I told you so, 2021 edition Cinnamon-screensaver got popped, again. If you are not running XScreenSaver on Linux, then it is safe to assume that your screen does not lock. The latest: 2021: Mash keys on the virtual keyboard to unlock Cinnamon-screensaver. Previously: CVE-2019-3010, ...
Fully Homomorphic Encryption Part Three: Three Strawmans for the FHE Scheme In my previous post, I went over how Lattice-based crypto works, as well as what Learning With Error (LWE) Problem is. In the end, we looked at how Regev Encryption works by putting the LWE problem together with an encryption scheme.
Computer System Engineering This class covers topics on the engineering of computer software and hardware systems. Topics include techniques for controlling complexity; strong modularity using client-server design, operating systems; performance, networks; naming; security and priva...
Working inside WSL using Visual Studio Code Have you ever tried to develop inside the WSL? I did not until now. I used the WSL only as a Docker host for Docker Desktop. Recently I had to check a demo building and running on Linux. This tutorial shows you how to develop inside the WSL
The Many Flavors of .NET A quick reference for the sometimes-confusing differences in .NET nomenclature
Book Review: The Games That Weren’t by Frank Gasking Towards the end of of 1985, adverts started appearing in my Computer & Video Games magazines for “the first ever computer cartoon” – Scooby Doo in the Castle Mystery! And to a…
Running a fake power plant on the internet for a month There is a lot more on the internet than just social media and banking websites…
A fresh new avenue for Google to kill your SaaS startup In the old days, when Google wanted you dead it would remove you from search results. But now, they can just block your site in Chrome.
Pirates, Crypto, and the Secret History of Windows Product Activation Dave reveals the stories behind the first version of Windows Product Activation, or WPA, the anti-piracy technology he worked on while at Microsoft as an eng...
I run untested, viewer-submitted code on my 500-LED christmas tree. I think that went well! Head over to github to see some of the code involved.https://github.com/standupmaths/xmastree2020This is the original video:https://w...
Newsletter Week 2, 2021 BlogsHow to Use Query Strings in Blazor WebAssemblyCreating Serverless Apps with .NET using Azure FunctionsLinkedIn: Marinko Spasojevic Twitter: @CodeMazeBlog Cars Island ASP .NET Core API - integration with Azure Cosmos DB - part 3LinkedIn: Daniel Krzyc...
DO NOT MERGE: Regex source generator prototype by pgovind · Pull Request #47065 · dotnet/runtime This is just proof of concept that duplicating the current IL in RegexCompiler.cs as C# in a StringBuilder and it to the compilation as a source generator works! Approaches considered: Duplicating...
Duende Software Blog We help companies using .NET to build identity and access control solutions for modern applications.
Lua, a misunderstood language Lua is one of my favourite programming languages. I've used it to build a CMS for my old educational website, for creating cool IoT hardware projects, for building little games, and experimenting with network decentralisation. Still, I don't consider myse...
Maximizing Developer Effectiveness To be successful at digital transformation you need to optimize the key feedback loops in your software engineering organization
Escaping VirtualBox 6.1: Part 1 This post is about a VirtualBox escape for the latest currently available version (VirtualBox 6.1.16 on Windows). The vulnerabilities were discovered and exploited by our team Sauercl0ud as part of the RealWorld CTF 2020/2021.
EU-Kommission stellt sich gegen Hintertüren in Verschlüsselung - derStandard.at EU-Staaten dringen hingegen weiterhin darauf, im Kampf gegen Terror und Organisierte Kriminalität auf verschlüsselte Kommunikation zugreifen zu können
Code Maze Weekly #60 - Code Maze We’ve started strong this year, and the trend is going upwards. Here’s a fresh batch of articles for this week, and as always, there are many different topics to choose from and that’s just what we like. Hopefully, you’ll find your cup of tea in here, so ...
How I hijacked the top-level domain of a sovereign state | Detectify Labs Here’s how I temporariliy took over 50% of all DNS traffic for the TLD of the Democratic Republic of Congo.
A history of end-to-end encryption and the death of PGP 1981 - RFC 788 - Simple Mail Transfer Protocol (SMTP) is published, the standard for email is born. This is were everything starts, we now have an open peer-to-peer protocol that everyone on the internet can use to communicate. 1991 The US government ...
The Rise of Self-Supervised Learning Building stuff with machine learning and natural language processing.
new codebase, who dis? (How to Join a Team and Learn a Codebase) I have switched teams more often than I have had to implement an AVL tree, and you can guess which one of those two was taught in school. I wish someone had taught me how to join a new team! While learning a new codebase can be daunting, I've found a few ...
jQuery - 2006 | Web Design Museum Explore the milestones in the history of web design: jQuery - 2006.
Portugal - The Most Crypto-Friendly Nation in Europe | Jean Galea Portugal is fast-becoming the number one country for anyone involved in crypto, especially long-term investors and traders. Portugal is located on the Iberian Peninsula and is a member-state of the…
2 years, 200 applications: A .NET Core Migration at Enterprise Scale Does migrating your organization's codebase to .NET Core feel unattainable? Come be encouraged with the war stories from a massive migration!