background preloader


Facebook Twitter

Unix philosophy. The Unix philosophy, originated by Ken Thompson, is a set of cultural norms and philosophical approaches to minimalist, modular software development.

Unix philosophy

It is based on the experience of leading developers of the Unix operating system. Early Unix developers were important in bringing the concepts of modularity and reusability into software engineering practice, spawning a "software tools" movement. Over time, the leading developers of Unix (and programs that ran on it) established a set of cultural norms for developing software, norms which became as important and influential as the technology of Unix itself; this has been termed the "Unix philosophy. " The Unix philosophy emphasizes building simple, short, clear, modular, and extensible code that can be easily maintained and repurposed by developers other than its creators.

The Unix philosophy favors composability as opposed to monolithic design. Jornalista desafia hackers a destruir sua vida e se arrepende [vídeo] Um jornalista do canal de televisão Fusion resolveu fazer um experimento para concluir o quão fácil e prejudicial pode ser um ciberataque.

Jornalista desafia hackers a destruir sua vida e se arrepende [vídeo]

Durante o oitavo episódio da série-documentário Real Future, Kevin Roose visitou a DefCon em Las Vegas, a maior conferência hacker do mundo, para conseguir algumas respostas. Para se ter uma ideia da magnitude e da importância do evento, os organizadores recomendam que todos os visitantes desativem o WiFi e não utilizem nenhum caixa eletrônico espalhado pelo lugar, para não serem hackeados. Saia do WiFi e fique longe dos caixas eletrônicos Kevin Roose desafiou os melhores profissionais do ramo de segurança do mundo a invadir sua vida virtual com diferentes técnicas e mostrar o que eles poderiam fazer com as informações roubadas.

Abaixo você confere todas as etapas do processo: Uma ligação inocente Com a ajuda de um membro da equipe, o repórter testemunha ao vivo o uso da técnica de “phishing call”. Email suspeito “Eu poderia acabar com a sua vida. Equation Group: Meet the NSA 'gods of cyber espionage'. Over the last couple of years we have been hearing about ever more sophisticated pieces of malware.

Equation Group: Meet the NSA 'gods of cyber espionage'

From Stuxnet and Flame to Gauss and most recently Regin, all have shown increasing levels of technical prowess and all have been linked in some way with the US government. These were thought to be the pinnacle of a huge investment in offensive cyber capabilities by the world's wealthiest country. That was, until we learned about Equation. Described by Kaspersky Lab, the Moscow-based security company which uncovered it, as "an almost omnipotent cyberespionage organisation", the group has been called the "God of cyberespionage" and may have been operating undetected for almost two decades. The Web Is Dead. Long Live the Internet. Two decades after its birth, the World Wide Web is in decline, as simpler, sleeker services — think apps — are less about the searching and more about the getting.

The Web Is Dead. Long Live the Internet

Chris Anderson explains how this new paradigm reflects the inevitable course of capitalism. And Michael Wolff explains why the new breed of media titan is forsaking the Web for more promising (and profitable) pastures. Who’s to Blame: Us As much as we love the open, unfettered Web, we’re abandoning it for simpler, sleeker services that just work. by Chris Anderson You wake up and check your email on your bedside iPad — that’s one app. How the NSA's Firmware Hacking Works and Why It's So Unsettling. One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code.

How the NSA's Firmware Hacking Works and Why It's So Unsettling

The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmware—the guts of any computer—“surpasses anything else” they had ever seen. The hacking tool, believed to be a product of the NSA, is significant because subverting the firmware gives the attackers God-like control of the system in a way that is stealthy and persistent even through software updates.

Technology inbox

3d printing. Operating Systems. Computer Hardware. The Internet. Deep Web. Networks. Smartphones.

Programming. Manutenção de Computadores.

Information security

Free software. Robotics. Tech news & magazines. Attention economy. Electrosphere. The GodfatherBy G.


Pascal Zachary The Manhattan Project, Silicon Valley, The World Wide Web. Wherever you look in the information age, Vannevar Bush was there first. Vannevar Bush is a great name for playing six degrees of separation. Turn back the clock on any aspect of information technology - from the birth of Silicon Valley and the marriage of science and the military to the advent of the World Wide Web - and you find his footprints. Bush's best years - he was born in 1890 - came before professors were millionaires and venture capitalists were presidents' pals. Bush started small. The device, which foreshadowed both the PC and the Web, was just one of Bush's many seminal contributions. But if Bush's historic influence is forgotten or misunderstood, his technical inspiration is not.

"As We May Think" describes a device - Bush called it a "memex" - that was meant to tame the then-novel problem of information overload by enhancing human memory (hence its name). G. Everything You Didn't Know You Could Do with Google's Voice Commands.