Archive for February 2016
Even your best ideas mean nothing if no one listens to you. We’ve broken down the bad habits you should avoid if you want to be an effective communicator. http://uk.businessinsider.com/7-bad-speaking-habits-to-break-today-2015-7?utm_content=buffer804d3&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer%3Fr%3DUS&IR=T Posted from WordPress for Android →
The next time someone scoffs at your love of the sciences, ask them what a desperate housewife, a legendary rock guitarist, a Wu-Tang Clan rapper, and the Beavis and Butthead creator all have in common. The Perimeter Institute has put together a list of the biggest celebrities and their nerdy passions, as well as their contributions to →
Simone Giertz – YouTube channel at https://m.youtube.com/channel/UC3KEoMzNz8eYnwBC34RaKCQ has some funny “commecials” involving interesting DIY robots… →
http://inktankmedia.fi/demystifying-the-darknet/ Posted from WordPress for Android →
https://toggl.com/developer-methods-infographic Posted from WordPress for Android →
Various law enforcement agencies have decried how strong encryption makes the Web “go dark,” i.e. it stymies their ability to peruse the Matrix unfettered in search of bad guys and their nefarious intentions. At the same time that authorities are seeking to enhance their digital surveillance powers, privacy advocates are pushing for more default encryption →
Future quantum computers might not be all that different from the one you’re using now. An international team of researchers have created a the most fundamental part of a quantum computer—the quantum bit, or qubit—using only a CMOS transistor that is not much different from those in today’s microprocessors. http://spectrum.ieee.org/nanoclast/computing/hardware/qubits-quantum-computing-with-run-off-the-mill-cmos-transistors Posted from WordPress for Android →
After a two-year campaign from the FBI, U.S. intelligence officials, and powerful politicians calling for backdoor access into Americans’ encrypted data, a new Harvard study argues that encryption is a worldwide technology that the United States cannot regulate and control on its own. The point of the research is clear: There’s a whole world of →
A stack-based critical buffer overflow was found in the way the libresolv library (glibc) performed dual A/AAAA DNS queries. A remote attacker could crash or, potentially, execute code running the library on Linux. How do I patch and protect my server or workstation against the glibc getaddrinfo on Linux operating system? http://www.cyberciti.biz/faq/linux-patch-cve-2015-7547-glibc-getaddrinfo-stack-based-buffer-overflow/ Posted from WordPress →
A new documentary on “Stuxnet”, the joint U.S.-Israeli attack on Iran’s nuclear program, reveals it was just a small part of a much bigger cyber operation against the nation’s military and civilian infrastructure under the code name “NITRO ZEUS”. http://www.buzzfeed.com/jamesball/us-hacked-into-irans-critical-civilian-infrastructure-for-ma#.lgV7VGmGm Posted from WordPress for Android →