https://blog.stackoverflow.com/2016/07/introducing-stack-overflow-documentation-beta/
Tags: #programming #docs
  
  Tags: #programming #docs
Stack Overflow Blog
  
  Introducing Stack Overflow Documentation Beta
  Today – thanks to our amazing community beta testers – we’re shipping our biggest expansion to Stack Overflow since it first launched: Documentation.
  https://www.wired.com/2016/07/chrysler-launches-detroits-first-bug-bounty-hackers/
Tags: #bugBounty #Chrysler
  
  Tags: #bugBounty #Chrysler
WIRED
  
  Chrysler Launches Detroit's First 'Bug Bounty' for Hackers
  The rewards program, though limited, is another sign that the auto industry is starting to take the threat of car hacking seriously.
  https://www.wired.com/2015/09/hacker-lexicon-guide-ransomware-scary-hack-thats-rise/
Tags: #security #ransomware
  
  Tags: #security #ransomware
WIRED
  
  Hacker Lexicon: A Guide to Ransomware, the Scary Hack That’s on the Rise
  Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom.
  https://futurism.com/mits-riffle-anonymity-network-is-said-to-best-tor-in-securing-privacy/
Tags: #security #Tor
  
  Tags: #security #Tor
Futurism
  
  MIT's Riffle Anonymity Network is Said to Best Tor in Securing Privacy
  If you're worried that you're being watched, using this software developed by researchers from MIT and EPFL will help you keep your online transactions private. This software is way more secure than its predecessors.
  https://vxheaven.org/
"[...] This site contains a massive, continuously updated collection of magazines, virus samples, virus sources, polymorphic engines, virus generators, virus writing tutorials, [...]
Some of you might reasonably say that it is illegal to offer such content on the net. Or that this information can be misused by "malicious people". I only want to ask that person: "Is ignorance a defence?"
Tags: #programming #malware
  "[...] This site contains a massive, continuously updated collection of magazines, virus samples, virus sources, polymorphic engines, virus generators, virus writing tutorials, [...]
Some of you might reasonably say that it is illegal to offer such content on the net. Or that this information can be misused by "malicious people". I only want to ask that person: "Is ignorance a defence?"
Tags: #programming #malware
https://arstechnica.com/gadgets/2016/07/itrs-roadmap-2021-moores-law/ [ENG]
https://www.hwupgrade.it/news/cpu/transistor-stop-alla-miniaturizzazione-dopo-il-2020_63769.html [ITA]
Tags: #hardware #technology
  
  https://www.hwupgrade.it/news/cpu/transistor-stop-alla-miniaturizzazione-dopo-il-2020_63769.html [ITA]
Tags: #hardware #technology
Ars Technica
  
  Transistors will stop shrinking in 2021, but Moore’s law will live on
  Final semiconductor industry roadmap says the future is 3D packaging and cooling.
  https://futurism.com/new-material-makes-one-dimensional-semiconductors-possible/
Not even the time to say "Transistors will stop shrinking"...
Tags: #hardware #technology
  
  Not even the time to say "Transistors will stop shrinking"...
Tags: #hardware #technology
Futurism
  
  New Material Makes ‘One-Dimensional’ Semiconductors Possible
  Scientists from The University of Texas at Austin have studied two-dimensional transistors, and raise the possibility for even thinner 'one-dimensional' transistors.
  https://preshing.com/20150316/semaphores-are-surprisingly-versatile/
Tags: #programming #multithreading
  
  Tags: #programming #multithreading
Preshing
  
  Semaphores are Surprisingly Versatile
  In multithreaded programming, it’s important to make threads wait. They must wait for exclusive access to a resource. They must wait when there’s no work available. …
  https://techcrunch.com/2016/07/26/deep-learning-software-knows-that-a-rose-is-a-rose-is-a-rosa-rubiginosa/
Tags: #machinelearning
  
  Tags: #machinelearning
TechCrunch
  
  Deep learning software knows that a rose is a rose is a rosa…
  We can’t all be botanists, unfortunately, but most of us do have smartphones, and that may be a start. A computer vision system built by Microsoft Research Asia can identify thousands of…
  https://blog.malwarebytes.com/threat-analysis/exploits-threat-analysis/2016/07/a-look-into-some-rig-exploit-kit-campaigns/
Tags: #security
  
  Tags: #security
Malwarebytes Labs
  
  A look into some RIG exploit kit campaigns
  We've covered the Neutrino and Magnitude exploit kits. Now we take a look at number #3, RIG EK and the different distribution paths using packet captures collected by our honeypot. The campaigns for distribution involve malvertising and compromised sites…