Syra's Techbinder is part of Silicon Network (@siliconnetwork), a network of tech and programming channels and groups.
To view all of our channels and groups, visit https://t.iss.one/siliconnetwork
  To view all of our channels and groups, visit https://t.iss.one/siliconnetwork
https://www.zdnet.com/article/think-firefox-quantum-is-fast-try-firefox-58-out-next-week-says-mozilla/
Tags: #performance #mozilla #internet
  
  Tags: #performance #mozilla #internet
ZDNet
  
  Think Firefox Quantum is fast? Try Firefox 58, out this week, says Mozilla | ZDNet
  The incoming Firefox 58 brings faster page loads thanks to a new compiler and streaming compilation, reports Mozilla.
  https://arstechnica.com/information-technology/2018/01/more-than-2000-wordpress-websites-are-infected-with-a-keylogger/
Tags: #security #wordpress
  
  Tags: #security #wordpress
Ars Technica
  
  More than 2,000 WordPress websites are infected with a keylogger
  Malicious script logs passwords and just about anything else admins or visitors type.
  https://iq.intel.com/blockchain-moves-beyond-bitcoin/
A good explaination made by Intel, about how blockchain works and which are its benefits when used for transactions.
Tags: #technology #blockchain
  
  A good explaination made by Intel, about how blockchain works and which are its benefits when used for transactions.
Tags: #technology #blockchain
iQ by Intel
  
  Blockchain Moves Beyond Bitcoin - iQ by Intel
  Touted as the next big tech disrupter in the world of business, blockchain technology could make transactions, from finance to food chain logistics, faster and more secure.
  https://github.com/rapid7/metasploit-framework/pull/9473
NSA's tools for Windows from which WannaCry & Co. generated, got modified to work on every Windows version, from 2000 to 10.
Tags: #windows #security #exploit
  
  NSA's tools for Windows from which WannaCry & Co. generated, got modified to work on every Windows version, from 2000 to 10.
Tags: #windows #security #exploit
GitHub
  
  MS17-010 EternalSynergy / EternalRomance / EternalChampion aux+exploit modules · Pull Request #9473 · rapid7/metasploit-framework
  MS17-010 Windows SMB Remote Command and Code Execution modules for all vulnerable targets Windows 2000 through 2016 (and of course the standard home/workstation counterparts).
auxiliary/admin/smb/...
  auxiliary/admin/smb/...
https://motherboard.vice.com/en_us/article/a34g9j/iphone-source-code-iboot-ios-leak
The original repository on Github was taken down for DMCA infringement.
Meanwhile, a "fork" can be found here while available: https://github.com/0x11901/iBoot/
Thanks to @cblunardi for the update.
Tags: #leak #ios
  
  The original repository on Github was taken down for DMCA infringement.
Meanwhile, a "fork" can be found here while available: https://github.com/0x11901/iBoot/
Thanks to @cblunardi for the update.
Tags: #leak #ios
Vice
  
  Key iPhone Source Code Gets Posted Online in 'Biggest Leak in History'
  Source code for iBoot, one of the most critical iOS programs, was anonymously posted on GitHub.
  Hey, what's up! Here's Alexander, from Techbinder staff.
We are aiming to push Techbinder to another level always by keeping in mind the concept of "community".
So we came up with this idea and question: would you partecipate to a Techbinder collab-center?
A collab-center is a group for a restricted number of collaborators, in which they will be able to share and discuss different kind of topic.
To each member will be assigned a topic of their choice for which they'll have to search for resources to be sent, discussed and shared on the main channel with the other members.
If you are interested, you can fill the form available to the following URL:
https://goo.gl/forms/s9gtqR9zzIHi3nOu1
If the project will take the flight, you'll be contacted once the feature will be ready.
Thank you very much and have a nice day! 😉
  
  We are aiming to push Techbinder to another level always by keeping in mind the concept of "community".
So we came up with this idea and question: would you partecipate to a Techbinder collab-center?
A collab-center is a group for a restricted number of collaborators, in which they will be able to share and discuss different kind of topic.
To each member will be assigned a topic of their choice for which they'll have to search for resources to be sent, discussed and shared on the main channel with the other members.
If you are interested, you can fill the form available to the following URL:
https://goo.gl/forms/s9gtqR9zzIHi3nOu1
If the project will take the flight, you'll be contacted once the feature will be ready.
Thank you very much and have a nice day! 😉
Google Docs
  
  Techbinder Collab-center
  We are evaluating to create a collab-center, a group for a restricted number of collaborators in which they would be able to share and discuss different kind of topic.
To each member will be assigned a topic of their choice for which they'll have to search…
  To each member will be assigned a topic of their choice for which they'll have to search…
https://securelist.com/zero-day-vulnerability-in-telegram/83800/
An analysis of Russian Telegram RTL character attack under Windows environment.
Tags: #security #telegram #flaw
  
  An analysis of Russian Telegram RTL character attack under Windows environment.
Tags: #security #telegram #flaw
Securelist
  
  Zero-day vulnerability in Telegram
  In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when a user sends files over the messenger service.
  https://gizmodo.com/researchers-find-new-ways-to-exploit-meltdown-and-spect-1823020029
Meltdown and Spectre got updated to their "Prime" version. By exploiting now cache invalidation protocols.
Tags: #security #exploit #flaw
  
  Meltdown and Spectre got updated to their "Prime" version. By exploiting now cache invalidation protocols.
Tags: #security #exploit #flaw
Gizmodo
  
  Researchers Find New Ways to Exploit Meltdown and Spectre Vulnerabilities in Modern CPUs
  In the past few weeks, the entire information security industry has grown very anxious about Meltdown and Spectre, two classes of exploits that can be used to manipulate vulnerabilities in the way many varieties of modern processors (but especially Intel…
  https://bagder.gitbooks.io/http2-explained/en/
A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
  A detailed document describing HTTP/2, the background, concepts, protocol and something about existing implementations.
Tags: #http #networking
https://codeburst.io/node-js-v8-internals-an-illustrative-primer-83766e983bf6
A very great explanation of how Node.JS works under the hood, by a fan of C++.
Tags: #programming #cpp #javascript #node
  
  A very great explanation of how Node.JS works under the hood, by a fan of C++.
Tags: #programming #cpp #javascript #node
Medium
  
  Node.js V8 internals: an illustrative primer
  When you switch from C++ to a more “friendly” language, you get this strange feeling of being fooled by this new language, its environment…
  https://web.archive.org/web/20120504043127/https://scienceblogs.com/goodmath/2006/11/the_c_is_efficient_language_fa.php
Tags: #programming #c #performance
  
  Tags: #programming #c #performance
web.archive.org
  
  The "C is Efficient" Language Fallacy : Good Math, Bad Math
  I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to...
  https://www.techrepublic.com/article/electronics-sniffing-dogs-how-k9s-became-a-secret-weapon-for-solving-high-tech-crimes/
Molecular sniffer dogs got upgraded: now they are able to find electronic components.
Tags: #hardware #technology
  
  Molecular sniffer dogs got upgraded: now they are able to find electronic components.
Tags: #hardware #technology
TechRepublic
  
  Electronics-sniffing dogs: How K9s became a secret weapon for solving high-tech crimes
  Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.
  https://preshing.com/20171218/how-to-write-your-own-cpp-game-engine/
Tags: #programming #cpp #gamedev
  
  Tags: #programming #cpp #gamedev
Preshing
  
  How to Write Your Own C++ Game Engine
  Lately I’ve been writing a game engine in C++. I’m using it to make a little mobile game called Hop Out. Here’s a clip captured from my iPhone 6. (Unmute for …