#security
Big move: Have I Been Pwned, a site with a collection of information on leaks that allows you to receive notification that your information has leaked somewhere, if this happens → it goes from a private Troy Hunt project to open source:
https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/
Big move: Have I Been Pwned, a site with a collection of information on leaks that allows you to receive notification that your information has leaked somewhere, if this happens → it goes from a private Troy Hunt project to open source:
https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/
Troy Hunt
I'm Open Sourcing the Have I Been Pwned Code Base
Let me just cut straight to it: I'm going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the betterment of the project and…
#Windows #tools
Curious/nice set of utilities, I recommend trying:
https://github.com/microsoft/PowerToys
Curious/nice set of utilities, I recommend trying:
https://github.com/microsoft/PowerToys
GitHub
GitHub - microsoft/PowerToys: Microsoft PowerToys is a collection of utilities that supercharge productivity and customization…
Microsoft PowerToys is a collection of utilities that supercharge productivity and customization on Windows - microsoft/PowerToys
#security #Bluetooth
Seems very critical 🤔
https://www.zdnet.com/article/blurtooth-vulnerability-lets-attackers-overwrite-bluetooth-authentication-keys/
Seems very critical 🤔
https://www.zdnet.com/article/blurtooth-vulnerability-lets-attackers-overwrite-bluetooth-authentication-keys/
ZDNet
BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys
All devices using the Bluetooth standard 4.0 through 5.0 are vulnerable. Patches not immediately available.
#security
Elasticsearch server from #Razer (a gaming device manufacturer) with customer information including addresses (email and physical), phone numbers, etc.). It never happened and now again 😅
https://arstechnica.com/information-technology/2020/09/100000-razer-users-data-leaked-due-to-misconfigured-elasticsearch/
Elasticsearch server from #Razer (a gaming device manufacturer) with customer information including addresses (email and physical), phone numbers, etc.). It never happened and now again 😅
https://arstechnica.com/information-technology/2020/09/100000-razer-users-data-leaked-due-to-misconfigured-elasticsearch/
Ars Technica
Private data gone public: Razer leaks 100,000+ gamers’ personal info
No need to breach any systems when the vendor gives the data away for free.
#programming #tech #history
Nice longread about engineering culture in #Google #cloud (and a lot more):
https://medium.com/@steve.yegge/dear-google-cloud-your-deprecation-policy-is-killing-you-ee7525dc05dc
Nice longread about engineering culture in #Google #cloud (and a lot more):
https://medium.com/@steve.yegge/dear-google-cloud-your-deprecation-policy-is-killing-you-ee7525dc05dc
Medium
Dear Google Cloud: Your Deprecation Policy is Killing You
God dammit, I didn’t want to blog again. I have so much stuff to do. Blogging takes time and energy and creativity that I could be putting…
Interesting #video from Scott Wlaschin about functional #programming and composition:
https://youtu.be/rCKPgu4DvcE (via @ajukraine)
https://youtu.be/rCKPgu4DvcE (via @ajukraine)
YouTube
The Power of Composition - Scott Wlaschin - NDC Oslo 2020
Composition is a fundamental principle of functional programming, but how is it different from an object-oriented approach, and how do you use it in practice?
In this talk for beginners, we'll start by going over the basic concepts of functional programming…
In this talk for beginners, we'll start by going over the basic concepts of functional programming…