Sign Up Now!

Sign up and get personalized intelligence briefing delivered daily.


Sign Up

Programmers need to think like hackers

  • Programmers are required to create not only functional applications but also secure ones.
  • Most consumers are aware of the need for secure applications.
  • Developers need to think like malicious hackers.
  • To be more productive, developers need to start behaving and thinking like hackers.
  • But their goal must be security (ethical hacking).
  • Programmers need to adopt these characteristics of perseverance, determination and knowledge that they have acquired on their own to create secure programs.
  • Developers need to follow suit and be willing to experiment and make efforts.
  • Programmers should always learn and discover new ways to combat malicious situations.
  • A programmer who has to get a job done within a certain time frame is under pressure and may not be very innovative.
  • However, they have some positive features that programmers could adopt to be more efficient and useful in creating secure applications.

save | comments | report | share on


Spamtoberfest

  • This sort of contribution is often fixing an important problem and places a smaller burden on maintainers to spend their time working with the contributor.
  • Those contributions are, generally, less valuable and place a greater burden on the maintainer.
  • Disclaimer: I am the founder of a FOSS project hosting company similar to GitHub. Spammy pull requests can be given a label that contains the word “invalid” or “spam” to discount them.
  • If you’re a maintainer, please label any spammy pull requests submitted to the repositories you maintain as “invalid” or “spam”, and close them.
  • Pull requests with this label won’t count toward Hacktoberfest.
  • Programs where a marketing department spends $5,000 on T-Shirts to flood maintainers with garbage and clothe people in ads are doing the opposite: hurting open source.

save | comments | report | share on


Bare Metal Programming on Raspberry Pi 3

  • This tutorial series are made for those who would like to compile their own bare metal application for the Raspberry Pi. The target audience is hobby OS developers, who are new to this hardware.
  • Before you can start, you'll need a cross-compiler (see 00_crosscompiler directory for details) and a Micro SD card with firmware files on a FAT filesystem.
  • The RAM (1G for the Raspberry Pi 3) is shared among the CPU and the GPU, meaning one can read what the other has written into memory.
  • What's common for these devices that their memory must be read and written in 32 bit units at 4 bytes aligned addresses (so called words), and each has control/status and data words.
  • There's also a Memory Management Unit in the CPU which allows creating virtual address spaces.

save | comments | report | share on


Founders and Executives of Cryptocurrency Derivatives Exchange BitMEX Charged

  • Sweeney Jr., Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the indictment of Arthur Hayes, Benjamin Delo, Samuel Reed, and Gregory Dwyer, charging the four with violating the Bank Secrecy Act and conspiring to violate the Bank Secrecy Act, by willfully failing to establish, implement, and maintain an adequate anti-money laundering (“AML”) program at the Bitcoin Mercantile Exchange or “BitMEX.”  The case is assigned to United States District Judge John G.
  • Despite those obligations, HAYES, DELO, REED, and DWYER knew by no later than in or about September 2015 that, because BitMEX served U.S. customers, it was required to implement an AML program that included a “know your customer” or “KYC” component, but chose to flout those requirements.

save | comments | report | share on


Data Center Investors Meet Japan’s Corporate Protectionism

  • Recently, one US data center investor overcame the lack of space in Japan's major cities with help from companies snarled in a corruption scandal and in a public dispute over the country's clannish business culture.
  • It wants Keihanshin to become a Real Estate Investment Trust (REIT), like the big US data center operators, thus making its investors shareholders not in its company but in its assets, and unlocking, it says, the true value of the business.
  • Keihanshin’s told shareholders it planned to put more buildings up for lease to operators in “partnerships.” Data centers earn eight times more per square foot than the logistics and commercial properties it built with its betting income.
  • Existing Japanese data center owners are not necessarily in a strong position, even though investors have "very limited opportunities in Japan," said Kosuke Ogi, executive director at the real estate services firm Cushman & Wakefield.

save | comments | report | share on


FastChat: Bringing Diversity and Inclusion to the Data Center Space

  • Offering a diverse and inclusive work environment is linked to many benefits including higher employee retention and productivity.
  • But how can data centers attract a diverse talent pool in an industry not known for its D&I; practices?
  • Join CBRE People Director Kris Perry to learn what specific actions CBRE takes to attract more diverse talent.

save | comments | report | share on


Celebrities hand over Instagram accounts to Black women for UK Black History Month

  • Share the Mic UK aims to magnify Black women's work, lives and achievements by bringing together more than 70 women with a combined Instagram following of more than 175 million, according to a post on the campaign's verified Instagram account.
  • Booker Prize winning author Bernardine Evaristo will take over CNN's chief international anchor Christiane Amanpour's account, while broadcaster June Sarpong will be posting to singer and fashion designer Victoria Beckham's 28.7 million followers.
  • Academic and author Emma Dabiri is pairing up with actor and entrepreneur Gwyneth Paltrow, while Kenya Hunt, fashion director at Grazia UK magazine, will take over model and fashion designer Alexa Chung's account.
  • It is organized by Vanessa Kingori, publishing director at British Vogue magazine, and Stephanie Phair, an executive at fashion brand Farfetch and chair of the British Fashion Council.

save | comments | report | share on


The historic hurricane season isn't over yet: The 24th named storm is likely in the next few days

  • A system moving north toward the Yucatán Peninsula and west of Cuba is likely to become the 24th named storm of the season.
  • Technically the season does not end until November 30, but some years storms have continued well after that.
  • The sea surface temperatures are above normal right now in the southern Gulf of Mexico and western Caribbean Sea. During an average season, we see about two named storms in October and one in November.
  • Which means that if this were a "normal" hurricane season, we would still likely have a few more storms possible through the end of November.
  • Back in August, the National Oceanic and Atmospheric Administration (NOAA) updated the hurricane season forecast and called for 19 to 25 named storms.

save | comments | report | share on


Amazon removes 'stand back and stand by' merchandise

  • New York (CNN Business) - Amazon has pulled merchandise featuring the words "stand back" and "stand by," a phrase now associated with the Proud Boys, a far-right collective that the Southern Poverty Law Center says is a hate group.
  • A CNN journalist noticed merchandise with the Proud Boys logo and those words "stand back" and "stand by" being sold on Amazon.
  • The words were said by President Donald Trump at Tuesday's debate when he refused to condemn White supremacists for inciting violence at anti-police brutality demonstrations across the country.
  • The group's site argues its allure stems from the fact that young American men and women are "finished" with "apology culture" but disavows links to the alt-right or to White supremacists.
  • McInnes is suing the Southern Poverty Law Center for designating the organization a hate group.

save | comments | report | share on


Here's what to do if you're intimidated or turned away at the polls

  • The federal government requires that a person whose registration is challenged be able to cast a ballot that can be counted once the voter's eligibility is established.
  • At least 23 states have placed restrictions on voting by closing polling places, cutting early voting, purging allegedly ineligible voters from electoral rolls and imposing stricter voter ID laws, according to a 2018 report by the federal Commission on Civil Rights.
  • If you did forget your ID at home or have been removed from the registration system and none of the other options are available, you can cast a provisional ballot -- a right all voters are entitled to by federal law.
  • However, you're going to need to be your biggest advocate when it comes to provisional ballots: These ballots are typically kept separately from all other ballots, so make sure to follow up with your local elected officials to confirm they have looked into your qualifications and have counted the vote.

save | comments | report | share on