Blogs

BROWSE: Most Recent | Popular Tags |

Tags > security

Four short links: 28 August 2014

By Nat Torkington
August 28, 2014

PlotDevice — A Python-based graphics language for designers, developers, and tinkerers. More in the easy-to-get-started + visual realm, like Processing. (via Andy Baio) Scumblr and Sketchy Search — Netflix open sourcing some scraping, screenshot, and workflow tools their security team …

Four short links: 28 August 2014

By Nat Torkington
August 28, 2014

PlotDevice — A Python-based graphics language for designers, developers, and tinkerers. More in the easy-to-get-started + visual realm, like Processing. (via Andy Baio) Scumblr and Sketchy Search — Netflix open sourcing some scraping, screenshot, and workflow tools their security team …

Four short links: 28 August 2014

By Nat Torkington
August 28, 2014

PlotDevice — A Python-based graphics language for designers, developers, and tinkerers. More in the easy-to-get-started + visual realm, like Processing. (via Andy Baio) Scumblr and Sketchy Search — Netflix open sourcing some scraping, screenshot, and workflow tools their security team …

Four short links: 26 August 2014

By Nat Torkington
August 26, 2014

The Poisoned NUL Byte, 2014 Edition (Project Zero) — from Google’s public security efforts, this detailed public description of how an exploit was constructed from a found vulnerability. They’re helping. Kudos! Myths About the Coming Robot Economy (Eric Sofge) — …

Four short links: 26 August 2014

By Nat Torkington
August 26, 2014

The Poisoned NUL Byte, 2014 Edition (Project Zero) — from Google’s public security efforts, this detailed public description of how an exploit was constructed from a found vulnerability. They’re helping. Kudos! Myths About the Coming Robot Economy (Eric Sofge) — …

Four short links: 26 August 2014

By Nat Torkington
August 26, 2014

The Poisoned NUL Byte, 2014 Edition (Project Zero) — from Google’s public security efforts, this detailed public description of how an exploit was constructed from a found vulnerability. They’re helping. Kudos! Myths About the Coming Robot Economy (Eric Sofge) — …

Four short links: 25 August 2014

By Nat Torkington
August 25, 2014

Greenscreen — Chromecast-based open source software for digital signs. Reverse Engineering Censorship in Chinese Cyberspace (PDF) — researchers create accounts and probe to see which things are blocked. Empirical transparency. USB Condom — A protective barrier between your device and …

Four short links: 25 August 2014

By Nat Torkington
August 25, 2014

Greenscreen — Chromecast-based open source software for digital signs. Reverse Engineering Censorship in Chinese Cyberspace (PDF) — researchers create accounts and probe to see which things are blocked. Empirical transparency. USB Condom — A protective barrier between your device and …

Four short links: 25 August 2014

By Nat Torkington
August 25, 2014

Greenscreen — Chromecast-based open source software for digital signs. Reverse Engineering Censorship in Chinese Cyberspace (PDF) — researchers create accounts and probe to see which things are blocked. Empirical transparency. USB Condom — A protective barrier between your device and …

Four short links: 22 August 2014

By Nat Torkington
August 22, 2014

Blame the Crowd, Not the Camera (Nina Simon) — Cameras weaponize an already unwieldy mob of people. The Botlr — the Cupertino Starwood hotel has a robot butler (botlr) doing room service. tcpcrypt — opportunistic encryption of all network traffic. …

Four short links: 22 August 2014

By Nat Torkington
August 22, 2014

Blame the Crowd, Not the Camera (Nina Simon) — Cameras weaponize an already unwieldy mob of people. The Botlr — the Cupertino Starwood hotel has a robot butler (botlr) doing room service. tcpcrypt — opportunistic encryption of all network traffic. …

Four short links: 22 August 2014

By Nat Torkington
August 22, 2014

Blame the Crowd, Not the Camera (Nina Simon) — Cameras weaponize an already unwieldy mob of people. The Botlr — the Cupertino Starwood hotel has a robot butler (botlr) doing room service. tcpcrypt — opportunistic encryption of all network traffic. …

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 18 August 2014

By Nat Torkington
August 18, 2014

Oolite — open-source clone of Elite, the classic space trading game from the 80s. Who Owns the Robots Rules The World (PDF) — interesting finding: As companies substitute machines and computers for human activity, workers need to own part of …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 8 August 2014

By Nat Torkington
August 8, 2014

Everything You Wanted to Know About Synchronization But Were Too Afraid to Ask (PDF) — This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 31 July 2014

By Nat Torkington
July 31, 2014

Ocrad.js — open source OCR in Javascript, a port of GNU Ocrad software. HP’s IoT Security Research (PDF) — 70% of devices use unencrypted network services, 90% of devices collected at least one piece of personal information, 60% of those …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 28 July 2014

By Nat Torkington
July 28, 2014

streisand — sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 23 July 2014

By Nat Torkington
July 23, 2014

Talking to Big Machines (Jon Bruner) — “Selfless machines” coordinate across networks and modify their own operation to improve the output of the entire system. Docker Security — Containers do not contain and Stop assuming that Docker and the Linux …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 21 July 2014

By Nat Torkington
July 21, 2014

nupic (github) -GPL v3-licensed ode from Numenta, at last. See their patent position. Robocup — soccer robotics contest, condition of entry is that all codes are open sourced after the contest. (via The Economist) Security Data Science Paper Collection — …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 16 July 2014

By Nat Torkington
July 16, 2014

Inside bit.ly’s Distributed Systems — this is a 101 for modern web distributed systems design. Patent Trolls are Now 67% of New Patent Lawsuits in USA (WaPo) — data from PwC. Intel Made Half a Billion from Internet of Things …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 14 July 2014

By Nat Torkington
July 14, 2014

Handheld Scanners Attack — shipping and logistics operations compromised by handheld scanners running malware-infested Windows XP. Adventures in Cognitive Biases (MIT) — web adventure to build your cognitive defences against biases. Quoc Le’s Lectures on Deep Learning — Machine Learning …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 10 July 2014

By Nat Torkington
July 10, 2014

Ex-Google Hacker Taking On The World’s Spy Agencies (Wired) — profile of the security expert working on protecting reporters. Meet Google’s Security Princess (Elle) — would have preferred to see her story in Wired. Much is good here, but this …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 1 July 2014

By Nat Torkington
July 1, 2014

word2vec — This tool provides an efficient implementation of the continuous bag-of-words and skip-gram architectures for computing vector representations of words. These representations can be subsequently used in many natural language processing applications and for further research. From Google Research …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 30 June 2014

By Nat Torkington
June 30, 2014

Interacting with a World of Connected Objects (Tom Coates) — notes from one of my favourite Foo Camp sessions. Security Considerations with Continuous Deployment (IBM) — rundown of categories of security issues your org might face, and how to tackle …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 27 June 2014

By Nat Torkington
June 27, 2014

MillWheel: Fault-Tolerant Stream Processing at Internet Scale — Google Research paper on the tech underlying the new cloud DataFlow tool. Watch the video. Yow. The Integer Overflow Bug That Went to Mars — long-standing (20 year old!) bug in a …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …

Four short links: 25 June 2014

By Nat Torkington
June 25, 2014

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones (Wired) — I’m fascinated to learn there’s an Italian company making (and selling) the mobile phone rootkits that governments use. On the Near Impossibility of Measuring the Returns …


1 to 50 of 541 Next
The Watering Hole