Gustavo Gomes

38 Flips | 3 Magazines | 20 Likes | 8 Following | 16 Followers | @GustavoGome3sk9 | Keep up with Gustavo Gomes on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Gustavo Gomes”

A spiritual successor to Aaron Swartz is angering publishers all over again

Meet accused hacker and copyright infringer Alexandra Elbakyan.<p>Stop us if you’ve heard this before: a young academic with coding savvy has become …

The Is This Prime? game

Ghost in the Shell, over two decades old, remains our most challenging film about technology

The first questions about the loss of human identity in a tech-filled world were raised in Mamoru Oshii’s 1995 hit film.<p>Japanese animated films and …

Anime Series

Computer System Passes Visual Turing Test

<b>Character-drawing machines can fool human judges.</b><p>Researchers at MIT, New York University, and the University of Toronto have developed a computer …

Django awarded MOSS Grant

We're pleased to announce that Django has been chosen as one of the first projects to receive funding from the Mozilla Open Source Support …

Here are the high-tech ways you should be hunting for your dream job

Job hunting is one of life's most stressful activities — and simply sending out your resume to employers can feel like you are throwing paper into a black hole.<p>But luckily there are now more ways than ever to snag a job in non-traditional ways. There are apps and online services that will help you …

U.S. Spy Scandal Triggers Outrage, Paranoia in Germany

World<p>A slew of allegations that Washington has been spying on longtime ally Germany has plunged Berlin's corridors of power into a state of paranoia reminiscent of the Cold War era.<p>Some analysts even suggest the crisis could even end with the "nightmare scenario" of Germany being pushed away from …

Still fuming over HTTPS mishap, Google makes Symantec an offer it can’t refuse

Google: Fix ailing certificate business or risk having Chrome flag your credentials.<p>Google has given Symantec an offer it can't refuse: give a …

SHA1 algorithm securing e-commerce and software could break by year’s end

Researchers warn widely used algorithm should be retired sooner.<p>SHA1, one of the Internet's most crucial cryptographic algorithms, is so weak to a …

Researchers steal secret RSA encryption keys in Amazon’s cloud

As thousands of cloud fanatics descend on Las Vegas this week for Amazon Web Service’s re:Invent conference, researchers in Massachusetts are raising …

5 things you should know about VPNs

What is a VPN?<p>A virtual private network (VPN) is a group of computers connected remotely to share files and resources, most often through encrypted …

Encryption

Peter Shor Explains His Namesake Encryption-Crumbling Quantum Algorithm

The latest from 100 Second Science.<p>When people talk about the "cryptopocalypse," in which classical encryption methods are summarily rendered obsolete by quantum computing technology, they're usually talking about Shor's algorithm, whether or not they realize it. Quantum computing isn't magic, …

How to win a hackathon using Azure Machine Learning

You can do some amazing work with machine learning. Predict how many crimes will occur in a city in a timeframe, based on historical data. Identify …

Get With the Best: Top 10 Best Programmers Around Today

Barbara Liskov<p>The first woman in America to gain a PhD in computer science, Liskov developed CLU, which had a significant influence on C++, Java and …

Irony: NSA worried hackers with super computers might break current encryption standards

The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name …

Supercomputers

Three Useful Python Libraries for Startups • Instavest Blog

With a couple of lines of config, WhiteNoise allows your web app to serve its own static files, making it a self-contained unit that can be deployed …

Hire Today’s Top Ruby Developers

The Challenge<p>In his book <i>Seven Languages in Seven Weeks</i>, Bruce Tate compares Ruby to Mary Poppins: “She’s sometimes quirky, always beautiful, a little …

89% off the Pure Python Hacker Bundle

Python is the programming language of choice at Google and Dropbox, but it is also very beginner-friendly. This bundle of six courses teaches it from scratch, all the way up to advanced techniques.<p>In fact, there are two beginners courses included, which require absolutely no coding experience …

Shark Tank's Robert Herjavec: On How To Tell If You Are Cyber Secure

Last Monday – the 15th – password storage maker LastPass was hacked, exposing the email addresses and encrypted master passwords of its users. Last Tuesday – the 16th – in Congressional testimony, House Oversight Chairman, Jason Chaffetz, said that federal cybersecurity “stinks” in response to the …

Futures for C++11 at Facebook

Futures are a pattern for expressing asynchronous computations in a natural and composable way. This blog post introduces Folly Futures, an …

Let’s Build A Simple Interpreter. Part 1.

<i>“If you don’t know how compilers work, then you don’t know how computers work. If you’re not 100% sure whether you know how compilers work, then you</i> …

Being Sneaky in C

I entered the 2014 Underhanded C Contest last year. Didn’t win, but hey-ho what can you do. Still, I thought I’d post my entry and a write-up of it, …

Anatomy of Exploit - World of Shellcode Part 1

The content has been created by floriano, he reserved all the rights.<br>Introduction On Exploits<br>Nowadays the word exploit is becoming frightened, …

The 3 Best Hacking Techniques To Create A Security Breach

I find that good, law-abiding citizens are fascinated by what I do. I’m a penetration tester, a.k.a. “white hat” or “ethical” hacker. In other words, companies hire me to break into their systems for a living to demonstrate where there are vulnerabilities. (I can’t believe I get paid for doing …

Cybersecurity

In praise of the mechanical keyboard

As I'm writing this, I'm worried I'm waking up the neighbors. I'm typing these sentences on a mechanical keyboard, one of the odder and more …

Atom Shell is now Electron | Electron Blog

Atom Shell is now Electron<p>Atom Shell is now called Electron. You can learn more about Electron and what people are building with it at its new home …

Becoming Productive in Haskell

April 20, 2015<p>By Matthew Griffith<p>Sometime recently I became proficient enough in Haskell to be productive, and I wanted to capture some of my …

dg — it's a Python! No, it's a Haskell!

Annoy advocates of the category theory!<p>With Haskell's syntax but none of its type system, dg is the best way to make fans of static typing shut up …

Cyberattacks used security software to cover their trail

State-sponsored hacking attempts frequently rely on specially written software, but that's a risky move. Unless it's well-made, custom code can be a giveaway as to who's responsible. Attackers are switching things up, however. Security researchers at CrowdStrike and Cymmetria have discovered that a …