Serverless static site using IPFS

Serverless static site using IPFS3r3208. TL; DR [/b] : IPFS allows you to host static sites on a distributed basis, which can be accessed through public caching gates (transparent reverse proxies) on the Internet, without having to install a program for a visitor. Such sites can be distributed without a routable (“white”) static IP address (will work for NAT), they remain operational with a short-term (several hours) absence of distributors, due to the cache on the gates. You can optionally bind your domain to gates, and you can add DNS records to several gates at the same time, to increase reliability and load balancing. The site ...
+ 0 -

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 2

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 1
 3r33395.
 3r33395. I use the interesting thing by Gary O’Leary-Steele, called Unicod-fun, which is pretty good for a utility written in Ruby. You know that my tools should be written exclusively in Python, so we translated it to Python. Now we can use different encoding for tools that are designed to attack web applications and are part of the WAF framework.
 3r33395.
 3r33395. 3r314.
 3r33395.
 3r33395. The WAF framework includes WAF Fun and WAFWOOF and operates on the basis of multi-coding and proxy information...
+ 0 -

The Maze Runner: Real-Time Analysis of Rat Neural Brain Activity

The Maze Runner: Real-Time Analysis of Rat Neural Brain Activity  
 
What superpower would you choose: flight, invisibility or telepathy? Alive, in a sense, the embodiment of the latter has always been the character of the X-Men comic, Professor Charles Xavier, who appeared back in 1963 from the pen of Stan Lee. But in the comics and not such superpowers can be found. What about reality? Is it possible to read the thoughts of another being? As it turns out, it is now possible, but not as you imagine. Today we are going to get acquainted with the study, the main achievement of which is reading the electronic activity of neurons in the brain of an experimental rat running ...
+ 0 -

MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 2 (lecture from the creator of the Tor network)

MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 2 (lecture from the creator of the Tor network)

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems". Nikolai Zeldovich, James Mykens. 2014

3r33475.  
Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r33475.  
3r33475.  
Lecture 1: "Introduction: threat ...[/h]
+ 0 -

More coffee, less caffeine: Intel 9th ​​Gen (Part 2)

 3r3699. 3r3-31. Part 1 Part 2 → Part 3 → Part 4
 3r3699. 3r3678.  3r3699.
System tests 3r3647. 3r3678.  3r3699. 3r314. 3r3678.  3r3699. 3r3678.  3r3699. The “System Tests” section focuses on testing in real-world conditions faced by the consumer, with a slight bias in throughput. In this section, we will look at the application download time, image processing, simple physics, emulation, neural modeling, optimized computation, and the development of three-dimensional models using readily available and customizable software. Although some of the tests more simply overlap with the capabilities ...
+ 0 -

Black Friday 2018 - VDS in Moscow and Amsterdam

 3r3174. 3r3-31. 3r3161.
Black Friday 2018 - VDS in Moscow and Amsterdam 3r33170. 3r3162.
 3r3174. 3r3147. Promotion for the rental of VDS 3r3148. it is arranged by us for the third time - now it can be considered traditional 3r3143. .
 3r3174. Compared with 3r315. last year
- 3r3147. prices are lower, and the parameters are better 3r3148. .
 3r3174. 3r3142. Only one thing has not changed
- connected to the stock 3r3147. the tariff remains at that value for an unlimited term of 3r3148. . * 3r3159.  3r3174.
 3r3174. 3r3147. Winter is close [/b] , and the next action only in a year!
 3r3174.
 3r3174. [i] “Prepare a sleigh in the summer, and VDS on ...
+ 0 -

Conference DEFCON 21. DNS can be dangerous for your health. Part 2

Conference DEFCON 21. DNS can be dangerous for your health. Part 1 3r3r434.  3r33450. 3r3r434.  3r33450. It was assumed that the boundaries of the organization's domain are foo.com and you never want to use www.com 3r3443. . Microsoft changed this DNS behavior because, obviously, not all organizations have two levels for domain names. 3r3r434.  3r33450. 3r3r434.  3r33450. Conference DEFCON 21. DNS can be dangerous for your health. Part 2  3r33450. 3r3r434.  3r33450. www.co.uk . Therefore, a random hotfix was created, a security fix narrowing the organizational boundaries ...
+ 0 -

Cerebellum and basal nuclei instead of a crystal ball: how the brain predicts the future

Cerebellum and basal nuclei instead of a crystal ball: how the brain predicts the future  
 
Today, you and I will move a bit away from examining research on the basis of our favorite physics /chemistry and turn our attention to research on the human body. More precisely on the study of the brain. This body is so complex that all previous studies gave one answer and 10 new questions, so to speak. More specifically, today we are going to consider a study that intends to answer the question - how does the brain predict the future? And no, we will not talk about tarot cards, coffee grounds, astrology and other unscientific things. We will talk about how the human brain, using existing knowledge...
+ 0 -

MIT course "Security of computer systems". Lecture 18: "Private Internet Browsing", part 3

MIT course "Security of computer systems". Lecture 18: "Private Internet Browsing", part 3

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014

3r33434.  
Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r33434.  
3r33434.  
Lecture 1: “Introduction: Threat ...[/h]
+ +1 -

MIT course "Security of computer systems". Lecture 17: “User Authentication”, part 2

MIT course "Security of computer systems". Lecture 17: “User Authentication”, part 2

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014

3r37777.  
Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r37777.  
3r37777.  
Lecture 1: "Introduction: threat ...[/h]
+ 0 -