Security Week 22: two-second smart locks

Security Week 22: two-second smart locks The past week was marked by a couple of interesting news from the insecure world of Internet things, and the main event, of course, was the study of the smart lock Tapplock ( , News , Original report ). Researcher from Pen Test Partners Andrew Tierney did not just bypass the protection of the electronic lock, but rather discovered the complete absence of any security system in the "digital" part of the device.
 
Indiegogo , planning to collect 40 thousand dollars for bringing finished prototypes to ...
+ 0 -

Gallop for three years: which can be interesting to read in the blog HashFlare

Unbelievable, but true: HashFlare's cloud-based mining blog on "Habr" turned three years old. Our first entry is " How the production of bitcoins changed: from CPU to cloud mining "Was published on June ? 2015 at the then still very young" Giktimes ". It was this Russian-language blog that became the first permanent blog of HashFlare in general. But that was only the beginning.
 
 
Gallop for three years: which can be interesting to read in the blog HashFlare
 
Just the first picture
 
 
Over the past three years, we have changed as quickly as the whole kriptonok. Our user base has long been global and multilanguage - that's why our main blog is ...
+ 0 -

"So it was possible": unusual, but effective ways of using "audio" technologies

"So it was possible": unusual, but effective ways of using "audio" technologiesAll technologies have principles of targeted use, including audio technology. But sometimes it works in unusual and unpredictable conditions. So there were already familiar to us echo sounders and ultrasound devices: in these devices, sound helps to perform an allegedly "un-purposeful" function for him - to see what is hidden for the ordinary eye, to navigate in space.
 
 
And now some audio gadgets and "audio" technologies can be used quite differently than we are used to. Today we talk about several cases of unusual - and surprisingly effective - application of audio technology or physical properties ...
+ 0 -

Man, his environment and the Internet of things

The availability of information technology and a noticeable change in the attitude to their presence in everyday life gave impetus to the development of the Internet of Things. For the last ten years, IoT has managed to penetrate almost all areas, shifting to "smart" devices the concern for the comfort and safety of a person, performing monotonous or dangerous work for him, and forming together with him a common information space.
 
 
Man, his environment and the Internet of things  
MONICA , whose goal is to develop a security complex to protect people in their mass congestion (concerts, amusement parks, rallies, etc.). Part of the security system ...
+ 0 -

What you need to know before developing a backtest for trading strategy: typical problems, types of systems and their parameters

What you need to know before developing a backtest for trading strategy: typical problems, types of systems and their parameters
 
 
The editorial staff of the QuantStart portal wrote
material
about what you should know when you start developing your own system for testing trading strategies. Some of the issues discussed in the article we discussed in the blog earlier, so this time we prepared an adapted retelling of the theses about what problems the developers face, what is the difference between backtesters of different types, and what are their pros and cons. ITI Capital :
 
 
Analytics and market reviews
 
...
+ 0 -

Windows and case-sensitive filesystem

Long ago, at the dawn of its birth, Windows used the FAT file system. Then it was replaced by Microsoft and IBM developed NTFS. In those old days, there were two opposing approaches to the file system. Linux uses a case-sensitive file system, and in Microsoft it is case-insensitive.
 
 
The bottom line is that in case-sensitive file systems it is considered that names written in different registers (for example, FILE.txt and file.txt) are different names. And for Windows, there is no difference between the two.
 
 
Windows and case-sensitive filesystem  
 
Despite t...
+ 0 -

Upgrade the text protocols to binary and we struggle with the legacy code at the C ++ User Group

Upgrade the text protocols to binary and we struggle with the legacy code at the C ++ User Groupmeeting. We invite you to the next meeting of the C ++ User Group, which will be held on June 28 in the framework of our event platform CoLaboratory. Last time we discussed the performance and the Clang Static Analyzer. Now let's talk about painful: how to get rid of legacy-code? How to avoid its formation in the future? What difficulties arise when upgrading the protocol of interaction, and how to deal with them? here .  In addition, we will conduct an online broadcast on YouTube channel Kaspersky Lab Russia for those who did not have time for us...
+ 0 -

Security Week 21: hundreds of vulnerabilities Adobe Flash

Security Week 21: hundreds of vulnerabilities Adobe Flash On June ? Adobe closed a critical vulnerability in Flash Player (3r3r3? news
, 3r3r3? company's announcement
). The CVE-2018-5002 vulnerability was discovered by several research teams from China at once - it's about remote execution of arbitrary code as a result of a buffer overflow error. This vulnerability is zero day: at the time of detection, it has already been used in targeted attacks in the Middle East. This rather serious problem is perceived as routine news simply because of the name of the affected product: well, who can already surprise RCE in the flush?
 
 
Only this year this is the second critical ...
+ 0 -

Sochi.Kamera: the features of creating a project in general, completely, completely from scratch, without standards and already implemented examples

Sochi.Kamera: the features of creating a project in general, completely, completely from scratch, without standards and already implemented examples Sochi.Camera - A site with broadcast of streams from more than 300 web cameras installed in Sochi and its environs. The site and the entire service is non-commercial, created and maintained on its own funds by a local ISP "Business Communication" , already almost 10 years. In this post we will describe how to code from absolute zero; about the battle with YouTube (we won); why free software is bad, and free video streaming service is good. Perhaps in the future, when they turn to us with another proposal - write for 100-200 thousand rubles. the same service as Sochi.Camera, we instead ...
+ 0 -

AI, practical course. Collection and study of images

AI, practical course. Collection and study of images  
 
This article discusses methods used to collect data from images in a music project with a slide show. There were limitations that forced us to use the existing image database, rather than images taken from Flickr. However, this article discusses both approaches so that the reader can learn how to extract data using the Flickr API.
 
Further, since the quality of a significant portion of the images collected with Flickr turned out to be low, it was decided to use images from existing image databases. In particular, images were collected from three databases for psychological research.
 
...
+ 0 -