Mon premier brouillon d'article sur ce jeu date d'il y a plus de 3 ans, et il figure en bonne place dans mes jeux de de rôle favoris. Après l'avoir fait jouer de très nombreuses fois, je veux évoquer aujourd'hui le génial Lady Blackbird (site officiel) de John Harper, dont …

A really nice JS-based image glitch effect, adding a hacker / horror mood...
If anyone wants to use it, I transformed that code into a Javascript function there:
https://github.com/jacksonbenete/email_terminal/blob/master/src/glitch-img.js
It has a dependency on the p5.js lib
It's MIT-licensed, as all public CodePens code
This year, researcher David Buchanan tried to implement parallel decoding using the iDOT information. During development, he made a simple programming mistake and ended up making a wonderful discovery. He could create a PNG file with platform-dependent rendering. It looked one way on Windows, Linux, Firefox, and Chrome, and a different way on a Mac with default Apple applications, like the Safari web browser. (He found that Apple had implemented the same bug!) Buchanan provided two sample pictures (Hello World and computers) to demonstrate this per-platform rendering. It didn't take long for other people to use his code and generate other examples. Many of these images were uploaded to FotoForensics:
adversaries can attack the encoding of source code files to inject vulnerabilities
The trick is to use Unicode control characters to reorder tokens in source code at the encoding level.
cf. https://fr.wikipedia.org/wiki/Fichier_de_test_Eicar
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
FROM: https://sebsauvage.net/links/?0rGdAQ
Pour vous amuser à en créer en Python, avec fpdf2:
#!/usr/bin/env python3
# REQUIRE: pip install fpdf2 pdf417 qrcode
import fpdf, pdf417, qrcode
EICAR = 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*'
pdf = fpdf.FPDF()
pdf.add_page()
pdf.set_font("Helvetica", size=30)
pdf.text(90, 20, "EICAR")
pdf.text(10, 60, "PDF-417:")
pdf.image(pdf417.render_image(pdf417.encode(EICAR)), x=10, y=60)
pdf.text(10, 140, "QRCode:")
pdf.image(qrcode.make(EICAR).get_image(), x=35, y=145)
pdf.output("eicar.pdf")
il est facile, en utilisant de multiples sites web, de deviner des numéros de carte bancaire valides, et de deviner également les dates d'expiration et le CVV (cryptogramme visuel).
Visiblement, le système VISA est sensible à ce genre d'attaque, mais pas MasterCard.
Le principe consiste à entrer le numéro de carte sur de multiples sites web, et d'essayer de commander
Source : https://sebsauvage.net/links/
Issue #2 is out !
Paged Out! is a new experimental (one article == one page) free magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics.
Include a crazy prime Python quine ! (page 35) O.O
This evening I faced a really annoying bug: while able to exit Family View by entering my PIN in Steam.exe
, I could not do so when trying to access the Steam website.
I simply could not pass the page "Adults, enter your PIN below to exit Family View." Neither …
This post is only relevant to you if you use browserify
. For a good introduction to this powerful Javascript bundling tool, check this doc.
First of all, I'd like to take my hat off to James Hallyday and Peteris Krumins who have built such amazing tools as browserify
, testling
and …