Blogs

BROWSE: Most Recent | Popular Tags |

Tags > security

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Four short links: 23 June 2014

By Nat Torkington
June 23, 2014

Minimum Viable Block Chain — What follows is an attempt to explain, from the ground up, why the particular pieces (digital signatures, proof-of-work, transaction blocks) are needed, and how they all come together to form the “minimum viable block chain” …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Cloud security is not an oxymoron

By Mike Loukides
June 19, 2014

I just ran across Katie Fehrenbacher’s article in GigaOm that made a point I’ve been arguing (perhaps not strongly enough) for years. When you start talking to people about “the cloud,” you frequently run into a knee-jerk reaction: “Of course, …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 12, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 12 June 2014

By Nat Torkington
June 12, 2014

Norbert Weiner (The Atlantic) — His fears for the future stemmed from two fundamental convictions: We humans can’t resist selfishly misusing the powers our machines give us, to the detriment of our fellow humans and the planet; and there’s a …

Four short links: 11 June 2014

By Nat Torkington
June 11, 2014

UK Copyright Law Permits Researchers to Data Mine — changes mean Copyright holders can require researchers to pay to access their content but cannot then restrict text or data mining for non-commercial purposes thereafter, under the new rules. However, researchers …

Four short links: 10 June 2014

By Nat Torkington
June 10, 2014

Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser. Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. …

Four short links: 10 June 2014

By Nat Torkington
June 10, 2014

Trusting Browser Code (Tim Bray) — on the fundamental weakness of the ‘net as manifest in the browser. Deep Learning in the Raspberry Pi (Pete Warden) — $30 now gets you a computer you can run deep learning algorithms on. …

Four short links: 6 June 2014

By Nat Torkington
June 6, 2014

Ethics and UX Design (Slideshare) –We are the thieves of time. This excellent talk challenges you (via Aristotle) to understand what a good life is, and whether you’re designing to bring it about. (via Keith Bolland) Pepper Personal Robot — …

Four short links: 5 June 2014

By Nat Torkington
June 5, 2014

beaglepilot (Github) — open source open hardware autopilot for Beagleboard. (via DIY Drones) IFR Robot Sales Charts (PDF) — 2013: all-time high of 179,000 industrial robots sold and growth continues in 2014. (via Robohub) The Top 5 Claims That Defenders …

Four short links: 4 June 2014

By Nat Torkington
June 4, 2014

Swift on GitHub — watch a thousand projects launch. HTTP API Design Guide — extracted from work on the Heroku Platform API. End-to-End PGP in Gmail — Google releases an open source Chrome extension to enable end-to-end OpenPGP on top …

Four short links: 28 May 2014

By Nat Torkington
May 28, 2014

Maciej Ceglowski on Our Internet — If you haven’t already read this because someone pushed it into your hands, read it now. If these vast databases are valuable enough, it doesn’t matter who they belong to. The government will always …

Four short links: 21 May 2014

By Nat Torkington
May 21, 2014

EventHub — open source funnel/cohort/a-b analysis tool. Mantra — a collection of free/open source security tools, integrated into a browser (Firefox or Chromium). Reverse Engineering Mac Malware (PDF) — fascinating to see how it’s shipped, bundled, packaged, and distributed. Everything …


1 to 50 of 523 Next
The Watering Hole