Security Week 30: Five paragraphs about Black Hat

Security Week 30: Five paragraphs about Black Hat Black Hat is a conference on information security, performed in the traditional for the industry genre "questions without answers." Every year in Las Vegas, experts are going to share their latest achievements, which cause insomnia and hand tremors in hardware manufacturers and software developers. And not that it was bad. On the contrary, to sharpen the art of finding problems, while being on the "bright side" - it's wonderful!
 
 
But there is still some internal conflict on Black Hat. It is impossible to repeat indefinitely that "everything is bad, bad, bad with security," without offering anything in return...
+ 0 -

Ten best gaming mice for any purse

Game mice are a special subspecies of computer mice, to which the highest requirements are imposed. In computer battles, where reaction and endurance are important, any unpleasant little thing can cause a loss. Fortunately, today in the market you can find a variety of gaming rodents for any requirements. In this review we will describe the ten most interesting models.
 
 
Ten best gaming mice for any purse  
accessible gaming mouse in our list, with an optical sensor with a resolution of 600-1600 Dpi and a mechanical resolution switch right on the case. Confident work on the rug, weight 112 grams and a durable USB-cable in nylon braiding ...
+ 0 -

The art of picking up other people's passwords

In the cult film of the beginning of the two thousandth Fish Sword, a talented hacker needs to pick up a password within one minute. In this he is helped by a friend who carefully keeps the gun at his temple and a temperamental blonde hiding under the table. What to do if there are no such friends nearby, and the password should be chosen? For example, during penetration testing
 
The art of picking up other people's passwords  
A small but important warning: if the approach proposed in the article is not used in the framework of security testing projects, then your actions can easily fall under Article 272 of the Criminal Code of the Russian Federation ...
+ 0 -

Encryption of the default key in OpenSSH is worse than its absence

The authors of this material argue against the standard key encryption mechanisms in OpenSSH.
 
 
Encryption of the default key in OpenSSH is worse than its absence
 
Recently, attackers used the npm-package eslint-scope to steal npm-tokens from home user directories. In the light of this event, we checked out other similar vulnerabilities and thought about how to reduce the risks and consequences of such incidents.
 
 
Most of us have an RSA SSH key at hand. Such a key gives the owner various privileges: as a rule, it is used to access the production environment or in GitHub. Unlike nmp tokens, SSH keys are encrypted, and therefore it is accepted that nothing terrible ...
+ 0 -

Release of the stable version of Dart 2.0 and Dart Web Platform

Note: Join the Russian-speaking Dart community at Telegram , Slack and Google+ . And at the end of the article you are waiting for a small announcement.
 
 

Revival of Dart as a popular programming language for mobile and web development


 
Today we announce the release of a stable version of the Dart-2.0 programming language, as well as the Dart web platform, which offers a unique combination of productivity, performance and scalability.
 
 
Release of the stable version of Dart 2.0 and Dart Web Platform  
 
...[/h]
+ 0 -

Why in the near future complex proposals will form the basis of retail

To improve the quality of customer service and provide consumers with a wide choice, retailers break large trade offers into narrowly focused services. The author of the article discusses how effective such strategies are, and why well-thought-out integrated solutions can turn out to be more profitable.
 
 
Why in the near future complex proposals will form the basis of retail
 

Banking services are broken down into separate segments


 
The implementation of the concept of open banking began with the release of the legislative act PSD2 . According to the concept, licensed third parties can ...[/h]
+ 0 -

Stadium "Central" in Yekaterinburg: how we reconstructed engineering systems

Stadium "Central" in Yekaterinburg: how we reconstructed engineering systems  
Every year, the Department of Intelligent Buildings gets more and more interesting objects. We started quite trite - with SCS in offices more than 20 years ago. Then came the smart buildings, power centers, data centers, stand-alone installations far beyond the cities, industrial facilities - and now several stadiums.
 
 
In total, at the stadium "Yekaterinburg Arena" we have implemented more than 20 engineering subsystems from security with a system for identifying diversionary and terrorist means to high-density vai-fay, a television broadcasting system and multimedia screens.
 
 
Today I'll talk about ...
+ 0 -

Security Week 29. Hacking Reddit, a purse for crypto currency and routers MikroTik

Security Week 29. Hacking Reddit, a purse for crypto currency and routers MikroTik There was no news last week about the infobase, worthy of a detailed description in the digest. This does not mean that nothing happened - this situation, it seems, is completely impossible. Someone who was not hacked. Well, as compensation for previous opus about the theoretical network Specter-like attack today we will talk about two real attacks and one circus with horses with the participation of John McAfee.
 
 
Reddit was hacked simply. That is, no, not so. Reddit as a rather specific community, and, moreover, very popular, for sure is subjected to absolutely all possible types of cyber attacks and ...
+ 0 -

We deal with objects in JavaScript

We deal with objects in JavaScript
 
 
Objects are one of the basic concepts in jаvascript. When I first began to study them, they seemed to me rather simple: just a couple of keys and values, as described in theory.
 
 
Only after a while I began to understand that the topic is much more complicated than I thought. And then I began to study information from different sources. Some of them gave a good idea of ​​the subject, but I could not immediately see the whole picture.
 
 
In this post, I tried to cover all aspects of working with objects in JS, without going too deeply into individual details, but without missing important details ...
+ 0 -

Huawei overtook Apple in terms of sales. The capitalization of the American company still reached $ 1 trillion

Huawei overtook Apple in terms of sales. The capitalization of the American company still reached $ 1 trillion
 
 
Image:
Unsplash

 
 
Apple and Huawei summed up the results of the third quarter of the financial year - the most successful in the history of both companies. In the top three of the mobile market, changes occurred: according to the results as of June 3? 201? Huawei outperformed Apple in the number of smartphones sold and took second place in the market after Samsung. Apple, in turn, announced an increase in revenue and broke the record of capitalization. ...
+ 0 -