background preloader

Hacker Noon

Related:  Background, Underground and GrayZone

Node.js and MongoDB - Getting started with MongoJS HEADS UP! This article was written for an older version of node. More up-to-date information may be available elsewhere. It won't be an exaggeration if one claims that in the past few months Node.js and MongoDB have literally taken the software and web industries by storm. Not just bleeding-edge startups but even medium and large enterprises are leveraging these two technologies to deliver a better experience to their users by build more capable, performant and scalable apps. So what is Node.js? Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. ..and what is MongoDB? MongoDB is a scalable, high-performance, open source NoSQL database. This post will cover the basics and get you started with your Node.js + MongoDB app. Let's verify your Node.js installation and start the MongoDB server: $ node -v$ mongod Introducing MongoJS Installing MongoJS $ npm install mongojs Okay, how do I save a new user in my collection? $ node app.js

blog Travel Time API — Amazon vs. Microsoft public transit times The awesome part about working at a startup is that I get to play with all the neat technology that the rest of the team puts together. One such example is the Travel Time API, which is used to calculate actual travel times (via multiple modes of transportation) from one origin to many destinations. The resulting map of how far one can get via public transit and walking from the centers of Amazon (left) and Microsoft (right) tech headquarters within 25 minutes. The difference between Computer Scientist and Computer Engineer [according to SMBC] It's Saturday Morning Breakfast Cereal! UBB (metered internet) will restrict innovation UBB (Usage Based Billing / “Metered Internet”) is a hot topic right now, with many Canadians angry over the failures of CRTC and the subsequent forced price hike of the internet, even when using small competing ISPs. (Important) Computer Science jobs are not outsourced

Official Website Public Key for PGP Signing Starting from v3.3.4 all source tarballs and binaries are signed. The key currently used is: 4096R/5B7CC9A2 Fingerprint: D8F3DA77AAC6741053599C136E4A2D025B7CC9A2 You can also download it from here Previously the following key was used to sign the v3.3.4 source tarballs and v3.3.4 Windows installer only: 4096R/520EC6F6 Fingerprint: F4A5FD201B117B1C2AB590E2A1ACCAE4520EC6F6 Windows 7 / 8 / 10 / 11 Download qBittorrent v4.5.0 (multiple installer choice) The builds based on Qt6 need Windows 10+ (64-bit only). macOS Catalina / Big Sur / Monterey Download qBittorrent v4.5.0 (multiple DMG choice) The macOS version is not well supported, because we don't have active macOS developers/contributors. Linux Download qBittorrent v4.5.0 (multiple AppImage choice) The AppImage is created on Ubuntu 20.04. Source Tarball Current version: qBittorrent v4.5.0 Download link: TAR.GZ / PGP signature (SourceForge) Download link: TAR.XZ / PGP signature (SourceForge) Compile instructions over here.

SOLID Development Principles – In Motivational Pictures | ThoughtStream.new :derick_bailey I found the Motivator this morning. It lets you create your own motivational pictures. So, here’s my first run at creating the SOLID software development principles in motivational picture form. I ‘borrowed’ the images from google image search results. (Update: I never expected the response to this post to be so great! Update: Due to the continuous request for prints, posters, calendars, etc, we (LosTechies) are looking into what it would take to get these turned into high quality prints of various types. Update: Steve Smith and the NimblePros crew have created their own version of the posters, along with other principles, in a Calendar for 2011. Software development is not a Jenga game. (This one was created by Mark Nijhof’s. Single Responsibility Principle Just because you can, doesn’t mean you should. (Update: I knew I had seen this Swiss Army knife in a Single Responsibility post before. Open Closed Principle Open chest surgery is not needed when putting on a coat.

SysSec: About NeHe Three.js tutorials Introduction To render amazing 3D scenes, nowadays no more plugins or additional installations are required. The most widespread Browsers like Chrome, Firefox, Safari, Opera and Internet Explorer support WebGL, the hardware accelerated OpenGL for browser. Learning pure WebGL from scratch is hard. So, why don't use a library which wraps WebGL and is easy to use? Note: The following examples use release 69 of Three.js. PGP word list The PGP Word List ("Pretty Good Privacy word list", also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by pilots, except a longer list of words is used, each word corresponding to one of the 256 unique numeric byte values. History and structure[edit] The PGP Word List was designed in 1995 by Patrick Juola, a computational linguist, and Philip Zimmermann, creator of PGP.[1][2] The words were carefully chosen for their phonetic distinctiveness, using genetic algorithms to select lists of words that had optimum separations in phoneme space. The Zimmermann/Juola list was originally designed to be used in PGPfone, a secure VoIP application, to allow the two parties to verbally compare a short authentication string to detect a man-in-the-middle attack (MiTM). Examples[edit] Each byte in a bytestring is encoded as a single word.

The Making of "The Aviator": Animating a Basic 3D Scene with Three.js | Codrops A tutorial that explores the basics of creating animated 3D scenes using Three.js. View demo Download source Today, we are going to create a simple 3D flying plane using Three.js, a 3D library that makes WebGL simpler. In this tutorial we’ll create a simple 3D scene with a few interactions in two major parts. Beyond the scope of this tutorial is the entire game, but you can download it and check out the code; it contains many interesting additional parts like the collisions, grabbing coins and increasing a score. In this tutorial we will focus on some basic concepts that will get you started in the world of WebGL with Three.js! Let’s get started right away! The HTML & CSS This tutorial uses mainly the Three.js library, which makes WebGL easy to use. The first thing to do is to import the library in your HTML header: Then you need to add a container element in the HTML to hold the rendered scene: You can simply style it like the following to make it fill the entire viewport: The JavaScript

Index of /archives/tgz Index of /archives/tgz Name Last modified Size Description Tim Holman dorkbot – Scan Google search results for vulnerability. – Security List Network™ LEGAL DISCLAMERThe author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build to show how resource files can automate tasks. dorkbot is a modular command-line tool for performing vulnerability scans against a set of webpages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two sets of modules: + Indexers – modules that issue a search query and return the results as targets + Scanners – modules that perform a vulnerability scan against each target Targets are stored in a local database upon being indexed. Once scanned, any vulnerabilities found by the chosen scanner are written to a standard JSON report file. Indexing and scanning processes can be run separately or combined in a single command. Usage: 1. Source:

PHP security exploit - list content of remote PHP file? Webmin 1.850 - Multiple Vulnerabilities [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] ISR: ApparitionSec Vulnerability summary The following advisory describes three (3) vulnerabilities found in Webmin version 1.850 Webmin “is a web-based interface for system administration for Unix. file sharing and much more. the console or remotely. The vulnerabilities found are: XSS vulnerability that leads to Remote Code Execution CSRF Schedule arbitrary commands Server Side Request Forgery Credit An independent security researcher, hyp3rlinx, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Vendor response The vendor has released patches to address these vulnerabilities. Vulnerability details Under Webmin menu ‘Others/File Manager‘ there is option to download a file from a remote server ‘Download from remote URL‘. By setting up a malicious server we can wait for file download request then send a XSS payload that will lead to Remote Code Execution. domain=webmin-victim-ip. #e.g.

TCP/IP Fingerprinting Methods Supported by Nmap Nmap OS fingerprinting works by sending up to 16 TCP, UDP, and ICMP probes to known open and closed ports of the target machine. These probes are specially designed to exploit various ambiguities in the standard protocol RFCs. Then Nmap listens for responses. Dozens of attributes in those responses are analyzed and combined to generate a fingerprint. The following sections are highly technical and reveal the hidden workings of Nmap OS detection. Even the best of us occasionally forget byte offsets for packet header fields and flags. This section describes each IP probe sent by Nmap as part of TCP/IP fingerprinting. Sequence generation (SEQ, OPS, WIN, and T1) A series of six TCP probes is sent to generate these four test response lines. Each probe is a TCP SYN packet to a detected open port on the remote machine. These packets vary in the TCP options they use and the TCP window field value. The results of these tests include four result category lines. TCP ISN counter rate (ISR)

Related: