A way to bypass password protection on the iPhone /iPad

A way to bypass password protection on the iPhone /iPadhas been detected. Attack allows attackers to make any number of attempts to enter a password on a locked Apple device without the risk that a security mechanism will be erasing all data.  method bypass the limit of 10 attempts and enter as many passwords as you like - even on iOS 11.3.  The attacker only needs a locked locked smartphone and a Lightning cable. In normal conditions on iPhones and aipads, the number of attempts to enter a password per minute is limited. The latest Apple devices contain a separate chip to protect against brute force attacks, which counts how many password attempts have been made...
+ 0 -

Companies used the word "block" to increase capitalization. Has helped or assisted for a short while

Companies used the word "block" to increase capitalization. Has helped or assisted for a short while
 
 
The mention of technology at the peak of popularity in the name of the company is an old technique that at various times allowed companies to attract the attention of the market. In the second half of the 90s, "in fashion" was the renaming using the Internet "," .net "and" .com ". Today's trend is blocking and crypto-currencies.

 
 

Everybody wanted to be in the trend


 
"Blocking" in the title does not always indicate a technological start-up. From December 2017 to January 201? announcements of rebranding and launching of a new direction allowed companies that previously did not belong to IT...[/h]
+ 0 -

Overview on SERM

In this article I want to tell you how and why companies manage their reputation on the Internet. There are different ways to manage the reputation, but I want to tell you about SERM, this is the most popular and effective way for small and medium-sized companies. If to decipher an abbreviation, SERM is a reputation management in search engines . SERM is a whole package of activities that aims to increase positive reviews in the top 10 (rarely top 20) in the SERP, as well as to work with negative reviews and publications.
 
 
Overview on SERM
 
 
In Ru...
+ 0 -

Search for vulnerabilities in smart contracts: an overview of the EtherHack contest on Positive Hack Days 8

Search for vulnerabilities in smart contracts: an overview of the EtherHack contest on Positive Hack Days 8
 
 
This year at PHDays for the first time there was a competition called EtherHack . Participants sought vulnerabilities in smart rate contracts. In this article we will tell you about the tasks of the competition and the possible ways to solve them. Predict random numbers in clever contracts Ethereum . The first task was based on the pseudo-random number generator (GPRS), which used the hash of the last block as the source of entropy for generating random numbers:
 
 
pragma solidity ^ ???;
contract Azino777 {
function spin (uint256 bet) public payable {
require ...
+ 0 -

Nvidia has taught the neural network to slow the video

Nvidia has taught the neural network to slow the videoIn our life there can be many moments that need to be recorded on the camera in slow motion - the first steps of the child, the first trip to the sea, the trick of your favorite dog. Modern smartphone allows you to shoot at a rate of 240 frames per second or higher, but constantly in this mode you can not record - there is not enough memory and the battery will sit up quickly. Created by Nvidia, the neural network works with the footage already captured, turning them into slow motion.
 
 
+ 0 -

Cyber ​​grandmother, or how we hakatonili day

Cyber ​​grandmother, or how we hakatonili dayApril 7-8 in the Contour was an open hackathon - a 27-hour programming marathon. Developers, testers, designers and interface designers gathered to storm tasks. Only the topic was not working problems, but games.
 
The rules are simple to the point of horror: you come without any preparations and after a day show what you have done. Hackaton was held in five cities: Yekaterinburg, Izhevsk, Innopolis, Novosibirsk and Perm. For the first time we invited all comers .
 
I was called to judge him, and I do not regret that I spent this weekend. Today I'll tell you how it was in Yekaterinburg, and ...
+ 0 -

How to assemble an analyst and not kill performance

How to assemble an analyst and not kill performanceAnalytics is an integral part of a modern mobile application. Analytics allows you to collect information about the user to develop and improve the product.
 
 
Often, gathering information reduces application performance. The process also loads CPU and memory, and this is a high price. Slow work of the application can cause negative feedback from users, lower ratings and lead to loss of audience.
 
 
This problem was also faced by our team of Android developers while working on another project, which was connected with the news. We had to register the display of every news in the list.
 
...
+ 0 -

Access to data in multi-user applications

Access to data in multi-user applications The issue of restricting access to data arises in the development of multi-user systems almost always. The main scenarios are as follows:
 
 
 
restriction of access to data for users not authenticated
 
restriction of access to data for authenticated but not possessing the necessary privileges of users
 
prevention of unauthorized access through direct calls to API
 
filtering data in search queries and list elements UI (tables, lists)
 
preventing the change of data belonging to one user by other users
 
 
Scenarios 1-3 are well described and are usually solved using built-in framework tools, for ...
+ 0 -

What does the theory of numbers relate to the trajectory of light?

We, after Gauss, recognize the "royal" status of mathematics, and given that our company has a competence center "Algorithmic Support", we often have interesting materials on this topic: then our colleagues write their own author's articles, then, studying , which is interesting for foreign colleagues, they prepare short reviews and translations of third-party articles. Probably it will be useful to those who share our interests, so we decided to share these materials and knowledge.
 
Source We, after Gauss, recognize the "royal" status of mathematics, and given that our company has a competence center "Algorithmic Support", we often have interesting materials on this topic: then our colleagues write their own author's articles, then, studying , which is interesting for foreign colleagues, they prepare short reviews and translations of third-party articles. Probably it will be useful to those who share our interests, so we decided to share these materials and knowledge.  Source ...
+ 0 -

The history of one SSL handshake is

Hello, Habr!
 
 
Recently I had to screw SSL with mutual authentication (mutual authentication) to the Spring Reactive Webclient. It would seem that the case is simple, but it resulted in wandering in the source code of JDK with an unexpected ending. The experience was typed on the whole article, which can be useful to engineers in daily tasks or in preparation for an interview.
 
 
The history of one SSL handshake is
example , as it can be customized by throwing the object SslContext, which just stores ...
+ 0 -