Why programmer Continuous Integration and where to start

Imagine that Roskosmos decided to assemble a new rocket without having drawings and a clear understanding of how the missile should be arranged. A separate plant is engaged in the missile body, a separate engine produces engines, another one - nozzles. The chief manager of Roskosmos said that he trusts professionals, and expertly delegated all the work to the factories.
 
 
Why programmer Continuous Integration and where to start  
 
A year later all the components are delivered to the main assembly shop, and it turns out that the engine does not enter the housing, and the nozzles begin to melt even when the engine starts up.
 
 
To prevent such a thing, real ...
+ 0 -

Modify the player Vanilla Music for Android (part 2)

In the past article we figured out how to add to the player with open source. Vanilla Music the ability to switch tracks with the volume keys, if this device is in your pocket (for example). In this article, we continue to modify the main idea for which the following idea served - how you can switch tracks without touching the smartphone, without unlocking it - in general with minimal effort.
 
(Proximity sensor) . The essence of the idea is to switch the track when there is ...
+ 0 -

For beginners: 5 tips for GitHub

For beginners: 5 tips for GitHubIn October this year, I celebrated my fifth anniversary in GitHub. 5 years ago I was an accountant who knew nothing about programming, not to mention the use of Git and GitHub.
 
 
Now I'm a Data Scientist enthusiast who knows some things about writing code using Git & GitHub. Partly thanks to the study of these technologies, I made this career transition.
 
 
But even working in GitHub, it was difficult to learn Git and GitHub! So I want to share 5 tips on using GitHub with other people, new programmers.
 
 

Tip # 1: Use the editor associated with Git


 
For many people, a text editor when ...[/h]
+ 0 -

Conference DEFCON 18. "How I met with your girlfriend, or a new kind of Internet attacks." Sami Kamkar

Conference DEFCON 18. "How I met with your girlfriend, or a new kind of Internet attacks." Sami KamkarI will tell you about the development and implementation of a completely new kind of hacker attacks that will help me to meet with your girlfriend. But first a little about yourself.
 
 
My name is Sami Kamkar, I'm investigating security issues, but not professionally, but for my own pleasure, like most of those present here. I am known as the "Narcissistic Vulnerability Pimp", or "pimper of a narcissistic vulnerability", I am the author of the Samy Worm virus, created on MySpace several years ago, and one of the founders of IP PBX Fonality. I'm also called Chick Magnet, "a magnet for chickens," ...
+ 0 -

Conference DEFCON 21. "The Secret Life of SIM cards." Erik Butler, Carl Kosher

My name is Erik Butler, and this is Carl Kosher, and we want to talk with you about reading, creating, downloading and using the code on SIM cards. This project started last year, when I learned about the Tourcamp 201? a hacker camp on the coast of Washington, such an off-road DEFCON'e. No hotels, life in outdoor tents, it was already the second camp, I really liked the first one, I invited my friends and we decided to go there. This event was dedicated to the launch of the GSM network in several areas of the United States, and my task was to obtain several SIM-cards for this.
 
 
Conference DEFCON 21. "The Secret Life of SIM cards." Erik Butler, Carl Kosher ...
+ 0 -

Conference DEFCON 16. "Games with bar codes." Felix Lindner, head of Recurity Labs

Conference DEFCON 16. "Games with bar codes." Felix Lindner, head of Recurity LabsIn this speech, we will talk about barcodes - one-dimensional and two-dimensional bar codes, or matrix codes. Coding, decoding, some tricks, auxiliary things, unresolved problems. Unlike a one-dimensional linear barcode, where information is encoded in the sequence and thickness of vertical bars, a two-dimensional bar code, or 2D code, contains information both vertically and horizontally.
 
 
My report consists of the following items:
 
 
 
a quick introduction to the essence of barcodes;
 
encoding and reading barcodes;
 
scanners;
 
simple tricks with bar codes;
 
hidden attacks;
 
reading selected ...
+ 0 -

Upload messages using the Telegram API. Where to start

On the Internet, you can find many descriptions and examples of creating telegram bot. But Telegram Bot Api has limited functionality. To solve the task of unloading messages from Telegram by keyword, you must use the Telegram API. The library was used as a basis. TLSharp . It should immediately be clarified that further work is possible only for registered users in Telegram.
 
 
The start of working with the API is registering the application:
 
 
 
We go to the site Telegram and enter your phone number. Enter the verification code.
 
 
Upload messages using the Telegram API. Where to start
 
We f...
GitHub / C# / .NET
+ 0 -

Why GitHub does not help hire a

Why GitHub does not help hire adeveloper.One of my current projects is connected with the collection of data from GitHub-profiles of developers. GitHub profiles are difficult to use as a data source, so I want to immediately list the problems when I try to rate the developer only by its contribution to GitHub.  One common mistake is an employer's attempt to filter out candidates according to GitHub profiles. Many people still think that you can evaluate the developer's abilities by looking at his contribution to open source projects. For example, in the last list of vacancies on Hacker News heap with request ...
+ 0 -