Krebs on Security: The Lowdown on the Apple-FBI Showdown
Many readers have asked for a primer summarizing the privacy and security issues at stake in the the dispute between Apple and the U.S. Justice Department, which last week convinced a judge in...
View ArticleDarknet – The Darkside: Linset – Evil Twin Attack Bash Script
Linset is an Evil Twin Attack Bash script with everything built in (multi-lingual web page, DHCP, DNS server with redirect fake AP etc) so it has a bunch of dependencies, and it’s in Spanish. But other...
View ArticleTorrentFreak: The Walking Dead “Disappears” From Torrent Sites
As one of the most pirated TV-shows, The Walking Dead is downloaded by millions of people. However, finding a copy of the latest episode has become somewhat of an annoyance, as copyright holders are...
View ArticleМедийно право : КТБ, избрани цитати
2005: Тройната коалиция всеки момент ще дойде на власт. Доган гостува при Слави Трифонов: всяка партия си има, така да се каже, обръч от фирми. . . Ако мислите, че моите възможности са по-малки от на...
View ArticleMatthew Garrett: Freedom, the US Government, and why Apple are still bad
The US Government is attempting to force Apple to build a signed image that can be flashed onto an iPhone used by one of the San Bernardino shooters. To their credit, Apple have pushed back against...
View ArticleМедийно право : Европейския надзорен орган по защита на данните:...
В Официален вестник на ЕС: Резюме на становището на Европейския надзорен орган по защита на данните относно „Справяне с предизвикателствата, свързани с големите масиви от данни: призив за прозрачност,...
View ArticleМедийно право : Съд на ЕС: директен ефект
В Официален вестник на ЕС: съобщение за едно решение, което е интересно, защото Съдът се е произнесъл за директен ефект. Дело C-402/14 Dioikitiko Efeteio Athinon — Гърция Преюдициални въпроси 1)...
View ArticleAWS Official Blog: Amazon RDS Update – Support for MySQL 5.7
You can now launch Amazon RDS database instances that run MySQL 5.7 . This release of MySQL offers a number of performance, scalability, and security enhancements. Here are some of the most important...
View ArticleМедийно право : Съд на ЕС: ЕК иска отмяна на Заключенията на Съвета относно...
В Официален вестник на ЕС: съобщение за жалба, подадена на 17 декември 2015 г. — Дело C-687/15 Европейска комисия/Съвет на Европейския съюз. Случаят е интересен поради страните, а и поради предмета....
View ArticleAWS Official Blog: AWS Week in Review – February 15, 2016
Let’s take a quick look at what happened in AWS-land last week: Monday February 15 The talked about What’s Next for Lumberyard. The published a Practical Guide to Cloud Migration. The showed our...
View ArticleLWN.net: Kaminsky: A Skeleton Key of Unknown Strength
Dan Kaminsky looks at the glibc DNS bug (CVE-2015-7547). "We’ve investigated the DNS lookup path, which requires the glibc exploit to survive traversing one of the millions of DNS caches dotted across...
View ArticleМедийно право : Блокирането на рекламите: ефекти
Доставчиците на съдържание разчитат на приходи от реклама като основен източник на финансиране, това е валидно за класическите медии, например търговската телевизия. Същевременно свидетели сме на...
View ArticleNerdling Sapple: Git Daemon Dummy: 301 Redirects for git://
Git Daemon Dummy: 301 Redirects for git:// With the wide deployment of HTTPS, the plaintext nature of git:// is becoming less and less desirable. In order to inform users of the git://-based URIs to...
View ArticleSource Code in TV and Films: assembly code from serial experiments lain
assembly code from serial experiments lain
View ArticleTorrentFreak: HTTPS Renders UK Pirate Site Blocklist Useless
By now most UK Internet users have gotten used to pirate sites being blocked by their ISPs. However, thanks to HTTPS many subscribers have been enjoying a glimpse of an open and unrestricted web, as...
View ArticleRaspberry Pi: Raspberry PiLab at PyCon Namibia 2016
Ben: Here’s a guest post from Daniele Procida, Community Manager at Divio – he’s a Djangonaut and lover of Python Conferences. I’m lucky enough not only to work for a company that uses and produces...
View ArticleSchneier on Security: Practical TEMPEST Attack
Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware was about $3,000. News article: To...
View ArticleMarian Marinov/HackMan: Bird memory usage
Bird’s memory usage with 8 BGP sessions (6 of which full BGP tables): root@sfgw:~# birdc show memory BIRD 1.5.0 ready. BIRD memory usage Routing tables: 160 MB Route attributes: 136 MB ROA tables: 112...
View ArticleTorrentFreak: The BPI Announces a Brand New Anti-Piracy Boss
The BPI recently announced it would be removing the leaders of both its Content Protection Unit and Head of Internet Investigations. The music industry group has now hired fresh blood to head up its...
View Article