Jump to content

Kev

Active Members
  • Content Count

    304
  • Joined

  • Days Won

    13

Kev last won the day on September 11

Kev had the most liked content!

Community Reputation

160 Excellent

1 Follower

About Kev

  • Rank
    Active Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. This app allows you to simulate how any origami crease pattern will fold. It may look a little different from what you typically think of as "origami" - rather than folding paper in a set of sequential steps, this simulation attempts to fold every crease simultaneously. It does this by iteratively solving for small displacements in the geometry of an initially flat sheet due to forces exerted by creases. You can read more about it in our paper: Fast, Interactive Origami Simulation using GPU Computation by Amanda Ghassaei, Erik Demaine, and Neil Gershenfeld (7OSME) A
  2. The last major release of the X.Org Server was in May 2018 but don't expect the long-awaited X.Org Server 1.21 to actually be released anytime soon. This should hardly be surprising but a prominent Intel open-source developer has conceded that the X.Org Server is pretty much "abandonware" with Wayland being the future. This comes as X.Org Server development hits a nearly two decade low, the X.Org Server is well off its six month release regiment in not seeing a major release in over two years, and no one is stepping up to manage the 1.21 release. A year ago was a proposal to see new
  3. A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a file no bigger than a gif. A control room in an Idaho National Labs facility.PHOTOGRAPH: JIM MCAULEY/THE NEW YORK TIMES/REDUX EARLIER THIS WEEK, the US Department of Justice unsealed an indictment against a group of hackers known as Sandworm. The document charged six hackers working for Russia's GRU military intelligence agency with computer crimes related to half a decade of cyberattacks across the globe, from sabotaging the 2018 Winter Olympic
  4. Microsoft has unveiled a new open-source "matrix" that hopes to identify all the existing attacks that threaten the security of machine learning applications. Image: securitylab.ru Microsoft and non-profit research organization MITRE have joined forces to accelerate the development of cyber-security's next chapter: to protect applications that are based on machine learning and are at risk of new adversarial threats. The two organizations, in collaboration with academic institutions and other big tech players such as IBM and Nvidia, have released a new
  5. Installation pip install multiplex # or better yet pipx install multiplex Python 3.7 or greater is required. Examples Parallel Execution Of Commands mp \ './some-long-running-process.py --zone z1' \ './some-long-running-process.py --zone z2' \ './some-long-running-process.py --zone z3' You can achive the same effect using Python API like this: from multiplex import Multiplex mp = Multiplex() for zone in ['z1', 'z2', 'z3']: mp.add(f"./some-long-running-process.py --zone {zone}") mp.run() Dynamically Add Com
  6. The majority of the bugs in Cisco’s Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software can enable denial of service (DoS) on affected devices. Cisco has stomped out a slew of high-severity vulnerabilities across its lineup of network-security products. The most severe flaws can be exploited by an unauthenticated, remote attacker to launch a passel of malicious attacks — from denial of service (DoS) to cross-site request forgery (CSRF). The vulnerabilities exist in Cisco’s Firepower Threat Defense (FTD) software, which is part of i
  7. How do I check the TLS/SSL certificate expiration date from my Linux or Unix shell prompt? How can I find the TLS certificate expiry date from Linux or Unix shell scripts? We can quickly solve TLS or SSL certificate issues by checking the certificate’s expiration from the command line. Let us see how to determine TLS or SSL certificate expiration date from a PEM encoded certificate file and live production website/domain name too when using Linux, *BSD, macOS or Unix-like system. How to check TLS/SSL certificate expiration date from command-line To check th
  8. If you have Chromium versions of Nano Adblocker or Nano Defender, pay attention. Adblocking extensions with more than 300,000 active users have been surreptitiously uploading user browsing data and tampering with users’ social media accounts thanks to malware its new owner introduced a few weeks ago, according to technical analyses and posts on Github. Hugo Xu, developer of the Nano Adblocker and Nano Defender extensions, said 17 days ago that he no longer had the time to maintain the project and had sold the rights to the versions available in Google’s Chr
  9. Kev

    Invitatii FL

    Iti dau si contul meu pt. donatie daca il alimentezi, e oK, nu stiu cat mai sunt, dar oricum ajung de un barbut (blackjack), doar pentru invitatii, are ratie mare. PS: nu ma rupeti cu pm-uri
  10. Domnul boca, am prieteni care au case de pariuri, fotbal, handbal, caini, etc, nu a specificat ca joac on-line
  11. a disparut plugin-ul cu tabele din editor, exista ceva extensie gen CKEditor
  12. APICheck - The DevSecOps toolset for HTTP APIs APICheck is an environment for integrating existing HTTP APIs tools and create execution chains easily. Designed with integration third party tools in mind. APICheck is comprised of a set of tools that can be connected to each other to achieve different functionalities, depending on how they are connected. It allows you to create execution chains Why another REST APIs tool? APICheck aims to be a universal toolset for testing REST APIs, allowing you to mix and match the tools it provides, while enabling interoperab
  13. The Cybersecurity research firm Cisco Talos has recently detected an activity that are linked with the cryptocurrency botnet. The experts claimed that these attacks are targetting different businesses within sectors like the government, retail, and technology. Some variants also support RDP brute-forcing, and experts have identified that the attackers also use tools such as Mimikatz, as it helps the botnet increase the number of systems participating in its opening pool. Lemon Duck Malware Lemon Duck is a botnet that has automatic spreading capabilities. Its con
  14. ca sa va treaca On: in general se dau bani inainte sa se schimbe casetele, si la caini si la fotbal (la toate sporturile)
  15. Microsoft successfully argued in court against the use of Windows SDKs inside malware code, a precedent it would be able to use again and again in future botnet crackdowns. The TrickBot botnet has survived a takedown attempt orchestrated by a coalition of tech companies on Monday. TrickBot command and control (C&C) servers and domains seized yesterday have been replaced with new infrastructure earlier today, multiple sources in the infosec community have told ZDNet. Sources from companies monitoring TrickBot activity described the takedown's
×
×
  • Create New...