Top Posts for April 5, 2015

A note on the argument about the ‘morality’ of adblockers Summary: Let’s set aside the security issues and other counter-arguments to note something important: much as in another case , it’s extremely disingenuous to discuss morality here without mentioning the blatant amorality of advertising on the web itself. Keywords: ad, people, industry, adblockers, morality Full article on utcc.utoronto.ca | 257 Points and 214 Comments I won’t be using Angular for my next project Summary: That also doesn’t change the fact that Angular is still broken, and as much has been admitted by numerous core team members who have sunk tremendous effort in to improving these parts over time, only to be stonewalled by fundamental flaws in the original design.

Read More

Top Posts for April 4, 2015

Get your own USB PID Summary: These solutions make things worse for everyone, by damaging the assumption that a VID/PID combination is unique to a given device. Keywords: id, vendor, device, pid, company Full article on pid.codes | 528 Points and 50 Comments Why the name? Summary: WhyTheName ( last modified 2017-03-29 22:17:51 ) Keywords: whythename, modified Full article on wiki.debian.org | 352 Points and 93 Comments The truth about the Bitcoin Foundation Summary: Admin / Moderator Administrators 296 484 posts Location North Carolina, United States

Read More

Top Posts for April 3, 2015

New Hacker News Guideline: Avoid Gratuitous Negativity Summary: To support this, Daniel and the HN team are working on another new idea I’m very excited about–code-named “Modnesty”–to turn more moderation power over to the community. Keywords: hn, negativity, people, hacker, news Full article on blog.ycombinator.com | 1248 Points and 631 Comments Automakers Say You Don’t Really Own Your Car Summary: The Digital Millennium Copyright Act (DMCA) safe harbors are a vital protection for websites and Internet services of all sizes.

Read More

Top Posts for April 2, 2015

Truecrypt report Summary: The Truecrypt developers implemented their RNG based on a 1998 design by Peter Guttman that uses an entropy pool to collect ‘unpredictable’ values from various sources in the system, including the Windows Crypto API itself. Keywords: truecrypt, crypto, code, system, rng Full article on blog.cryptographyengineering.com | 479 Points and 174 Comments “The colored boxes indicate which CPU core performed layout for each node” Summary: After months of landing new features at an incredible rate, Q2 is going to focus more on details: performance improvements, fixing compatibility bugs, and paying down technical debt.

Read More

Top Posts for April 1, 2015

Google pulling China CNNIC CA from its products Summary: To assist customers affected by this decision, for a limited time we will allow CNNIC’s existing certificates to continue to be marked as trusted in Chrome, through the use of a publicly disclosed whitelist. Keywords: cnnic, certificates, certificate, mcs, chrome Full article on googleonlinesecurity.blogspot.com | 472 Points and 159 Comments Redis 3.0.0 is out Summary: Hidden fieldsSearch for groups or messages

Read More

Top Posts for March 31, 2015

$149 Chromebooks Summary: It’s the perfect upgrade for an existing desktop and will be really useful for schools and businesses.So whether you’re looking for a smaller Chrome device that packs a big punch or a laptop that can do back bends, there’s a Chromebook for you…and for everyone else, too. Keywords: chromebook, chromebooks, computer, device, chrome Full article on chrome.blogspot.com | 503 Points and 409 Comments French civil code now on GitHub Summary: Et pourtant nous autres citoyens (moi y compris) ne connaissons pas les lois qui construisent et gouvernent notre République.

Read More

Top Posts for March 30, 2015

Stop using tail -f (mostly) Summary: When you need to watch multiple files at the same time, tail -f can actually give you a better output. Keywords: file, tail, watching, mode, files Full article on brianstorti.com | 765 Points and 207 Comments China’s Man-On-the-Side Attack on GitHub Summary: Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ronald Deibert and Vern Paxson have published their research about this new cyber weapon, which they have dubbed the “Great Cannon” (GC).

Read More

Top Posts for March 29, 2015

GitHub under ongoing DDoS attack Summary: We continuously monitor the status of github.com and all its related services. Keywords: december, utcall, systems, reporting, site Full article on status.github.com | 652 Points and 334 Comments Dot matrix printer playing “Eye of the Tiger” [video] Full article on youtube.com | 567 Points and 62 Comments How I doubled my Internet speed with OpenWRT Summary: Mike Solomon OpenWRT is a powerful Linux distribution for embedded devices, such as my router , and this is the story of how I used it to double my bandwidth at no extra cost to myself.

Read More

Top Posts for March 28, 2015

Parents with annual family incomes below $125,000 will pay no tuition Summary: “We are honored by the interest in Stanford and the experiences shared by all prospective students through the application process,” said Richard Shaw, dean of admission and financial aid. Keywords: stanford, financial, students, aid, expected Full article on news.stanford.edu | 597 Points and 273 Comments Clean Up Your Mess – A Guide to Visual Design for Everyone (2011) Summary: Why would you include that story?

Read More

Top Posts for March 27, 2015

Slack was hacked Summary: We cannot overemphasize how seriously we take this incident and the importance we place on the security of your information in the broadest sense, from internal compliance processes, audits and physical access control to continual review of our systems design and approach to technical operations. Keywords: slack, team, security, authentication, information Full article on slackhq.com | 857 Points and 497 Comments GitHub hit by DDoS attack Summary: We continuously monitor the status of github.

Read More

Top Posts for March 26, 2015

React Native is now open source Summary: Read our contributing guide to learn about our development process, how to propose bug fixes and improvements, and how to build and test your changes to React Native. Keywords: react, dec, native, app, jul Full article on github.com | 1039 Points and 287 Comments The Z3 Theorem Prover released under MIT license Summary: If you use a non standard prefix you can use the –pypkgdir option to change the Python package directory used for installation.

Read More

Top Posts for March 25, 2015

Michael Stonebraker wins Turing Award Summary: Past Turing Award recipients who have either taught at or earned degrees from MIT include Shafi Goldwasser and Silvio Micali (2013), Barbara Liskov (2008), Ronald Rivest (2002), Manuel Blum (1995), Butler Lampson (1992), Fernando Corbato (1990), Ivan Sutherland (1988), John McCarthy (1971) and Marvin Minsky (1969). Keywords: stonebraker, database, data, mit, computer Full article on newsoffice.mit.edu | 528 Points and 74 Comments “We have decided not to integrate the Dart VM into Chrome” Summary: In fact, teams that have switched completely to strong mode cite not only early error detection but also better code readability and maintainability as major benefits.

Read More

Top Posts for March 24, 2015

Bazel – Correct, reproducible, fast builds for everyone Summary: With advanced local and distributed caching, optimized dependency analysis and parallel execution, you get fast and incremental builds. Keywords: bazel, build, languages, fast, software Full article on bazel.io | 625 Points and 174 Comments Fear of Apple Summary: Among the benefits Ivanovic received was the privilege to have Shifty Jelly’s apps preloaded on iPads in Apple stores in Australia, a major marketing boost.

Read More

Top Posts for March 23, 2015

Bug 1202858 – Restarting squid results in deleting all files in hard-drive Summary: FirstLastPrevNextThis bug is not in your last search results. Keywords: firstlastprevnextthis, bug, search, results Full article on bugzilla.redhat.com | 429 Points and 168 Comments Pinterest lets employees exercise options 7 years after leaving Summary: The capitalist solution to this, of course, is for the employee to exercise the options and then sell some of the stock – either on the secondary market or back to the company – to cover the IRS demands.

Read More

Top Posts for March 22, 2015

Is Your VirtualBox Reading Your E-Mail? Reconstruction of FrameBuffers from VRAM Summary: If the “3D-Acceleration” feature of VirtualBox is activated, running the proof-of-concept code from inside the VM provides the ability to read framebuffers from the host system. Keywords: vram, system, document, cards, virtualbox Full article on hsmr.cc | 231 Points and 43 Comments The decline in unionization has fed the rise in incomes at the top Summary: As a consequence, economic research has recently focused on the effects of institutional changes, with financial deregulation and the decline in top marginal personal income tax rates often cited as important contributors to the rise of inequality.

Read More

Top Posts for March 21, 2015

Ravens Offensive Lineman Publishes Math Paper Summary: In an essay in The Players’ Tribune on the sudden retirement this week of Chris Borland, the 24-year-old linebacker for the San Francisco 49ers, Urschel wrote that he’s often asked why he plays football. Keywords: urschel, chris, love, baltimore, ravens Full article on npr.org | 495 Points and 124 Comments Goat Simulator Post Mortem Summary: We didn’t have much money left in our company, but with the huge buzz around our first alpha trailer, we were pretty sure we could have received funding from a publisher if we wanted to extend the development time of the project.

Read More

Top Posts for March 20, 2015

Replacing Photoshop with NSString Summary: it strips all whitespace; this is why all pixels need to be marked somehow (I chose the character ‘·’ as the background in the example above); it checks consistency: all rows should have the same length; it parses the string to find digits and letters; everything else is ignored, namely the ‘·’ and ‘#’ characters in the example; each digit/letter is assigned a corresponding NSPoint; it creates shapes based on the good old “Connect the Dots” technique you learnt in Kindergarten; each shape is turned into NSBezierPath; each Bezier path is rendered with the correct color and anti-aliasing flag

Read More

Top Posts for March 19, 2015

We are under attack Summary: While we have talked openly about our method of using collateral freedom to unblock websites and mobile apps that have been blocked by the Chinese authorities, the WSJ story clearly stated how the strategy works and how it is being used successfully to deliver uncensored content into China. Keywords: china, attack, chinese, google, websites Full article on en.greatfire.org | 839 Points and 263 Comments

Read More

Top Posts for March 18, 2015

Why Spotify Pays So Little Summary: Spotify splits up the artists money based on percentage of total streams on the platform. Keywords: spotify, artists, money, streams, daft Full article on lit.vulf.de | 613 Points and 295 Comments MSBuild is now open source on GitHub Summary: Through open sourcing MSBuild we are responding to community feedback and we intend to make it the best choice for .NET developers on the Linux and Mac platforms.

Read More

Top Posts for March 17, 2015

I Can’t Write My Name in Unicode Summary: On the contrary, this makes their inclusion even more vital: rendering historical texts accurately is key to ensuring their survival in the transition to the age of digital media. Keywords: unicode, characters, languages, language, consortium Full article on modelviewculture.com | 610 Points and 360 Comments Google Makani – Wind Energy Kites Summary: Google Keywords: google Full article on google.com | 495 Points and 161 Comments

Read More

Top Posts for March 16, 2015

Carbon3D – 3D Printing via Continuous Liquid Interface Production Summary: Manufacturing Ready & Extensible M2 features high reliability hardware, the Carbon Connector expansion port for smart accessories, and compatibility with workflow automation. Keywords: part, carbon, volume, software, system Full article on carbon3d.com | 517 Points and 106 Comments High quality GIF with FFmpeg Summary: Some trivia on the technical aspect: the filter is implementing a variant of the algorithm from Paul Heckbert’s Color Image Quantization for Frame Buffer Display (1982) paper.

Read More

Top Posts for March 15, 2015

“Your monthly rent .. shall increase from $2145 to $8900” Full article on facebook.com | 491 Points and 602 Comments Adventures in message queues Summary: rss feed | twitter | google group | old site : Keywords: antirez, rss, feed, twitter, google Full article on antirez.com | 350 Points and 99 Comments Xonsh, a Python-ish, Bash-compatible shell language and command prompt Summary: If you would like to contribute, it is as easy as forking the repository on GitHub, making your changes, and issuing a pull request.

Read More

Top Posts for March 14, 2015

Microsoft’s new foldable keyboard Summary: The Microsoft Universal Foldable Keyboard is the perfect travel companion — its ultrathin, lightweight, compact design lets you easily take it wherever you go so you can get more done on your tablet or smartphone no matter where you are. Keywords: keyboard, universal, foldable, microsoft, tablets Full article on blogs.microsoft.com | 461 Points and 243 Comments CSS Sans – A pure CSS font Summary: transform:rotate(-84deg);

Read More

Top Posts for March 13, 2015

SQLite developer must have received a lot of phone calls Summary: Those users would then do a ** Google search for “sqlite”, find the telephone numbers of the** developers and call to wake them up at night and complain. Keywords: int, lock, file, locking, locks Full article on github.com | 792 Points and 108 Comments Reasons not to use Facebook Summary: The way a player scores in this game is by selling the list of people who “liked” him to a company, thus paying back favors with abuse; but these useds * have adopted an amoral attitude in which they no longer try to judge exploitation ethically.

Read More

Top Posts for March 12, 2015

Sir Terry Pratchett has died Summary: Prime Minster David Cameron said : “Sad to hear of Sir Terry Pratchett’s death, his books fired the imagination of millions and he fearlessly campaigned for dementia awareness.” Keywords: terry, sir, alzheimer, death, pratchett Full article on bbc.com | 1019 Points and 212 Comments Bidding farewell to Google Code Summary: Please note: GitHub’s importer will convert any Subversion or Mercurial Google Code projects to use Git in the process.

Read More

Top Posts for March 11, 2015

2015 Chromebook Pixel Summary: Google Keywords: google Full article on google.com | 643 Points and 629 Comments The Mighty Named Pipe Summary: One test uses trim.sh , the other is a simple shell script that just runs Scythe in the background (in parallel, combined with Bash’s wait ), writes files to disk, and Sickle processes these. Keywords: unix, pipes, process, named, substitution Full article on vincebuffalo.com | 385 Points and 96 Comments

Read More

Top Posts for March 10, 2015

Goodbye MongoDB, Hello PostgreSQL Summary: The migration took place on the 21st of January, the big peak is simply the application performing a hard restart (leading to slightly slower response timings during the process). Keywords: data, database, applications, mongodb, postgresql Full article on developer.olery.com | 802 Points and 374 Comments Welcome Peter Summary: We generally won’t bring on people that are involved with other investing firms given the obvious conflict, but Peter is so good we felt like we had to make an exception.

Read More

Top Posts for March 9, 2015

Announcing Starfighter Summary: Starfighter is a contingency recruiter with access to a better way to identify candidates than “Call up everyone on LinkedIn and beg them to take a job at Highly Regarded Tech Firm In Your Area.” We assess for skill first, passively as players play our games and then actively. Keywords: starfighter, hiring, candidates, ll, players Full article on kalzumeus.com | 932 Points and 400 Comments The new MacBook Summary: From daily tasks like launching apps and opening files to more advanced computing, you can power through your day thanks to faster SSDs and Turbo Boost processing up to 3.

Read More

Top Posts for March 8, 2015

On Secretly Terrible Engineers Summary: Most programmers need StackOverflow, Google search, or Dash in order to be effective, yet you get to an interview and are expected to spontaneously remember the positional arguments for some esoteric function. Keywords: engineering, people, interview, years, engineers Full article on techcrunch.com | 463 Points and 379 Comments Sexism in Tech: Don’t Ask Me Unless You’re Ready to Call Someone a Whistleblower Summary: A person who lacks either trust considers you an “enemy.

Read More

Top Posts for March 7, 2015

This bakery will hire anyone Summary: William Epps, Felicia Jones, Maria Rodriguez, Don Anarela, Cecee Robertson.I asked Greyston CEO Mike Brady how they made this work. Keywords: greyston, people, brady, business, open Full article on grist.org | 373 Points and 168 Comments Apple gold Summary: I suppose it’s not surprising that Tim didn’t make a big deal out of that in September. Keywords: gold, apple, alloy, patent, make Full article on leancrew.

Read More

Top Posts for March 6, 2015

Fired Summary: Seemingly everyone’s got stories of being stuck under shit managers, or dealing the fallout from things out of their control. Keywords: people, lot, fired, work, company Full article on zachholman.com | 1039 Points and 389 Comments The Hiring Post Summary: Years from now, we’ll look back at the 2015 developer interview as an anachronism, akin to hiring an orchestra cellist with a personality test and a quiz about music theory rather than a blind audition.

Read More

Top Posts for March 5, 2015

VMWare Taken to Court Over GPL Violation Summary: After studying these materials over a long period, it became apparent that VMware’s current ESXi products infringed many of Hellwig’s own copyrights, due to VMware’s failure to comply with Linux’s license, GPLv2. Keywords: conservancy, vmware, linux, hellwig, gpl Full article on sfconservancy.org | 664 Points and 289 Comments Google Contributor Summary: Each time you visit a page without ads, a per-page fee is deducted from your pass to pay the creators of the website, after a small portion is kept by Google to cover the cost of running the service.

Read More

Top Posts for March 4, 2015

My Girlfriend Dissociated and Forgot Who I Was Summary: This was a woman who made most extroverts look like JD Salinger, someone who could engage even the surliest of bouncers in cheery conversation and charm them enough to let her obviously underage friends into bars. Keywords: woman, george, man, girlfriend, knew Full article on vice.com | 605 Points and 194 Comments EA Shuts Down ‘SimCity’ and ‘The Sims’ Developer Maxis Summary: Hopefully, the talented men and women working at Maxis Emeryville will be able to find a suitable home for their skills; EA maintains that opportunities are being offered up, despite the fact that SimCity gameplay scripter Guillaume Pierre tweeted earlier that ‘everyone’s out of a job’.

Read More

Top Posts for March 3, 2015

“Just remove the duck” (2013) Summary: As the story goes, the artists had created all of these animation cycles for their game, and it had to pass through the review stage of a project manager. Keywords: duck, game, project, dogs, story Full article on rachelbythebay.com | 682 Points and 327 Comments Valve Announces Source 2, and It’ll Be Free Summary: Best known as the engine that powers games like Half-Life 2, Team Fortress, Counter-Strike: Go, Left 4 Dead, and Portal 2, the original Source engine* was primarily used for Valve’s own titles.

Read More

Top Posts for March 2, 2015

Unreal Engine 4 is now available to everyone for free Summary: The state of Unreal is strong, and we’ve realized that as we take away barriers, more people are able to fulfill their creative visions and shape the future of the medium we love. Keywords: unreal, engine, game, free, epic Full article on unrealengine.com | 1128 Points and 240 Comments Signal 2.0 released with private messaging support Summary: It is now possible to send end-to-end encrypted group, text, picture, and video messages between Signal on iPhone and TextSecure on Android, all without SMS and MMS fees.

Read More

Top Posts for March 1, 2015

Notes on watching “Aliens” for the first time again, with a bunch of kids Summary: Maybe this was true when I was a kid as well (I honestly don’t remember), but rather than endlessly correct them I decided to just roll with it, exercising my slumber party guardian veto power during scenes that I felt pretty sure would enthrall them if they would just shut up for five minutes (I was rarely proved wrong in my guesses).

Read More

Top Posts for February 28, 2015

Consulting Summary: Distilling “what I want” statements into hard technical requirements comes next and I’ve noticed, oddly enough, clients enjoy this part of the phase the most. Keywords: time, consulting, made, clients, ve Full article on dopeboy.github.io | 328 Points and 101 Comments Microwave Oven Diagnostics with Indian Snack Food Summary: A super convenient method of warming up certain foods, for boiling a cup of water, melting a little butter, or reheating frozen leftovers.

Read More

Top Posts for February 27, 2015

Leonard Nimoy, Spock of ‘Star Trek,’ Dies at 83 Summary: Gene Roddenberry, the creator of the franchise, called him “the conscience of ‘Star Trek’ ” — an often earnest, sometimes campy show that employed the distant future (as well as some special effects that appear primitive by today’s standards) to take on social issues of the 1960s. Keywords: nimoy, star, trek, spock, movie Full article on nytimes.com | 1584 Points and 165 Comments

Read More

Top Posts for February 26, 2015

FCC Passes Strict Net Neutrality Regulations on 3-2 Vote Summary: Notably, the FCC’s plan is now known to have undergone a last-minute revision to remove a potential weakness in its formation, pointed out by Google, that might have allowed for some paid prioritization. Keywords: fcc, plan, internet, commission, net Full article on techcrunch.com | 1489 Points and 711 Comments Side projects Summary: blog comments powered by Keywords: side, projects, blog, comments, powered

Read More

Top Posts for February 25, 2015

It’s Time to Break Up the NSA (2014) Summary: This is best illustrated by the work of the NSA’s Tailored Access Operations (TAO) group, including its catalog of hardware and software “implants” designed to be surreptitiously installed onto the enemy’s computers. Keywords: nsa, security, communications, cyber, command Full article on schneier.com | 638 Points and 133 Comments How to pick startup ideas Summary: If you’re committed to building a food delivery service, you can always invent a hypothesis, weave a narrative about your product around it, find credible supporting data, and polish your pitch until a large number of people believe it.

Read More

Top Posts for February 24, 2015

Introducing Pebble Time Summary: We will ship Pebble Time worldwide, with the exception of Argentina, Belarus, Cuba, Iran, Iraq, Lebanon, Libya, Myanmar/Burma, North Korea, Russia, Somalia, Sudan, Syria, and Yemen. Keywords: pebble, time, steel, apps, watch Full article on kickstarter.com | 658 Points and 386 Comments Proving that Android’s, Java’s and Python’s sorting algorithm is broken Summary: Update (August 2017): The KIT group used KeY to verify the JDK’s dual pivot quicksort implementation used as default sorting algorithm for integer or long arrays.

Read More

Top Posts for February 23, 2015

Edward Snowden, Laura Poitras and Glenn Greenwald: AUAA Full article on reddit.com | 559 Points and 79 Comments How crazy am I to think I actually know where that Malaysia Airlines plane is? Summary: In late March, New Zealand–based space scientist Duncan Steel began posting a series of essays on Inmarsat orbital mechanics on his The comments section quickly grew into a busy forum in which technically sophisticated MH370 obsessives answered one another’s questions and pitched ideas.

Read More

Top Posts for February 22, 2015

“Citizenfour” Awarded Oscar for Best Documentary in 2014 Summary: One of the government’s most powerful surveillance tools is scheduled to sunset in less than three weeks, and, for months, EFF has fought multiple legislative attempts to either extend or expand the NSA’s spying powers—warning the public, Representatives, and Senators about circling bills that threaten Americans’ privacy. Keywords: surveillance, december, deeplinks, blog, government Full article on eff.org | 647 Points and 156 Comments

Read More

Top Posts for February 21, 2015

Magic Summary: Delegating our administrative tasks to Magic allowed us to focus on building a great product instead of daily minutiae. Keywords: magic, assistants, time, assistant, find Full article on getmagicnow.com | 1329 Points and 528 Comments “Just the Beginning of What We Can Do on Super Nintendo” Summary: I was lucky enough to experience the gAtari firsthand, when cTrix performed at Blip Festival NYC in 2011. Keywords: working, ctrix, public, super, nintendo

Read More

Top Posts for February 20, 2015

Startup advice, briefly Summary: Don’t waste your time on stuff that doesn’t matter (i.e. things other than building your product, talking to your users, growing, etc.). Keywords: don, company, people, users, build Full article on blog.samaltman.com | 490 Points and 130 Comments Lenovo’s Response to Its Dangerous Adware Is Astonishingly Clueless Summary: “I can intercept the encrypted communications of Superfish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot,” Graham wrote in a blog post detailing how he did this .

Read More

Top Posts for February 19, 2015

Extracting the SuperFish certificate Summary: The consequence is that I can intercept the encrypted communications of SuperFish’s victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot. Keywords: password, certificate, file, superfish, dictionary Full article on blog.erratasec.com | 867 Points and 231 Comments Stripe: Bitcoin Summary: A complete commerce toolkit, built for developers. Keywords: payments, complete, commerce, toolkit, built Full article on stripe.com | 855 Points and 368 Comments

Read More

Top Posts for February 18, 2015

Lenovo Caught Installing Adware on New Computers Summary: A Lenovo community administrator, Mark Hopkins, wrote in late January that the software would be temporarily removed from current systems after irate users complained of popups and other unwanted behavior: Keywords: software, superfish, lenovo, users, user Full article on thenextweb.com | 1142 Points and 419 Comments Whiteboard Clock Summary: The USB device behaves as an abstract modem, which simply broadcasts every line of text sent to it.

Read More

Top Posts for February 17, 2015

HTTP/2 Is Done Summary: Roberto also served alongside Herve Ruellan as editor of HPACK, after they merged their competing proposals for header compression. Keywords: iesg, editor, roberto, hpack, rfc Full article on mnot.net | 437 Points and 136 Comments An Open Letter to Tim Cook Regarding the App Store 70⁄30 Revenue Split Summary: Looking at the numbers reported by independent developers, I think it’s safe to say that Apple’s 30% cut of App Store revenues can have a big impact on their success or failure.

Read More

Top Posts for February 16, 2015

“Equation Group” ran the most advanced hacking operation ever uncovered Summary: One of the Equation Group’s malware platforms, for instance, rewrote the hard-drive firmware of infected computers—a never-before-seen engineering marvel that worked on 12 drive categories from manufacturers including Western Digital, Maxtor, Samsung, IBM, Micron, Toshiba, and Seagate. Keywords: group, equation, malware, malicious, drive Full article on arstechnica.com | 870 Points and 362 Comments Russian researchers expose breakthrough U.S. spying program Summary: The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kasperky said.

Read More

Top Posts for February 15, 2015

The New Haskell.org Summary: DataDog provides powerful, customizable 24⁄7 metrics and monitoring integration for all of Haskell.org, and complains loudly for us when things go wrong. Keywords: haskell, sponsor, summer, infrastructure, community Full article on haskell.org | 312 Points and 103 Comments Life in a post-database world: Using crypto to avoid database writes Summary: For example, links to paid downloads, access tokens giving permissions to carry out an action (backend admin tasks, posting to an account, etc), and storing login sessions.

Read More