4016
ElectroBSD - The might to deliver onions - Free as in free (electro) beer and freedom
Fork of FreeBSD with interesting features like:

"The unencrypted boot pool (and the keyfile) can be destroyed with cloudiatr after the system has booted.

An attacker with physical access to the system who does not have the skills or the time to read out the memory while the system is running, will not be able to read the encrypted data on disk after shutdown, even if the passphrase is known. ElectroBSD experts will gladly try (and write bills for their service) anyway."
unix  security 
16 hours ago
Why Experts Make Bad Teachers — Medium
We’d all agree that to teach a subject, you must know the subject. So you’d think that experts would be the best teachers, but they’re not…
culture 
20 hours ago
What have I done
You attempted to reach stribika.github.io, but instead you actually reached a server identifying itself as a shape shifter humanoid reptile alien. This may be caused by a misconfiguration on the server or something more serious. An attacker on your network could be trying to get you to visit a fake (and definitely harmful) version of stribika.github.io. You should not proceed.
yesterday
Unreal® Engine 4 on OpenPOWER™ / Raptor Engineering::Talos™ Secure Workstation
Unreal® Engine Game Development and Unreal Tournament™ Gameplay Demonstration

This video illustrates the power unleashed by OpenPOWER and Talos™ to accelerate your game development.
2 days ago
New attack bypasses HTTPS protection on Macs, Windows, and Linux | Ars Technica
Hack can be carried out by operators of Wi-Fi hotspots, where HTTPs is needed most.
security 
3 days ago
Why Trump? | George Lakoff
"How do the various policy positions of conservatives and progressives hang together? […] The answer came from a realization that we tend to understand the nation metaphorically in family terms: We have founding fathers. We send our sons and daughters to war. We have homeland security. The conservative and progressive worldviews dividing our country can most readily be understood in terms of moral worldviews that are encapsulated in two very different common forms of family life: The Nurturant Parent family (progressive) and the Strict Father family (conservative)."

"Empirical research has shown that conservatives tend to reason with direct causation and that progressives have a much easier time reasoning with systemic causation. The reason is thought to be that, in the strict father model, the father expects the child or spouse to respond directly to an order and that refusal should be punished as swiftly and directly as possible.

Many of Trump’s policy proposals are framed in terms of direct causation."
culture 
4 days ago
Using the fuse Erlang library to implement the Circuit Breaker Pattern in Elixir
When running into temporary interruptions when interfacing with external web APIs, I was reminded of an article from Heroku on the circuit breaker pattern. The particular application is developed on the Phoenix web framework and Elixir. A search did not...
elixir  erlang 
6 days ago
I got arrested in Kazakhstan and represented myself in court — Medium
When I was arrested in San Francisco, I ended up spending a night in prison naked, in solitary confinement. But, I have a dirty secret: it…
8 days ago
Designing Safe Software Systems Part 2 | Dr Dobb's
Software tools and techniques for global software development. Dr. Dobb's features articles, source code, blogs,forums,video tutorials, and audio podcasts, as well as articles from Dr. Dobb's Journal, BYTE.com, C/C++ Users Journal, and Software Development magazine.
security 
9 days ago
We need tool support for keyset pagination — No Offset
Pagination without OFFSET has several benefits but one major problem: there is no tool support. Please help changing this.
9 days ago
Dollar Shave Club and The Disruption of Everything – Stratechery by Ben Thompson
Dollar Shave Club is a textbook example of how the new Internet economy will destroy value in incumbent industries.
10 days ago
Malware in the browser: how you might get hacked by a Chrome extension
A case study of a Chrome extension that turned out to be some nasty botnet malware.
security 
10 days ago
The Languages Which Almost Became CSS - Eager Blog
The history of all the languages which almost became CSS.
css 
13 days ago
Understanding Our Polarized Political Landscape Requires a Long, Deep Look at Our Worldviews - Scientific American Blog Network
Brexit, Trump, the Bernie Sanders phenomenon and more can be explained by examining evolving categories of fundamental beliefs
culture 
29 days ago
Tega Brain: Being Radiotropic
"Being Radiotropic is a series of eccentric wireless routers exploring this sensitivity and that asks how we might otherwise design our wireless infrastructures."
via:gohai 
4 weeks ago
Stop Using Google Trends — Medium
Alternatively titled ‘Be aware of context, and maybe start using Google AdWords’ Instead
4 weeks ago
What ORMs have taught me: just learn SQL - Curried lambda
I've come to the conclusion that, for me, ORMs are more detriment than benefit. In short, they can be used to nicely augment working with SQL in a program, but they should not replace it. Some...
4 weeks ago
Troy Hunt: The “Cobra Effect” that is disabling paste on password fields
Back in the day when the British had a penchant for conquering the world, they ran into a little problem on the subcontinent; cobras. Turns out there were a hell of a lot of the buggers wandering around India and it also turned out that they were rather venomous which
security 
4 weeks ago
NAT64/DNS64 on OpenWRT | Technical Intercourse on WordPress.com
The latest stable release of OpenWRT - Barrier Break - makes it a simple matter to add NAT64 and DNS64 capabilities to the router. This is particularly useful if one wishes to run an IPv6 only internal LAN network while dealing with the IPv4 + IPv6 world of the Internet. DNS64 DNS64 provides a faux…
admin 
4 weeks ago
Opening the Black Box: Publishing Pebble’s activity-tracking algorithms — Pebble Research — Medium
When I started my study of bipolar disorder, I spent an inordinate amount of time comparing different devices, each differing in ease of…
5 weeks ago
Esh
Imagine you have a vulnerable procedure (e.g. Heartbleed), and you want to check if it was embedded in some binary in your organization, but don't know what compiler was used, or whether the code was patched. Other use-cases can be clone detection for reducing code-base maintenance code-reuse or for identifying IP theft, etc. That's where Esh comes in!
security 
5 weeks ago
The hi/lo algorithm | Vlad Mihalcea's Blog on WordPress.com
Introduction In my previous post I talked about various database identifier strategies, you need to be aware of when designing the database model. We concluded that database sequences are very convenient because they are both flexible and efficient for most use cases. But even with cached sequences, the application requires a database round-trip for every…
postgres 
5 weeks ago
Why HttpOnly Won't Protect You
Before going in depth criticizing the HttpOnly session protection mechanism I better explain what it is and why it is useful.
security 
5 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs erlang fun gc git golang graphics hardware haskell java javascript latex math music mysql nethack networking ocaml photoshop php pl postgres privacy prolog python redis ruby rust scala security smalltalk svg swift talk tools typography unicode unix via:gohai via:macdrifter via:sunpig via:tlockney video vim webdev windows zfs

Copy this bookmark:



description:


tags: