Confession of a social hacker

Greetings,% username%. Are you ready for action? Go!
 
 
Man by nature is not hostile. He is inclined to solve problems peacefully and not
 
to enter into conflict situations. We are trying to win people's trust and establish
 
communication with him. The social engineer does all the same, only for his own
 
mercenary goals. He manipulates people without feeling real feelings. Social
 
Engineering is one of the most dangerous types of attacks.

 
 
PREFACE
 
«Only for fun» - such a motto we often used, attacking any
 
system. For a fairly short period of its activity a large
accumulated...
+ 0 -

Memo to a freshman or what would you like to pass to yourself then

Hello, community!
 
 
Memo to a freshman or what would you like to pass to yourself then  
 
None of you did not want to return to the first course and advise yourself then that something useful? Type: do not bother 24/? learn to rest, learn ML, buy bitcoin? Surely many would like to.
 
Therefore, we (a subset of students and teachers of VT ITMO) decided that it would be nice to collect such a "Memo of a freshman". And if you have interesting thoughts that will help future IT-schnikami, it would be very cool if you add them to the "Memo". Well, if you yourself are going to enter the university (or have recently done it), it will be great if you share a feedback!
 
 
All ...
+ 0 -

Actions on Google: write a simple application for Google Assistant for Dialogflow and Cloud Functions for Firebase

At the end of last month took place official release Google Assistant in Russian, so it's time to figure out how to make your applications ( exercises ) For the Assistant on the standard technological stack of Google. In this article we will consider creating an action in Actions on Google , we will analyze the process of extracting entities and intents from phrases in Dialogflow , learn how to write the handlers of extracted information and work with the network in Cloud Functions for Firebase .
 
 
Actions on Google: write a simple application for Google Assistant for Dialogflow and Cloud Functions for Firebase ...
+ 0 -

Researchers from Carnegie Mellon have so far created the most believable "deepfakes"

Researchers from Carnegie Mellon have so far created the most believable "deepfakes"Ever heard of "deepfakes"? AI, which imposes the face of one person on the body of another, was used to replace Harrison Ford with Nicolas Cage in countless video clips, as well as for more vile purposes: celebrities without their knowledge appeared in porn and propaganda. Now, for better or worse, researchers at the University of Carnegie Mellon have developed a new, more powerful and versatile system.
 
 
+ 0 -

ICO is deservedly on the decline, but they have a chance to swap

The crypto-currency market is declining, at the same time significantly decreased. The amount of investment that attracts ICO projects. Maybe it's just market fluctuations, but it is more likely that the recession is caused by investments from high content of fraudulent ICO projects and uncertainty with the government regulation of these start-ups. Both reasons can be eliminated.
 
 
ICO is deservedly on the decline, but they have a chance to swap  
lifting market immediately ...
+ 0 -

Now officially: TLS 1.3 is recognized by the standard

Previously we had wrote. , that the Internet Engineering Council (IETF) approved a new version of TLS - 1.3. Last week, the protocol was recognized as the standard. Today - let's talk about its capabilities.
 
 
Now officially: TLS 1.3 is recognized by the standard

 
/photo Charles Dyer CC
 
 
[h2] Features of TLS ???r3r3209.
 
The protocol was updated in 2014. Unofficially work on TLS 1.3 ended in March this year, but engineers took several months to conduct additional checks.
 
 
The creators argue that the final version of TLS 1.3 is more secure and productive: all known (to date) TLS 1.2 vulnerabilities are closed in its encryption ...[/h]
+ 0 -

Another story about how to steal money on Megafon

upd: I clarify: this is not a complaint, but a warning article, check your details
 
 
It was evening, there was nothing. I sat on the sofa, I did not touch anyone, I corresponded in contact (I confess three times). On the phone (which I only have to call and distribute the Internet) comes a couple of sms with a difference of 2 minutes. I'm tired of laziness, I got up from the couch, went to the phone and turned on the screen. From what I saw, I fell into a stupor.
 
 
Treacherously and without declaration of war at 20:22 local time, I received an SMS from the number 5151: " Subscription ...
+ 0 -

Do not reset or normalize?

Do not reset or normalize?  
 
Here I will share my experience for normalization and resetting styles.
 
For several years I have formed a small file, based on which, initially, was taken normal.
 
 
Why is it normal, not resets? It is sharpened precisely under cross-browser compatibility, which is very important. But in its pure form, he did not suit me at all, various indents, borderers, etc., only interfered, because I slightly adjusted it to my needs, poddalav what I did not need.
 
Over time, the file grew, the excess from the normal was deleted, the missing was added.
 
The main purpose of its creation was to prepare the basis ...
HTML / CSS
+ 0 -

Early Universe 6. Dynamics of a homogeneous expanding universe, part 2

Early Universe 6. Dynamics of a homogeneous expanding universe, part 2On the site of free lectures MIT OpenCourseWare laid out course of lectures on cosmology Alan Hus, one of the creators of the inflationary model of the universe.
 
 
Your attention is invited to translate the sixth lecture: "Dynamics of a homogeneous expanding universe, part 2".
 
 

 
 
The impossibility of the existence of a static universe.
 
Let's briefly repeat what we stopped last time, because we did not finish the previous topic.
 
 
We considered an absolutely homogeneous universe in which the substance fills the whole space. Recall that Newton came to the conclusion that ...
+ 0 -

Emulation of property literals with Java 8 Method Reference

Emulation of property literals with Java 8 Method Reference
 
 
From the translator: to the translation of this article I was pushed by the insult from the absence of the operator nameOf in the Java language. For the impatient - at the end of the article there is a ready implementation in source code and binaries.
 
 
One of the things that developers of libraries in Java often lack is literals of properties. In this post, I'll show you how you can creatively use the Method Reference from Java 8 to emulate the property literals using bytecode generation.
 
 
Akin to class literals (for example, Customer.class ), The property literals would ...
+ 0 -