2013   52269

« earlier    

Repeated attacks hijack huge chunks of Internet traffic, researchers warn | Ars Technica
Since February, they have observed 38 distinct events in which large blocks of traffic have been improperly redirected to routers at Belarusian or Icelandic service providers. The hacks, which exploit implicit trust placed in the border gateway protocol used to exchange data between large service providers, affected "major financial institutions, governments, and network service providers" in the US, South Korea, Germany, the Czech Republic, Lithuania, Libya, and Iran.
bgp  cybersecurity  2013 
5 days ago by bwiese
Joysticks and Gamepad Controllers | FS-UAE Amiga Emulator
This information is outdated. Several more controllers are supported out of the box. Also, FS-UAE Launcher comes with an easy-to-use GUI for map the buttons of any gamepad or joystick.
2013  amiga  emulator  hardwaresupport  reference  usb  gaming  linux  ubuntu  ubuntu.raring  mint  compatibility 
5 days ago by ezequiel
Use Voice Dictation to Save Time on Android, iPhone, and iPad
(This is a pretty decent primer on how to use the built-in voice dictation on iOS and Android.)
“Touch-screen keyboards can be slow, especially on phones with small screens. To enter text more naturally, you can use your phone or tablet’s voice dictation feature. Just speak — punctuation included — and your device will convert what you say to text.”
android  dictation  accessibility  2013  ios  tutorials  howtogeek 
6 days ago by handcoding
The Malawi I Loved | Paul Theroux
Half a century since serving in the Peace Corps in Nyasaland, I recall my first infatuation with a landscape and its people.
19th  september  2013  departures  paul  theroux  malawi 
6 days ago by pnjman
"Use Selection for Find"
“It’s standard in OS X for cmd+e to be the shortcut for ‘Use Selection for Find’. One can select text, press cmd+e, then press cmd+g to find the next occurrence of this text.”
mac  macos  osx  search  find  keyboard  shortcuts  2013 
7 days ago by handcoding
How to write comments inside a JSON document - Quora
A: Comments in JSON are not semantically valid on purpose, but here's a common technique suggested by Douglas Crockford to annotate your JSON: [...]
2013  forumthread  json  example  tips  fileformats 
7 days ago by ezequiel
border - Add padding to bordered paragraph - Super User
(If you should need to add padding to a paragraph in Word:)
“‘Cell padding’ as such does not exist in Word, but you can try these: (I have Word 2007 2010 for Windows right now, but the commands should be similar)

1. “Open Borders and Shading dialog (Ribbon -> Home Tab, Paragraph sub tab, click on the arrow near the ‘Borders’ icon)
2. “Click on ‘Borders and Shading’
3. “Click on ‘Options…’
4. “Adjust the values in ‘From text’

“For the left and right ‘padding’ the ‘Left Indent’, ‘Right Indent’ and ‘Hanging Indent’ handles in the ruler may help (View Tab - > Show/Hide -> Ruler if the ruler is not visible)”
word  cellpadding  padding  paragraphs  2013 
11 days ago by handcoding
Living on a Food Pantry Diet by Kathryn M. Jackelen | St. Catherine University
USEFUL: Minnesota study of #food #bank users debunks traditional assumptions + Correlations to SNAP use & #car ownership
food  pantry  SNAP  stamps  assistance  2013  study  minnesota  suburb  car  Owner  family  twincities 
12 days ago by csrollyson
NSA Laughs at PCs, Prefers Hacking Routers and Switches | WIRED
The NSA's focus on routers highlights an often-overlooked attack vector with huge advantages for the intruder, says Marc Maiffret, chief technology officer at security firm Beyond Trust. Hacking routers is an ideal way for an intelligence or military agency to maintain a persistent hold on network traffic because the systems aren't updated with new software very often or patched in the way that Windows and Linux systems are.

But if Lynn knew about the vulnerability, there were likely others who did as well – including intelligence agencies and criminal hackers.

Source code for Cisco's IOS has been stolen at least twice, either by entities who were interested in studying the software to gain a competitive advantage or to uncover vulnerabilities that would allow someone to hack or control them.
cybersecurity  router  routers  nsa  backdoor  2013 
16 days ago by bwiese
Adjective, Participle, or Gerund? « Literal-Minded
This page offers a potentially handy flow chart on how to figure out whether “the X-ing NOUN” is an adjective, a participle, or a gerund:

“Is the phrase grammatical with ‘very X-ing’?”

YES → It’s an adjective

NO ⤵
“Is the phrase grammatical with ‘ADVERB X-ing’?”

YES → It’s a participle

NO → It’s a gerund.
gerunds  participles  adjectives  grammar  editing  2013 
18 days ago by handcoding

« earlier    

related tags

&  (wing  -  10  1930s  1960s  1970s  1980s  1993  19th  1st  2001  2010  2010s  2012  2014  2015  2016  2017  2018  21%  a-2018  above  abstract_art  ac2k  access  accessibility  aclu  act  adjectives  advice  aerial  algo  alwaysontop  ambient  ambiguity  ambivalence  americanfinearts  amiga  android  animal  animals  animation  anniversary  antarctica  antifragile  api  appearance  apps  architecture  archive  art  artforum  asianefficiency  assassination  assistance  astrophysics  asymmetry  attorneygeneral  auckland  austrian  automation  automotive  azealiabanks  back  backdoor  backdrop  background  beat  being  benefit  bernadettecorporation  best  bgp  bill_acker  biology  birds  blind  blog  blogpost  bombing  book  books  bottle  brach  broadcast  buildinggreen  can  cancer  canoe  canonical  car  cars  cartoon  cast  cats  cbs  cellpadding  census  character  charger  children  chilling  chinese  chirality  choose  chryslerbuilding  cia  cities  citizenship  classideas  coldwar  colindeland  colonialism  commas  communication  community  company  compatibility  compilation  compound  conference  conflict  conspiracy  container  containers  contracts  contradiction  controversy  cooperunion  copyediting  corruption  corvids  court  crime  css  cybersecurity  cypres  data  database  daumier  death  defaults  departures  depth  deschooling  design  designer  dh  diananyad  dictation  digital  discus  disney  dispersion  disposition  distinction  distributed  diversification  dna  does  donaldtrump  dotgrid  doubt  drone  drop  drywall  duct  ductless  dumpster  earworm  ecommerce  editing  education  edwardmurrow  ekranoplanes:  emit  empty  emulator  encoded  endowment  enemy  energy  english  espionage  espn  essence  ethics  ethnography  etps  event  everywhere  evidence  example  exception  exhibition  eyalweizman  failure  family  fandom  felixsalmon  fileformats  film  filmmaking  final  finance  find  findings  fonts  food  for  foreden  foreground  forensicarchitecture  forumthread  fp  free  freenetworkfoundation  from  from:acm  from:jacobin  from:newyorker  fuel  fujitelevision  fundraising  future  futures  fuzzy  gaming  gap  generational  genetics  geocities  gerunds  google  governance  grammar  ground-effect)  hacker  hanshaacke  hardwaresupport  hauntology  hd  hedge  highereducation  hipaa  history  holding  hovering  howtogeek  howwelearn  htc  humanities  hyperperspicacity  i  ice  icecube  identity  identitypolitics  imagination  in  individual  informal  informallearning  information  institution  intelligence  interaction  international  internet  interviews  intraaction  ios  isaacwilder  it  ivi  japanese  javascript  jfk  joint  json  kansas  karenbarad  kellyanneconway  keyboard  kitaj  kriskobach  lacuna  lang  language  law  learning  legal  level  leviathan  libraries  lies  life  link  linked  linux  listening  log  logging  london  long_island  loop  lowest  luciencastaing-taylor  lynn  mac  macappstore  macos  macworld  malawi  malfunctioning  mass  mathiaspoledna  matter  media  memory  mentor  mikemills  military  mini-splits  minnesota  mint  mkv  moebius  moma  moneydance  monospaced  monument  morethanhuman  morton  mouse  movementstrategy  ms  multiple  multispecies  mundane  music  musicnews  nature  necropolitics  netneutrality  network  neutrino  new_york  newyork  noise  nonorientable  nostalgia  nowness  nsa  nvra  nz  obituary  observatory  occult  of  olialialina  oliversacks  omnibus  on  openu  openuniversity  oriondanjuma  osx  owasp  owner  ows  padding  painting  pandoc  pantry  paper  paragraphs  participles  pattern  paul  pbs  pdf  phenomenon  phi  phil_lapsley  phone  phone_phreaking  photography  pigeons  politics  potential  powershell  presence  productivity  programming  project  pronunciation  prostheric  public  putting  python  qif  quarry  quotes  radiation  radio  ravens  reach  reading  realestate  recourse  recycling  reference  repair  report:  representation  reproduction  research  researchanddevelopment  resolution  rest  retail  review  right  ritaora  roaming  router  routers  royal_academy  rules  russia  sacrifice  safari  satire  scaling  school  science  screenshots  search  security  selfdriving  sensor  sensoryethnography  sensoryethnographylab  september  sfmoma  sharepoint  shipments  shortcuts  shōnan  sidebar  signal  siliconvalley  since  smartphone  smartquotes  snap  soaring  socialmedia  sociology  software  sound  spackle  speculation  speech  stackexchange  stackoverflow  stamps  standards  stanford  state  steveking  study  style  suburb  such  suchas  superbrown  surface  systems  tail  taleb  talks  target  tax  taxes  techcrunch  technology  telegraph  telescope  television  terminololgy  terracehouse  terror  the  theatlantic  theguardian  theroux  thestoneroses  threshhold  timothy  tips  to  top  torrent  trademark  translation  transport  trust  truth  tuition  tutorials  tv  twincities  twist  twitter  twittercanoe  typefaces  types  ubiquity  ubuntu.raring  ubuntu  uncertainty  underground  unitedstates  university  unreality  unschooling  unthinkable  urban_life  usb  use  using  vector  vehicle  vernacular  video  vietnamewar  vim  violence  vix  votersuppression  voting  vérénaparavel  waltercronkite  war  water  waves  wayback  website  weird  which  whitneybiennial  wig  wired  with  word  work  workflow  worm  writing  ww2  youth  |   

Copy this bookmark:



description:


tags: