Two bits per transistor: Intel 8087

Two bits per transistor: Intel 8087high-density ROM on a floating point chip.Intel developed the 8087 chip in 1980 in order to improve PC performance with 8086/8088 processor lines (such as the IBM PC) when performing floating point operations. Since the first microprocessors were designed to perform operations with integers, the execution of operations with floating-point numbers was slow, which already speak of performing transcendental operations, such as trigonometric functions or logarithms. The 8087 coprocessor significantly increased the speed of performing tasks with a floating point, everything was performed almost 100 times faster. The 8087 architecture was also ...
+ 0 -

10 dollars on hosting: 20 years ago and today

10 dollars on hosting: 20 years ago and todayEverything is getting more expensive, and technologies are getting cheaper. Once a computer or a mobile phone could afford units, now these devices are in every Russian family.
 
 
Another example is hosting. The price of a megabyte over the past 20 years has dropped several thousand times. In 199? for 10 dollars a month, you could rent only 10 MB on an FTP server, and today - 30 GB on VDS.
 
 
In this article we will look at the prices and services of previous years and compare them with prices from 2K18. We will grin and rejoice at what is available today and was not available 20 years ago :-).
 
 
So, ho...
+ 0 -

Conference DEFCON 18. Troll reverse engineering with the help of mathematics

Trolling with math is what I'm going to talk about. This is not some kind of fashionable hacker stuff, rather, it’s an artistic expression, a funny, intelligent technology so that people would consider you a jerk. Now I will check if my report is ready for display on the screen. It seems everything is going fine, so I can introduce myself. 3r37474.  3r33490. 3r37474.  3r33490. Conference DEFCON 18. Troll reverse engineering with the help of mathematics
3r37474.  3r33490. 3r37474.  3r33490. My name is Frank Tu, it is written frank ^ 2 and @franksquared on Twitter, because Twitter also has some kind of spammer called "frank 2". I tried to apply social engineering to them so that they ...
+ 0 -

Serverless static site using IPFS

Serverless static site using IPFS3r3208. TL; DR [/b] : IPFS allows you to host static sites on a distributed basis, which can be accessed through public caching gates (transparent reverse proxies) on the Internet, without having to install a program for a visitor. Such sites can be distributed without a routable (“white”) static IP address (will work for NAT), they remain operational with a short-term (several hours) absence of distributors, due to the cache on the gates. You can optionally bind your domain to gates, and you can add DNS records to several gates at the same time, to increase reliability and load balancing. The site ...
+ 0 -

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 2

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 1
 3r33395.
 3r33395. I use the interesting thing by Gary O’Leary-Steele, called Unicod-fun, which is pretty good for a utility written in Ruby. You know that my tools should be written exclusively in Python, so we translated it to Python. Now we can use different encoding for tools that are designed to attack web applications and are part of the WAF framework.
 3r33395.
 3r33395. 3r314.
 3r33395.
 3r33395. The WAF framework includes WAF Fun and WAFWOOF and operates on the basis of multi-coding and proxy information...
+ 0 -

The Maze Runner: Real-Time Analysis of Rat Neural Brain Activity

The Maze Runner: Real-Time Analysis of Rat Neural Brain Activity  
 
What superpower would you choose: flight, invisibility or telepathy? Alive, in a sense, the embodiment of the latter has always been the character of the X-Men comic, Professor Charles Xavier, who appeared back in 1963 from the pen of Stan Lee. But in the comics and not such superpowers can be found. What about reality? Is it possible to read the thoughts of another being? As it turns out, it is now possible, but not as you imagine. Today we are going to get acquainted with the study, the main achievement of which is reading the electronic activity of neurons in the brain of an experimental rat running ...
+ 0 -

MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 2 (lecture from the creator of the Tor network)

MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 2 (lecture from the creator of the Tor network)

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems". Nikolai Zeldovich, James Mykens. 2014

3r33475.  
Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r33475.  
3r33475.  
Lecture 1: "Introduction: threat ...[/h]
+ 0 -

More coffee, less caffeine: Intel 9th ​​Gen (Part 2)

 3r3699. 3r3-31. Part 1 Part 2 → Part 3 → Part 4
 3r3699. 3r3678.  3r3699.
System tests 3r3647. 3r3678.  3r3699. 3r314. 3r3678.  3r3699. 3r3678.  3r3699. The “System Tests” section focuses on testing in real-world conditions faced by the consumer, with a slight bias in throughput. In this section, we will look at the application download time, image processing, simple physics, emulation, neural modeling, optimized computation, and the development of three-dimensional models using readily available and customizable software. Although some of the tests more simply overlap with the capabilities ...
+ 0 -

Black Friday 2018 - VDS in Moscow and Amsterdam

 3r3174. 3r3-31. 3r3161.
Black Friday 2018 - VDS in Moscow and Amsterdam 3r33170. 3r3162.
 3r3174. 3r3147. Promotion for the rental of VDS 3r3148. it is arranged by us for the third time - now it can be considered traditional 3r3143. .
 3r3174. Compared with 3r315. last year
- 3r3147. prices are lower, and the parameters are better 3r3148. .
 3r3174. 3r3142. Only one thing has not changed
- connected to the stock 3r3147. the tariff remains at that value for an unlimited term of 3r3148. . * 3r3159.  3r3174.
 3r3174. 3r3147. Winter is close [/b] , and the next action only in a year!
 3r3174.
 3r3174. [i] “Prepare a sleigh in the summer, and VDS on ...
+ 0 -

Conference DEFCON 21. DNS can be dangerous for your health. Part 2

Conference DEFCON 21. DNS can be dangerous for your health. Part 1 3r3r434.  3r33450. 3r3r434.  3r33450. It was assumed that the boundaries of the organization's domain are foo.com and you never want to use www.com 3r3443. . Microsoft changed this DNS behavior because, obviously, not all organizations have two levels for domain names. 3r3r434.  3r33450. 3r3r434.  3r33450. Conference DEFCON 21. DNS can be dangerous for your health. Part 2  3r33450. 3r3r434.  3r33450. www.co.uk . Therefore, a random hotfix was created, a security fix narrowing the organizational boundaries ...
+ 0 -