A very plausible scenario of credentials sniffer injected through npm dependency chain.
I loved the "I’d see it in your source on GitHub!" section : so scary and true.
Daniel Linssen, aka managore, is a fantastic indie game developer. I already mentioned one of his games, HopSlide, in a previous blog post (FR).
Now that it's clear that I am totally unbiased about this incredible game maker, lets talk about his latest games !
WalkieTalkie
This first one simply amazes …
The USE Method provides a strategy for performing a complete check of system health, identifying common bottlenecks and errors. For each system resource, metrics for utilization, saturation and errors are identified and checked. Any issues discovered are then investigated using further strategies.
This is an example USE-based metric list for Linux operating systems (eg, Ubuntu, CentOS, Fedora). This is primarily intended for system administrators of the physical systems, who are using command line tools. Some of these metrics can be found in remote monitoring tools.
Journalists watch out—you may be unintentionally revealing sources.
Unlike previous text fingerprinting techniques, zero-width characters are not removed when formatting is removed from text
TL;DR:
- List Resizing : the backing array is grown by approximately 12% (in Java ArrayList grows by 50% when expanded2 and in Ruby, Array grows by 100%). The Python implementation optimizes for memory usage over speed. Another reason to preallocate Python lists when possible.
- Inserting at the beginning of a list takes linear time. Sometimes, better use Deques which trade constant time insert and remove from both ends in exchange for constant time indexing.
By Russel Cohen
- La Sociale
- Opération Correa
- La Sociologie Est Un Sport de Combat
Des films de Pierre Carles, Nina Faure, Gilles Perret...
La scénariothèque héberge les scénarii de huis clos et de murder party disponibles dans la communauté francophone.
designed for microservices, cloud native and container-based (Docker, K8s, Mesos) architectures. Underlying technology is a distributed tracing system.
- Provide high performance Java agent, no need to CHANGE any application source code.
Only increase extra 10% cpu cost in 5000+ tps application, even when collect all traces. - Manual instrumentation
- As an OpenTracing supported tracer
- Use @Trace annotation for any methods you want to trace.
- Integrate traceId into logs for log4j, log4j2 and logback.
De Chorographia est un recueil de trente cartes de fantasy, au format carré, qui peuvent s'utiliser isolément ou en combinaison : on peut les pivoter et les routes coïncident toujours d'une carte à l'autre, pour créer une infinité d'univers de jeu en fonction des besoins.
Cartographie Géomorphique
Icônes dispos en PDF & EPS
Maps for the Six Cities of the Midlands
Online editor, template-based, free account
Un an plus tard, deuxième partie de Psi*Run de Meguey Baker, cette fois dans une ambiance inspirée du jeu de rôles Blades In The Dark.
Et encore une fois, c'était génial !
Voici le compte-rendu : https://chezsoi.org/lucas/jdr/psirun/CR_2017-12-27.html
Awesome 2D & 3D spritesheets by themes
Include great icons:
Pinboard is a personal archive for things you find online and don't want to forget.
- minimalist, lightweight design with high information density
- Everything on the site is available as an RSS feed
- You can import and export data in a wide variety of formats.
- The site caters to users who value privacy. Half of users have no public bookmarks.
- The pricing plan is simple and inexpensive: you pay a small annual fee.
The site has a sane business model that would be familiar to your grandparents.
Le caractère Andersen fait référence à l'écrivain danois Hans Christian Andersen. Ce caractère est donc destiné aux contes et aux histoires pour enfants en général. Ce qui fait qu'Andersen n'est pas un caractère comme les autres, c'est son système de ponctuation complémentaire. En effet, Andersen dispose de 15 nouveaux symboles de ponctuation exprimant des émotions. Comme dans la ponctuation espagnole, ces symboles sont placés en début et fin de phrase afin de permettre au lecteur de lire dès le début avec le bon ton.
Thierry a également conçu une autre police pour bandes dessinées : http://thierryfetiveau.fr/cms/index.php?page=Anelim
- HTTP/2
- TLS 1.3
- DOH: DNS over HTTP
- QUIC: a candidate replacement for the TCP protocol
since Google has already deployed QUIC in the Chrome browser and on its sites, it already accounts for more than 7% of Internet traffic.
Also mention this creepy & fascinating attack : http://codebutler.com/firesheep
Canary tokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves.)
Embeddable in :
- fake URLs ending in .html, .js, .php...
- emails to detect if you are spied on
- files in the cloud
- as file watchs do detect spies on filesystems
- desktop.ini for Windows directories or zip files
- MSSQL & MYSQL
- Word / PDF documents
- a JS resource is used elsewhere