Over one year ago we introduced a subscription feature in our bot to let you receive posts about the topics you are interested into the most. Are you using it or do you not find it interesting?
anonymous poll
🤪 Didn't know you had a bot – 85
👍👍👍👍👍👍👍 69%
🤔 Didn't know you had such feature – 26
👍👍 21%
👎 Not using it and not interested – 8
👍 6%
👍 Yes, using and interested – 3
▫️ 2%
❤️ I love it – 2
▫️ 2%
👥 124 people voted so far.
anonymous poll
🤪 Didn't know you had a bot – 85
👍👍👍👍👍👍👍 69%
🤔 Didn't know you had such feature – 26
👍👍 21%
👎 Not using it and not interested – 8
👍 6%
👍 Yes, using and interested – 3
▫️ 2%
❤️ I love it – 2
▫️ 2%
👥 124 people voted so far.
https://latesthackingnews.com/2018/09/30/mojave-flaws-allow-an-attacker-to-bypass-full-disk-access-requirement/
Tags: #security #macos
Tags: #security #macos
Latest Hacking News
Mojave Flaws Allow An Attacker To Bypass Full Disk Access Requirement
Right after the launch of the latest MacOS Mojave, researchers have begun discovering various security vulnerabilities. Amidst the claims of releasing a specific protective OS for the users, such bugs raise concerns about the security features. Recently,…
https://mynameismjp.wordpress.com/2018/09/08/breaking-down-barriers-part-5-back-to-the-real-world/
Tags: #programming #cpp
Tags: #programming #cpp
The Danger Zone
Breaking Down Barriers – Part 5: Back To The Real World
You can find an ad-free static site version of this post here: This is Part 5 of a series about GPU synchronization and preemption. You can find the other articles here: Part 1 – What’s…
https://dzone.com/articles/software-architecture-the-5-patterns-you-need-to-k
Tags: #software #development
Tags: #software #development
DZone
Software Architecture: The 5 Patterns You Need to Know
This list of five important architecture design patterns are essential for software developers and architects alike. Learn their advantages and disadvantages.
https://codeburst.io/software-architecture-the-difference-between-architecture-and-design-7936abdd5830
Tags: #software #architecture #development
Tags: #software #architecture #development
Medium
Software Architecture - The Difference Between Architecture and Design
Many people don’t really know the difference between software architecture and software design. Even for developers, the line is often…
https://fgiesen.wordpress.com/2018/09/27/reading-bits-in-far-too-many-ways-part-3/
Tags: #programming
Tags: #programming
The ryg blog
Reading bits in far too many ways (part 3)
(Continued from part 2. “A whirlwind introduction to dataflow graphs” is required reading.) Last time, we saw a whole bunch of different bit reader implementations. This time, I’l…
https://www.techspot.com/news/77482-internet-evolving-http-no-longer-use-tcp.html
Tags: #networking #technology #http
Tags: #networking #technology #http
TechSpot
The internet is evolving: HTTP will no longer use TCP
HTTP v1, v1.1 and v2 have all used TCP because it’s been the most efficient way to incorporate reliability, order and error-checking into Internet Protocol (IP). In this case, reliability refers to the server’s ability to check if any data…
https://thenextweb.com/artificial-intelligence/2018/11/15/researchers-create-master-key-fingerprints-that-can-fool-biometric-databases
Tags: #security #biometry
Tags: #security #biometry
TNW
Researchers create ‘master key’ fingerprints that can fool biometric databases
Researchers from New York University have created a set of master fingerprint keys that can be used to spoof biometric identification systems.
http://phpsadness.com/
A beautiful (well, not that much) website that includes many of the PHP problems. Because PHP (probably) sucks, but you don't expect it to be that much.
Tags: #programming #webdev #php
A beautiful (well, not that much) website that includes many of the PHP problems. Because PHP (probably) sucks, but you don't expect it to be that much.
Tags: #programming #webdev #php
https://www.cc.gatech.edu/~slee3036/papers/lee:gpu.pdf
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
https://thehackernews.com/2018/12/linux-user-privilege-policykit.html
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw