Yesterday
A look back through web-browser history, as I test my site against the browsers of the past.
2 days ago
What I now advocate and try to practice is slightly tangential to both of these (but probably a spiritual cousin to YAGNI): “Do it the dumb way first”. I mean, just get in there and write some terrible code that does the task in the most obvious way possible. Copy and paste little chunks. Have crappy function and variable names. Try to stick with it as long as you can bear.
Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a captive portal, asking for money, advertising, or personal information in exchange for access to the Internet. In this talk I take a look at how these and similar restrictive networks work, how they identify and restrict users, and how with a little preparation we can reach the Internet regardless of what barriers they throw up.Bio:Grant Bugher has been hacking and coding since the early 90’s and working professionally in information security for the last 12 years. He is currently a security engineer for a cloud service provider, and has previously been an architect, program manager and software engineer on a variety of online services, developer tools and platforms. Grant is a prior speaker at BlackHat and DEF CON and a regular DEF CON attendee since DEF CON 16. Most of his research and work is on cloud computing and storage platforms, application security, and detecting
rC3 – remote Chaos Experience (2020) Unterseiten MCR Ilmenau VOC internal stuff RTMP Endpunkte Arbeitsbereiche und Ansprechpersonen Titel Was Wer Aufnahmeleitung
Personal blog of Alex S. — writing about technology, languages, and the web.