https://securelist.com/zero-day-vulnerability-in-telegram/83800/
An analysis of Russian Telegram RTL character attack under Windows environment.
Tags: #security #telegram #flaw
An analysis of Russian Telegram RTL character attack under Windows environment.
Tags: #security #telegram #flaw
Securelist
Zero-day vulnerability in Telegram
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.
https://gizmodo.com/researchers-find-new-ways-to-exploit-meltdown-and-spect-1823020029
Meltdown and Spectre got updated to their "Prime" version. By exploiting now cache invalidation protocols.
Tags: #security #exploit #flaw
Meltdown and Spectre got updated to their "Prime" version. By exploiting now cache invalidation protocols.
Tags: #security #exploit #flaw
Gizmodo
Researchers Find New Ways to Exploit Meltdown and Spectre Vulnerabilities in Modern CPUs
In the past few weeks, the entire information security industry has grown very anxious about Meltdown and Spectre, two classes of exploits that can be used to manipulate vulnerabilities in the way many varieties of modern processors (but especially Intel…
https://bagder.gitbooks.io/http2-explained/en/
A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
https://codeburst.io/node-js-v8-internals-an-illustrative-primer-83766e983bf6
A very great explanation of how Node.JS works under the hood, by a fan of C++.
Tags: #programming #cpp #javascript #node
A very great explanation of how Node.JS works under the hood, by a fan of C++.
Tags: #programming #cpp #javascript #node
Medium
Node.js V8 internals: an illustrative primer
When you switch from C++ to a more “friendly” language, you get this strange feeling of being fooled by this new language, its environment…
https://web.archive.org/web/20120504043127/http://scienceblogs.com/goodmath/2006/11/the_c_is_efficient_language_fa.php
Tags: #programming #c #performance
Tags: #programming #c #performance
web.archive.org
The "C is Efficient" Language Fallacy : Good Math, Bad Math
I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to...
https://www.techrepublic.com/article/electronics-sniffing-dogs-how-k9s-became-a-secret-weapon-for-solving-high-tech-crimes/
Molecular sniffer dogs got upgraded: now they are able to find electronic components.
Tags: #hardware #technology
Molecular sniffer dogs got upgraded: now they are able to find electronic components.
Tags: #hardware #technology
TechRepublic
Electronics-sniffing dogs: How K9s became a secret weapon for solving high-tech crimes
Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.
https://blog.timescale.com/why-sql-beating-nosql-what-this-means-for-future-of-data-time-series-database-348b777b847a
Tags: #database #sql
Tags: #database #sql
Timescale Blog
Why SQL is beating NoSQL and what this means for the future of data
After years of being left for dead, SQL today is making a comeback. How come? And what effect will this have on the data community?
https://medium.com/netflix-techblog/titus-the-netflix-container-management-platform-is-now-open-source-f868c9fb5436
Titus, the Netflix's Docker for "video streaming, recommendations and machine learning, big data"
Tags: #technology #development #cloud
Titus, the Netflix's Docker for "video streaming, recommendations and machine learning, big data"
Tags: #technology #development #cloud
Medium
Titus, the Netflix container management platform, is now open source
by Amit Joshi, Andrew Leung, Corin Dwyer, Fabio Kung, Sargun Dhillon, Tomasz Bak, Andrew Spyker, Tim Bozarth
https://news.developer.nvidia.com/new-ai-imaging-technique-reconstructs-photos-with-realistic-results/
Tags: #ai #deeplearning #technology
Tags: #ai #deeplearning #technology
NVIDIA Technical Blog
New AI Imaging Technique Reconstructs Photos with Realistic Results
Researchers from NVIDIA, led by Guilin Liu, introduced a state-of-the-art deep learning method that can edit images or reconstruct a corrupted image, one that has holes or is missing pixels.
https://codeburst.io/react-native-vs-real-native-apps-ad890986f1f
An efficiency comparison in the world of Mobile apps development: Swift vs. React Native.
Tags: #swift #react #javascript
An efficiency comparison in the world of Mobile apps development: Swift vs. React Native.
Tags: #swift #react #javascript
Medium
React Native vs Real Native Apps
If you’re into mobile app development, the name of React Native mustn’t be new for you. The term has been trending in the world of…
https://www.httpcs.com/fr/actualites-cybersecurite/impact-study-aws-buckets-amazon-s3-configuration
A security research made by HTTPCS about AWS buckets.
Tags: #security #aws
A security research made by HTTPCS about AWS buckets.
Tags: #security #aws
Httpcs
HTTPCS - NEWS : Impact study - Amazon S3 AWS Buckets configuration [EN]
http://homepages.inf.ed.ac.uk/wenfei/qsx/reading/gupta95maintenance.pdf
This paper motivate and describe materialized views, their applications, and the problems and techniques for their maintenance
Tags: #database
This paper motivate and describe materialized views, their applications, and the problems and techniques for their maintenance
Tags: #database
https://arstechnica.com/information-technology/2018/05/critical-pgp-and-smime-bugs-can-reveal-encrypted-e-mails-uninstall-now/
Tags: #security #encryption #flaw
Tags: #security #encryption #flaw
Ars Technica
Critical PGP and S/MIME bugs can reveal encrypted emails—uninstall now [Updated]
The flaws can expose emails sent in the past and "pose an immediate threat."
https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html
Tags: #security #assistants
Tags: #security #assistants
NY Times
Alexa and Siri Can Hear This Hidden Command. You Can’t. (Published 2018)
Researchers can now send secret audio instructions undetectable to the human ear to Apple’s Siri, Amazon’s Alexa and Google’s Assistant.