Search

Computer Addicted | Internet Addiction

[Updates on] : Ethical Hacking, Digital Forensics, Cyber Security

Date

March 18, 2017

A million-dollar engineering problem


A million-dollar engineering problem - https://segment.com/blog/the-million-dollar-eng-problem/

Hacker News on BigQuery: Now with daily updates. Top domains and time to post?


Hacker News on BigQuery: Now with daily updates. Top domains and time to post? - https://medium.com/@hoffa/hacker-news-on-bigquery-now-with-daily-updates-so-what-are-the-top-domains-963d3c68b2e2#.mkt08mped

Faster 3D rendering with WebGL 2.0


Faster 3D rendering with WebGL 2.0 - https://blog.chromium.org/2017/03/faster-3d-rendering-with-webgl-20.html

Begin Kernel Hacking[video]


Begin Kernel Hacking - https://www.youtube.com/watch?v=0IQlpFWTFbM&t=250s

Guetzli: A New Open-Source JPEG Encoder


Guetzli: A New Open-Source JPEG Encoder - https://research.googleblog.com/2017/03/announcing-guetzli-new-open-source-jpeg.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+blogspot/gJZg+(Official+Google+Research+Blog)

No privacy rules needed: ISPs say Web browsing isn’t “sensitive” data


No privacy rules needed: ISPs say Web browsing isn’t “sensitive” data - https://arstechnica.com/tech-policy/2017/03/isps-say-your-web-browsing-and-app-usage-history-isnt-sensitive/

A proof-of-concept of a vulnerability in custom shell prompt scripts


A proof-of-concept of a vulnerability in custom shell prompt scripts - https://github.com/njhartwell/pw3nage

Wiretapping End-To-End Encrypted VoIP Calls: Real-World Attacks on ZRTP


Wiretapping End-To-End Encrypted VoIP Calls: Real-World Attacks on ZRTP - https://www.sufficientlysecure.org/2017/03/15/zrtp.html

Virtual machine escape fetches $100k at Pwn2Own hacking contest


Virtual machine escape fetches $100k at Pwn2Own hacking contest - https://arstechnica.com/security/2017/03/hack-that-escapes-vm-by-exploiting-edge-browser-fetches-105000-at-pwn2own/

Blog at WordPress.com.

Up ↑

%d bloggers like this: