The VeraCrypt Audit Results
The quick and dirty:VeraCrypt 1.18 and its bootloaders were evaluated. This release included a number of new features including non-western developed encryption options, a boot loader that supports...
View Article“If you get a C or lower, I’ll buy you a present”
To save articles or get newsletters, alerts or recommendations – all free. Don't have an account yet?Create an account »Subscribed through iTunes and need an NYTimes.com account?Learn more »Need to...
View ArticleResponse from Google Tech Lead, Re: “Google May Be Stealing Your Mobile Traffic”
Update 10/17/2016 6:30pm: You can read a response from the tech lead of the AMP Project for Google, in the comment area.I run my blog on WordPress with a custom theme. 6 month ago I’ve added support...
View ArticleSecure Your Containers with This One Weird Trick
Did you know there is an option to drop Linux capabilities in Docker? Using the docker run --cap-drop option, you can lock down root in a container so that it has limited access within the container....
View ArticleScrypt is Maximally Memory-Hard
Cryptology ePrint Archive: Report 2016/989Scrypt is Maximally Memory-HardJoël Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano TessaroAbstract: Memory-hard functions (MHFs) are...
View ArticleJudicial reform advocate jailed for blogging about publicly available documents
MARTINEZ — In a decision First Amendment experts have dubbed “outrageous,” a Contra Costa Superior Court judge jailed a San Ramon man for writing about his divorce on the internet — even though his...
View ArticleDon't let your anger persist
Sunk costs and being an assholeYou’ve been on hold for 35 minutes. No one you’ve spoken to has sincerely cared to help you. You were "accidentally" disconnected twice. That was infuriating.Finally, you...
View ArticleAnalysis Shows Hotels Are Not Losing Share to Airbnb
AirBNB has been regarded as the great disrupter in the hospitality sector, but a new study shows that — for all the hype — AirBNB is not taking marketshare away from hotels.The study, compiled by Smith...
View ArticlePostgres Count Performance
Everybody counts, but not always quickly. This article is a close look into how PostgreSQL optimizes counting. If you know the tricks there are ways to count rows orders of magnitude faster than you do...
View ArticleDisney Open Source
jss-api-gemThe ruby-jss project provides the JSS module, a Ruby framework for interacting with the REST API of the JAMF Software Server (JSS), the core of the Casper Suite, from JAMF Software, LLC. The...
View ArticleLeo Beranek, Engineer Involved in Internet Precursor, Dies at 102
Dr. Beranek was a sought-after acoustics genius, and Bolt, Beranek & Newman’s first contract was to design the acoustics of the United Nations General Assembly Hall in New York. He also improved...
View ArticlePanoramio (API) shuts down November 4th
Tip:Link your Panoramio account with your Google+ account to automatically copy your photos to theGoogle Album Archive and continue to share your work in Google Maps. Back in 2014, we announced our...
View ArticleDoudou Linux – Every homeschooler's must have operating system
“DoudouLinux reveals to children the creative, educative, cultural and fun potential that is lying dormant inside every computer.” DoudouLinux is specially designed for children to make computer use as...
View ArticleHow breakpoints are set
I am fascinated by the debuggers. I love them so much that I wrote a small and very basic debugger as one of my projects recently. In this post I am going to write down what I’ve learned about how can...
View ArticleThe Anti-Helicopter Parent’s Plea: Let Kids Play
Mike came out to the yard, his wineglass in one hand and a piece of cheese in another. His wife, Perla Ni, a lawyer who directs a nonprofit, was working late. Where Mike has a loud, large and...
View ArticleExploiting Linux kernel heap off-by-one
by Vitaly Nikolenko Posted on October 16, 2016 at 8:38 PMIntroductionI guess the reason I decided to write about this vulnerability is because when I posted it on Twitter, I've received a few DMs...
View ArticleGit – Pushing to Multiple Remotes
How to Configure Git to Push to Multiple Remotes You might have seen the news today that GitHub is planning on implementing community guidelines, and wanted to branch out. I personally don't think...
View ArticleVirus and Two Types of Bacteria as Major Causes of Alzheimer’s
A worldwide team of senior scientists and clinicians have come together to produce an editorial which indicates that certain microbes – a specific virus and two specific types of bacteria – are major...
View ArticleRaspberry Pi (2 and 3) support in Fedora 25 Beta
This article comes courtesy of Peter Robinson, member of the Fedora release engineering team. Peter has worked for several years on the general release and also hardware architectures such as ARM and...
View ArticleBedrock – Rock-solid distributed data
Bedrock is a simple, modular, WAN-replicated data foundation for global-scale applications. Taking each of those in turn:Bedrock is simple. This means it exposes the fewest knobs necessary, with...
View Article