Adventure - Electronics. On winged swings in the world of IT

Can you imagine a summer camp in which children learn most of the time and do it with joy? Engaged in mathematics, tighten English, solve complex problems, and then with a fire in their eyes discussing marketing plans, product promotion strategies in the market and ways to attract investors' attention?
 
 
Yes, there is such a place. EPAM and the association "Education for the Future" are opening the second shift of the children's social camp "Junior Ignite Camp".
 
 
Adventure - Electronics. On winged swings in the world of IT
 
 
Summer. Health Camp. Children are walking along the path, and only one boy of about twelve is standing a little behind and carefully examining ...
+ 0 -

C is not a low-level language

C is not a low-level language  
 

Your computer is not a fast version of PDP-11


 
Hello, Habr!
 
 
My name is Anton Dovgal, I'm C (and not only) a developer in Badoo.
 
 
I caught the eye of an article by David Cheznall, a researcher at the University of Cambridge, in which he disputes the generally accepted opinion that C is a low-level language, and his arguments seemed interesting enough to me.
 
 
In the light of the recently discovered vulnerabilities Meltdown and Specter It's worth spending time figuring out the reasons for their appearance. Both of these vulnerabilities exploited the speculative execution ...[/h]
+ 0 -

Analysis: on whose money Ilon Mask can redeem all shares of Tesla

Analysis: on whose money Ilon Mask can redeem all shares of Tesla  
 
Image: Pexels
 
 
August 7 Ilon Mask stated in his tweet about the intention to withdraw Tesla shares from the public market, buying them at a price of $ 420 for each. The billionaire said that he wants to gain independence from fluctuations in prices on the exchange and is already preparing for the deal. The last two weeks the media are discussing whether the deal will take place and who will help finance it: by different ...
+ 0 -

Now officially: TLS 1.3 is recognized by the standard

Previously we had wrote. , that the Internet Engineering Council (IETF) approved a new version of TLS - 1.3. Last week, the protocol was recognized as the standard. Today - let's talk about its capabilities.
 
 
Now officially: TLS 1.3 is recognized by the standard

 
/photo Charles Dyer CC
 
 
[h2] Features of TLS ???r3r3209.
 
The protocol was updated in 2014. Unofficially work on TLS 1.3 ended in March this year, but engineers took several months to conduct additional checks.
 
 
The creators argue that the final version of TLS 1.3 is more secure and productive: all known (to date) TLS 1.2 vulnerabilities are closed in its encryption ...[/h]
+ 0 -

Security Week 30: Five paragraphs about Black Hat

Security Week 30: Five paragraphs about Black Hat Black Hat is a conference on information security, performed in the traditional for the industry genre "questions without answers." Every year in Las Vegas, experts are going to share their latest achievements, which cause insomnia and hand tremors in hardware manufacturers and software developers. And not that it was bad. On the contrary, to sharpen the art of finding problems, while being on the "bright side" - it's wonderful!
 
 
But there is still some internal conflict on Black Hat. It is impossible to repeat indefinitely that "everything is bad, bad, bad with security," without offering anything in return...
+ 0 -

Ten best gaming mice for any purse

Game mice are a special subspecies of computer mice, to which the highest requirements are imposed. In computer battles, where reaction and endurance are important, any unpleasant little thing can cause a loss. Fortunately, today in the market you can find a variety of gaming rodents for any requirements. In this review we will describe the ten most interesting models.
 
 
Ten best gaming mice for any purse  
accessible gaming mouse in our list, with an optical sensor with a resolution of 600-1600 Dpi and a mechanical resolution switch right on the case. Confident work on the rug, weight 112 grams and a durable USB-cable in nylon braiding ...
+ 0 -

The art of picking up other people's passwords

In the cult film of the beginning of the two thousandth Fish Sword, a talented hacker needs to pick up a password within one minute. In this he is helped by a friend who carefully keeps the gun at his temple and a temperamental blonde hiding under the table. What to do if there are no such friends nearby, and the password should be chosen? For example, during penetration testing
 
The art of picking up other people's passwords  
A small but important warning: if the approach proposed in the article is not used in the framework of security testing projects, then your actions can easily fall under Article 272 of the Criminal Code of the Russian Federation ...
+ 0 -

Encryption of the default key in OpenSSH is worse than its absence

The authors of this material argue against the standard key encryption mechanisms in OpenSSH.
 
 
Encryption of the default key in OpenSSH is worse than its absence
 
Recently, attackers used the npm-package eslint-scope to steal npm-tokens from home user directories. In the light of this event, we checked out other similar vulnerabilities and thought about how to reduce the risks and consequences of such incidents.
 
 
Most of us have an RSA SSH key at hand. Such a key gives the owner various privileges: as a rule, it is used to access the production environment or in GitHub. Unlike nmp tokens, SSH keys are encrypted, and therefore it is accepted that nothing terrible ...
+ 0 -

Release of the stable version of Dart 2.0 and Dart Web Platform

Note: Join the Russian-speaking Dart community at Telegram , Slack and Google+ . And at the end of the article you are waiting for a small announcement.
 
 

Revival of Dart as a popular programming language for mobile and web development


 
Today we announce the release of a stable version of the Dart-2.0 programming language, as well as the Dart web platform, which offers a unique combination of productivity, performance and scalability.
 
 
Release of the stable version of Dart 2.0 and Dart Web Platform  
 
...[/h]
+ 0 -

Why in the near future complex proposals will form the basis of retail

To improve the quality of customer service and provide consumers with a wide choice, retailers break large trade offers into narrowly focused services. The author of the article discusses how effective such strategies are, and why well-thought-out integrated solutions can turn out to be more profitable.
 
 
Why in the near future complex proposals will form the basis of retail
 

Banking services are broken down into separate segments


 
The implementation of the concept of open banking began with the release of the legislative act PSD2 . According to the concept, licensed third parties can ...[/h]
+ 0 -