mestizo

22 Added | 1 Magazine | 5 Following | 2 Followers | @mestizo | Keep up with mestizo on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “mestizo”

Vault by HashiCorp

A Tool for Managing Secrets<p><b>Vault</b> secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in …

Facebook CTF is Now Open Source!

Although news reports about security bugs are now commonplace, it's not always obvious how people find these flaws and how you can develop the skills …

A 360 Degree View of the Entire Netflix Stack

<i>This is a guest repost by Chris Ueland, creator of Scale Scale, with a creative high level view of the Netflix stack.</i><br>As we research and dig deeper …

Scalability

Your Startup's Pitch Needs Only These 10 Slides | Inc.com

Pitching your startup to investors just might be the most nerve-wracking aspect of starting your new business -- well, besides the prospect of losing your shirt.<p>I get it. The last thing you want to do when you're sleep-deprived and edgy and suffering startup angst is pitch it over... and over... …

Startups

New research: Comparing how security experts and non-experts stay safe online

Posted by<br>Iulia Ion, Software Engineer<br>Rob Reeder, Research Scientist<br>Sunny Consolvo, User Experience Researcher<br>Today, you can find more online security …

Cybersecurity

Attackers trick 162,000 WordPress sites into launching DDoS attack | Ars Technica

Technique allows lone attacker hidden in the shadows to wage crippling attacks.<p>Security researchers have uncovered a recent distributed …

I Hate Open Floorplans, It Makes Roger Come Out...

Last year I visited Adobe’s office in the Bay Area. It was a wicked awesome office with a ton of really cool things, basketball court on the roof, …

Cool, but obscure unix tools :: Software architect Kristof Kovacs

Linux

The second operating system hiding in every mobile phone

I've always known this, and I'm sure most of you do too, but we never really talk about it. Every smartphone or other device with mobile …

Security of Infrastructure Secrets

Credit Cards and Personally identifiable information (PII) have compliance standards for their storage and transportation. PCI-DSS being one of the …

StockLogos Redirect

<b>Dear StockLogos visitor, you have been redirected from StockLogos.com to AdsoftheWorld.com, because StockLogos.com has been discontinued. If you have</b> …

Ask HN: How does one create a fake identity?

I imagine it depends on how this identity is to be used, and what sorts of scrutiny it must hold up to, so detailed information on the topic would be …

Americans Won't Like Hearing The Real Reason That Silicon Valley Is Pushing So Hard For Immigration Reform

It's one of the most fundamental questions of the immigration reform debate.<p>The tech industry has made their feelings widely known. Interest groups for the technology industry — as well as some companies individually— say we need way more STEM majors in America to meet their needs.<p>They argue that …

Silicon Valley

Getting started with login verification

Every day, a growing number of people log in to Twitter. Usually these login attempts come from the genuine account owners, but we occasionally hear …

Everyone farts. And now your web pages can too.

fartscroll.js<p>Everyone farts. And now your web pages can too.<p>Include "fartscroll.js" in your page. You can include the latest version straight from …

Post Mortem: Today's Attack; Apparent Google Apps/Gmail Vulnerability; and How to Protect Yourself

This morning a hacker was able to access a customer's account on CloudFlare and change that customer's DNS records. The attack was the result a …

McDonald’s Theory

I use a trick with co-workers when we’re trying to decide where to eat for lunch and no one has any ideas. I recommend McDonald’s.<p>An interesting …

Amazon Web Services Launches CloudHSM, A Dedicated Hardware Security Appliance For Managing Cryptographic Keys

Amazon just announced the launch of CloudHSM, a new service that provides Amazon Web Services users who need to meet corporate, contractual and regulatory compliance requirements for data security a way to do so by using a dedicated Hardware Security Module (the ‘HSM’ in CloudHSM) within the Amazon …