How the Bible and YouTube are fueling the next frontier of password cracking Early last year, password security researcher Kevin Young was hitting a brick wall. Over the previous few weeks, he made steady progress decoding cryptographically protected password data leaked from the then-recent hack of intelligence firm Stratfor. But with about 60 percent of the more than 860,000 password hashes cracked, his attempts to decipher the remaining 40 percent were failing. The so-called dictionary attacks he mounted using lists of more than 20 million passwords culled from previous website hacks had worked well. Augmented with programming rules that substituted letters for numbers or combined two or more words in his lists, his attacks revealed Stratfor passwords such as "pinkyandthebrain," "pithecanthropus," and "moonlightshadow."
Nearly 70% of Packed Windows System files are labeled as Malware A few weeks back, I was playing around with some off the shelf packers. I randomly selected a Windows system executable (dpnsvr.exe), packed it with Upack and then sent both the files to Virustotal (VT). Obviously, no Anti Virus (AV) software showed labels for the unpacked system file (detection ratio was 0/46). Run An Empire – The Real-World Territory Control Game » Gamified - Gamification News Run An Empire is a game where players compete to capture and maintain control of as much of their local territory as possible. To capture somewhere you have to run (or jog, or walk) around it. The game uses your neighbourhood as an arena for play.
Drag-and-Drop with jQuery: Your Essential Guide Home : Articles : Drag-and-Drop with jQuery: Your Essential Guide Tutorial by Matt Doyle | Level: Intermediate | Published on 17 February 2011 Categories: Learn how to use jQuery, and the jQuery UI Draggable and Droppable plugins, to create drag-and-drop interfaces in your web pages. Includes a full drag-and-drop card game example. Dragging and dropping can be a very intuitive way for users to interact with your site or web app. 7 Apps for Teaching Children Coding Skills It's hard to imagine a single career that doesn't have a need for someone who can code. Everything that "just works" has some type of code that makes it run. Coding (a.k.a. programming) is all around us. That's why all the cool kids are coding . . . or should be.
svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted August 1, 2013 Anuj Varma svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted All content on this site is original and owned by anujvarma.com. Private traits and attributes are predictable from digital records of human behavior Author Affiliations Edited by Kenneth Wachter, University of California, Berkeley, CA, and approved February 12, 2013 (received for review October 29, 2012) Abstract We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender. The analysis presented is based on a dataset of over 58,000 volunteers who provided their Facebook Likes, detailed demographic profiles, and the results of several psychometric tests. The proposed model uses dimensionality reduction for preprocessing the Likes data, which are then entered into logistic/linear regression to predict individual psychodemographic profiles from Likes.
Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping For a more detailed analysis of this catastrophic bug, see this update, which went live about 18 hours after Ars published this initial post. Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data. The warning about the bug in OpenSSL coincided with the release of version 1.0.1g of the open-source program, which is the default cryptographic library used in the Apache and nginx Web server applications, as well as a wide variety of operating systems and e-mail and instant-messaging clients. The bug, which has resided in production versions of OpenSSL for more than two years, could make it possible for people to recover the private encryption key at the heart of the digital certificates used to authenticate Internet servers and to encrypt data traveling between them and end users.
ROP « blog.zynamics.com I spent the last two days with a friend of mine, Frank Boldewin of reconstructer.org, analyzing the Adobe Reader/Flash 0-day that’s being exploited in the wild this week. We had received a sample of a malicious PDF file which exploits the still unpatched vulnerability (MD5: 721601bdbec57cb103a9717eeef0bfca) and it turned out more interesting than we had expected. Here is what we found: Critique de l'achievement : à remplacer par des variants ? This is the worst offender of the whole achievements system. As I previously stated, a game already has its own motivators -- in fact, the purpose of a game designer is balancing motivators around a goal to create the intended gameplay experience. But some achievements actually influence players to act in ways that they would not normally act. I remember this kind of thing happening a lot in Team Fortress 2. Often there would be a medic doing something really stupid instead of healing teammates. Angrily, I'd ask, "What the hell are you doing, dude?
Mapping with D3 - Maptime Boston A friendly introduction Andy Woodruff for Maptime Boston @maptimeBoston | @awoodruff Follow along! maptimeboston.github.io/d3-maptime Or get the code for examples: