zinohd

91 Flips | 3 Magazines | 108 Likes | 23 Following | 3 Followers | @zinohd | Keep up with zinohd on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “zinohd”

How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router

Identifying vulnerable devices and services on a target network can be difficult without leaving traces behind since hackers primarily attack the …

Information Security

Adobe updates Photoshop with magical AI-powered selection tool

Back in November, Adobe teased a new Photoshop feature I’d been waiting for all my life: an AI-powered selection tool. In Adobe’s demos, at least, it can do an impressive job of identifying a subject with just one click. Now it’s finally available to try<p>Simply called ‘Select Subject’, it uses …

Understanding Range Masks in Lightroom

<b>What Are Range Masks?</b><p>Lightroom Classic CC has a nice new addition called Range Masks which can affect certain colors or luminance ranges. Many people …

What Really Happened with Vista: An Insider’s Retrospective

“Experience is something you don’t get until just after you need it.” — Steven Wright.<p>[Author’s Note: Originally published here, this blog has …

Operating Systems

Writing a minimal x86-64 JIT compiler in C++ - Part 2

Posted on January 12, 2018 by Sol<p>Part 1 - Generate and use a simple function at runtime<br>• Part 2 - Call a C++ function from a function generated at …

generated

Sharing my offer numbers from big companies for your reference

I see many questions on compensation here and would like to help answer some of them with the limited data I have. I'd like to shed some light on …

Bite Size Tips: 5 Tips For A Compelling Pet Photo

If you or your friend or someone in your family has a pet at home, chances are that there are hundreds of images on mobile phones or cameras of your …

How criminals clear your stolen iPhone for resale

Criminals have dedicated themselves to compromising iCloud accounts to wipe clean stolen devices using a set of interesting tools.<p>Mobile devices, …

Why Leveling the Horizon in Photos Isn’t Easy

It might seem like one of the simplest parts of photography: leveling your horizon. Most photographers want their horizons to be straight, of course, …

Against an Increasingly User-Hostile Web

02 novembre 2017 — Parimal Satyal<p>We're quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We …

Fixing the Ethernet board from a vintage Xerox Alto

A Xerox Alto system on the East coast had Ethernet problems, so the owner sent me the Ethernet board to diagnose. (After restoring our Alto, we've …

Deep C

Programming is hard. Programming correct C and C++ is particularly hard. Indeed, both in C and certainly in C++, it is uncommon to see a screenful containing only well defined and conforming code.Why do professional programmers write code like this? Because most programmers do not have a deep …

Programming Languages

Breaking WPA2

Introduction<p>We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a …

Information Security

Wi-Fi security has been breached, say researchers

This is your Wi-Fi on KRACK<p>At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by <i>Ars</i> …

Digging for treasure in Aladdin’s source code

When it was released back in 1993, Disney’s Aladdin for the Sega Genesis (or Mega Drive, depending on which side of the pond you lived on through the …

How the plus sign can save your Gmail inbox from becoming a pit of doom

Everyone — with the exception of old people still clinging to their AOL addresses decades after their 500 free hours have expired — uses Gmail. At this point, it’s almost a byword for email, with individuals and workplaces embracing it enthusiastically.<p>That’s because it’s really good, and offers a …

SHARPENING X-TRANS FILES IN ADOBE LIGHTROOM

Sharpening is one of the most taxing aspects of the digital process and consequently many photographers prefer to stick to safe and secure ways, …

Renaud Bédard on Twitter: "Woooah, a spambot barfed its post recipe on my blog, it's beautiful o_o // http://t.co/AVhrIFXgEK http://t.co/tlrHBHa5Oj"

New conversation<p>End of conversation<p>New conversation<p>End of conversation<p>Replying to @<b>renaudbedard</b><p>FUN “@<b>renaudbedard</b>: Wooah, a spambot barfed its post …

IT ALL BEGAN WITH A STRANGE EMAIL | Valve

It was late at night in October of last year when the strange email arrived. In fact, I only read it by accident and did not delete it by some …

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to …

Introducing “6-pack”: the first open hardware modular switch

As Facebook’s infrastructure has scaled, we’ve frequently run up against the limits of traditional networking technologies, which tend to be too …

Icarus Interstellar, Interstellar flight, | Icarus Interstellar

Materials near a fusion reaction are subject to very high levels of both X-ray and Neutron radiation. How do they stand up to this?<p>Figure 7 – …

Neutrons

Modern SQL in Open Source and Commercial Databases

SQL has gone out of fashion lately—partly due to the NoSQL movement, but mostly because SQL is often still used like 20 years ago. As a matter of fact, the SQL standard continued to evolve during the past decades resulting in the current release of 2016. In this session, we will go through the most …

Databases

24-Bit vs. 16-Bit Audio Test - Part II: RESULTS & CONCLUSIONS

See Part I: PROCEDURE for details around the test samples used and how this study was conducted.<p>In this installment, let's have a look at the results …

Airbus crypto challenge write-up

If you don't know <b>where to start</b>, you might want to check these blogposts:<p>Here are the latest <b>links</b> posted:<p>05 Jul Overview Of Intel Sgx - Part 1, Sgx …

Information Security

Best holiday tech gifts under $50

Lettering is Not Type: Clear Definitions for Commonly Abused Terms

Using the wrong typography terms doesn’t just make you look silly or inexperienced; it doesn’t just irritate the nitpicky nerds; it deprives you from …

5 Great Gadgets for Coffee Lovers

The Boston Tea Party might have fueled the American Revolution, but coffee is the drink that runs the country today. According to annual research by …

Coffee

Ten Years of World of Warcraft

Ten years of <i>World of Warcraft</i>. Well. So many thoughts.<p>WoW has always been a contradiction of sorts: not the pioneer, but the one that solidified the …

Regin: Top-tier espionage tool enables stealthy surveillance

An advanced spying tool, Regin displays a degree of technical competence rarely seen and has been used in spying operations against governments, …