https://fgiesen.wordpress.com/2018/09/27/reading-bits-in-far-too-many-ways-part-3/
Tags: #programming
Tags: #programming
The ryg blog
Reading bits in far too many ways (part 3)
(Continued from part 2. “A whirlwind introduction to dataflow graphs” is required reading.) Last time, we saw a whole bunch of different bit reader implementations. This time, I’l…
https://www.techspot.com/news/77482-internet-evolving-http-no-longer-use-tcp.html
Tags: #networking #technology #http
Tags: #networking #technology #http
TechSpot
The internet is evolving: HTTP will no longer use TCP
HTTP v1, v1.1 and v2 have all used TCP because it’s been the most efficient way to incorporate reliability, order and error-checking into Internet Protocol (IP). In this case, reliability refers to the server’s ability to check if any data…
https://thenextweb.com/artificial-intelligence/2018/11/15/researchers-create-master-key-fingerprints-that-can-fool-biometric-databases
Tags: #security #biometry
Tags: #security #biometry
TNW
Researchers create ‘master key’ fingerprints that can fool biometric databases
Researchers from New York University have created a set of master fingerprint keys that can be used to spoof biometric identification systems.
http://phpsadness.com/
A beautiful (well, not that much) website that includes many of the PHP problems. Because PHP (probably) sucks, but you don't expect it to be that much.
Tags: #programming #webdev #php
A beautiful (well, not that much) website that includes many of the PHP problems. Because PHP (probably) sucks, but you don't expect it to be that much.
Tags: #programming #webdev #php
https://www.cc.gatech.edu/~slee3036/papers/lee:gpu.pdf
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
A paper that describes how is possible to exploit GPUs (NVIDIA and AMD) vulnerabilities to gather infos about the last visited websites through browsers as Chromium-like or Firefox, when GPU acceleration is active.
Tags: #security #dump #browser #research
Sent us by: @jakub96
https://thehackernews.com/2018/12/linux-user-privilege-policykit.html
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
Oh well... ¯\_(ツ)_/¯
Tags: #linux #security #flaw
🎉🎉 Happy new year to you all from Techbinder staff! Hope this will be a great year for you 🎉🎉
https://blog.github.com/2019-01-07-new-year-new-github
Great news for Github Users, especially the free ones!
Tags: #github
Great news for Github Users, especially the free ones!
Tags: #github
The GitHub Blog
New year, new GitHub: Announcing unlimited free private repos and unified Enterprise offering
Today we’re announcing two major updates to make GitHub more accessible to developers.
https://futurism.com/the-byte/battery-free-bluetooth-chip
What a invention!
Tags: #technology #bluetooth
What a invention!
Tags: #technology #bluetooth
Futurism
World’s First Battery-Free Bluetooth Chip Pulls Power from the Air
Wiliot has raised an additional $30 million after demonstrating its battery-free Bluetooth chip, which pulls power from ambient radio signals.
https://newsroom.intel.com/news/intel-takes-steps-enable-thunderbolt-3-everywhere-releases-protocol/
Here USB 4.0 comes!
Tags: #hardware #technology #usb #thunderbolt
Here USB 4.0 comes!
Tags: #hardware #technology #usb #thunderbolt
Intel Newsroom
Intel Takes Steps to Enable Thunderbolt 3 Everywhere, Releases Protocol | Intel Newsroom
What's New: Intel is well on its way to making the innovation delivered with Thunderbolt™ 3 available to everyone. Today, Intel announced that it
https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5
Tags: #security #js #nodejs
Tags: #security #js #nodejs
Hackernoon
HackerNoon - read, write and learn about any technology
How hackers start their afternoon. HackerNoon is a free platform with 25k+ contributing writers. 100M+ humans have visited HackerNoon to learn about technology
https://www.forcepoint.com/blog/security-labs/attacking-internal-network-public-internet-using-browser-proxy
Tags: #networking #security #javascript
Tags: #networking #security #javascript
Forcepoint
Attacking the internal network from the public Internet using a
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a