The suspects, who fled the scene in a car driven by a female accomplice, are part of the radical atheist sect, the Charles Darwin Martyrs Brigade, which has links to the extremist group Al Kinda. Witnesses state that as they opened fire, the two suspects yelled, “God is not great, because God does not exist!”

With every year that passed, as Perl 6 produced more press releases than actual code, the attractiveness of Perl as a platform declined. Sure, it still had users. Sure, it still had people starting new projects. (The Modern Perl movement was a decent attempt to bring wider enthusiasm back into the ecosystem by dispelling some of the worst myths of the language. It modeled itself after JavaScript: The Good Parts without realizing that Perl lacked JavaScript's insurmountable advantage of ubiquity. Who could have predicted that Objective-C would be interesting again a year before the iPhone came out?)

What it didn't have was a clearly defined future, let alone an articulated one.

New Japanese words every day, with kana, romaji and kanji. And colorful pictures, just in case.

Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases.

Wifiphisher works on Kali Linux and is licensed under the MIT license.

We have broken HTTP. We’ve done it for years in fits and starts, but apps have completely broken it. HTTP was a good specification which we’ve steadily whittled away.

URLs have a purpose. We are very cavalier about that purpose. We don’t use canonicals. We’re sloppy about switching back and forth between HTTP and HTTPs. We don’t bother to logically structure our URLs. We rebuild websites and let all the links break. We don’t appreciate that crawlers are dumb and they need more context than humans.

The author goes on to complain about the misuse of HTTP methods and status codes as if he had never heard of REST APIs. Overall, though, he makes some good points.

So, I’ve been doing my research. Because there are so many prefectures and so many famous foods, I’m going to be breaking this article up into two parts. One for North, East, and Central prefectures of Japan, and one for West and South prefectures of Japan. At the end of the second part, we’ll also include a printout that has a map with numbers on all the prefectures corresponding to a list down below it. That way you can print this out, take it with you, and go on a rompy food excursion in Japan.

Each prefecture will be given 3 famous foods with the exception of a few (like Hokkaido, which is really, really big and tasty). While there are many other famous foods in every single prefecture, these are the ones that seemed to be the most famous.

Supposedly, git-svn can also be used to convert a Subversion repo to Git. Unfortunately, after reading the git-svn docs carefully and several useful resources (like the slightly-obscure Git FAQ, the Git Community Book, Paul Dowman’s blog and Alexis Midon’s blog), it became apparent that all the resources are piecemeal and nothing gives you the BIG HONKIN’ PICTURE. So here it is, ponies and all…

You may have heard that the NSA can decrypt SSH at least some of the time. If you have not, then read the latest batch of Snowden documents now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.

TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.

Although there are a few different public-key encryption algorithms, the most popular — and fortunately, the easiest to understand — is the RSA algorithm, named after its three inventors Rivest, Shamir and Adelman. To apply the RSA algorithm, you must find three numbers e, d and n related such that ((m^e)^d) % n = m. Here, e and n comprise the public key and d is the private key. When one party wishes to send a message in confidence to the holder of the private key, he computes and transmits c = (m^e) % n. The recipient then recovers the original message m using m = (c^d) % n.

|< First   < Previous   21–30 (2925)   Next >   Last >|