2017
  • 0

News in brief: China tightens Great Firewall; stud...

  • July 5, 2017
  • 0

Now Any Florida Resident Can Challenge What Is Tau...

  • July 4, 2017
  • 0

Court Blocks EPA Effort To Suspend Obama-Era Metha...

  • July 4, 2017
  • 0

Tags

IT security threats

Archive

Site Categories

Copyright © 2006-2016 xploiter.com
Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Video URL

Attach Video

Category
SportNewsTechMusic

Your Message

Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Subject

Your Message