A nice trip into the past:
https://randomascii.wordpress.com/2018/01/07/finding-a-cpu-design-bug-in-the-xbox-360/
Fix All Conflicts: Easy-To-use CUI for Fixing Git Conflicts - https://github.com/mkchoi212/fac
Читать полностью…State of the art text-to-speech from Google - can you recognise which clips are human and which are the machine?
https://google.github.io/tacotron/publications/tacotron2/index.html
A readable look at the implementation of lists in Python and how it affects your Python code
https://rcoh.svbtle.com/notes-of-cpython-lists
A tool to embed PowerShell scripts inside PNG files
https://github.com/peewpw/Invoke-PSImage
ageitgey/learn-how-to-use-static-type-checking-in-python-3-6-in-10-minutes-12c86d72677b" rel="nofollow">https://medium.com/@ageitgey/learn-how-to-use-static-type-checking-in-python-3-6-in-10-minutes-12c86d72677b
Читать полностью…A simple explanation of concurrency vs parallelism
http://davidvedvick.info/notes/2017/01/20/concurrency-vs-parallelism
https://www.anexia-it.com/blog/en/improve-website-performance-with-pjax/
Tags: #pjax #webdev #javascript
Sent us by @yerst
C++ templates: Creating a compile-time higher-order meta-programming language
http://matt.might.net/articles/c++-template-meta-programming-with-lambda-calculus/
More on CSV Injection and the potential threats:
http://georgemauer.net/2017/10/07/csv-injection.html
How to create a compiler - Parser and Lexer:
https://www.youtube.com/watch?v=eF9qWbuQLuw
Educate yourself about the new processor security flaw and the impact it will have:
Project Zero: Reading privileged memory with a side-channel
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
spectreattack.com
Why xor reg, reg is the best way to zero a register:
https://stackoverflow.com/questions/33666617/what-is-the-best-way-to-set-a-register-to-zero-in-x86-assembly-xor-mov-or-and/33668295#33668295
Live streams and recordings from the Chaos Communication Congress on a variety of topics:
https://streaming.media.ccc.de/34c3
How an NSA backdooring attempt showed up years later in printer software:
https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
A series of posts by the developers of Crash Bandicoot about making the game and what the industry was like in the 90s
http://all-things-andy-gavin.com/2011/02/02/making-crash-bandicoot-part-1/
The Cost Of JavaScript (and how to reduce it)
https://medium.com/dev-channel/the-cost-of-javascript-84009f51e99e
https://unqualifiedreservations.wordpress.com/2007/08/02/whats-wrong-with-cs-research/
Читать полностью…⚠️‼️ WPA2 (which most personal and cooperate wi-fi use) has several protocol-level flaws. Be adviced that no details are known yet, security researchers will release them later today. (No severity rating from our side until we have more information)
More info: http://yt.gl/krackattack (this will be released later today)
http://yt.gl/krcm7 (Arstechnica with all current info)
#alert #prenotification #exploit #zeroday #wifi #wireless #wpa2
Please feel free to discuss this in our @itsectalk group & forward 📬 to your net- and sysadmins!
Note: This article contains no actual evidence. The author just states that "someone at the NSA" gave him this information.
It might be true or not, but either way it is interesting.