« 514 515 516 517 518 1506 »

Pages are deceptive. Live life in a basket.

papers-please/communication at master · infoforcefeed/papers-please · GitHub

Skip to content Personal Open source Business Explore Sign up Sign in Pricing Blog Support Search GitHub '"` </textarea></xmp> This repository Watch 7 Star 0 Fork 0 infoforcefeed / papers-please Code Issues 0 Pull requests 0 Projects 0 Pulse Graphs Branch: master Switch branches/tags Branches Tags master Nothing to show Nothing to show Create new file Find file History papers-please / communication / Latest commit e5f7650 Feb 14, 2017 qpfiffer Add proquint phrases via cblgh Permalink .. Failed to load latest commit information. proquint_phrases.html Add proquint phrases via cblgh Feb 14, 2017 Contact GitHub API Training Shop Blog About © 2017 GitHub , Inc. Terms Privacy Security Status Help You can...

Linked on 2017-02-14 19:45:44 | Similar Links
A Proposal for Proquints: Identifiers that are Readable, Spellable, and Pronounceable

arXiv:0901.4016v2 [cs.SE] 26 Jan 2009 Daniel Shawcross Wilkerson version 1.0, 26 January 2009 Identifiers (IDs) are pervasive throughout our modern life. We suggest that these IDs would be easier to manage and remember if they were easily readable, spellable, and pronounceable. As a solution to this problem we propose using PRO-nouncable QUINT-uplets of alternating unambiguous consonants and vowels: proquints . Our life is full of identifying numbers. However the number-ness of these numbers is irrelevant. A credit-card number is not a number exactly — when was the last time you did arithmetic on one? Mostly these numbers are identifiers : their only function is to be unique. The problem is, they are getting longer as the world of things that must be uniquely identified gets larger: the number of things goes up, previously disjoint contexts merge, and history gets lo...

Linked on 2017-02-14 19:41:31 | Similar Links
Shades of green - Wikipedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search "Gray-green" redirects here. For the bus operator, see Grey-Green . For a broader coverage related to this topic, see Green . Green Spectral coordinates Wavelength 520–570 nm Frequency ~575–525 THz Color coordinates Hex triplet #00FF00 sRGB B ( r , g , b ) (0, 255, 0) HSV ( h , s , v ) (120°, 100%, 100%) Source W3C TR CSS3 Color Module [1] B : Normalized to [0–255] (byte) Some tints and shades of green Varieties of the color green may differ in hue , chroma (also called saturation or intensity) or lightness (or value, tone, or brightness ), or in two or three of these qualities. Variations in value are also called tints and shades , a tint being a green or other hue mixed with white, a shade being mixed with black. A large selection of these...

Linked on 2017-02-14 04:00:58 | Similar Links
Line of purples - Wikipedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed. (February 2011) ( Learn how and when to remove this template message ) The line of purples circled on the CIE chromaticity diagram In color theory , the line of purples or the purple boundary is the locus on the edge of the chromaticity diagram between extreme spectral red and violet . Except for the endpoints, colors on the line of purples are not spectral. Line-of-purples colors and spectral colors are the only ones which are considered fully saturated in the sense that for any given point on the line of purples there exists no color involving a mixture of red and violet that is more saturated...

Linked on 2017-02-14 03:57:25 | Similar Links
Broadcast encryption - Wikipedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such a way that only qualified users (e.g. subscribers who have paid their fees or DVD players conforming to a specification) can decrypt the content. [1] [2] [3] The challenge arises from the requirement that the set of qualified users can change in each broadcast emission, and therefore revocation of individual users or user groups should be possible using broadcast transmissions, only, and without affecting any remaining users. As efficient revocation is the primary objective of broadcast encryption, solutions are also referred to as revocation schemes . [4] [5] Rather than directly encrypting the content for qualified users, broadcast encryptio...

Linked on 2017-02-14 00:02:15 | Similar Links
Spread syntax - JavaScript | MDN

Skip to main content Select language Skip to search Header mozilla Mozilla Developer Network Sign in Web Technologies Technologies HTML CSS JavaScript Graphics HTTP APIs / DOM WebExtensions MathML References & Guides Learning web development Tutorials References Developer Guides Accessibility Game development ...more docs Mozilla Docs Add-ons Firefox Developer Tools Feedback Get Firefox help Get web development help Join the MDN community Report a content problem Report a bug Search Search Content will go here end is_zone action buttons Languages Deutsch (de) Español (es) Français (fr) Italiano (it) 日本語 (ja) 한국어 (ko) Polski (pl) Português (do Brasil) (pt-BR) Русский (ru) 中文 (简体) (zh-CN) Add a translation Edit Advanced this page Advanced History Print this article crumbs MDN Web technology for developers JavaScrip...

Linked on 2017-02-13 21:42:42 | Similar Links
Tessa Thornton on Twitter: "I’m leaving Shopify. Cognitive dissonance got too loud. Looking for software dev job, exp in mostly js & ruby. 👋"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up tessthornton's profile Tessa Thornton @ tessthornton T...

Linked on 2017-02-13 21:41:01 | Similar Links
jack on Twitter: "just setting up my twttr"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up jack's profile jack Verified account @ jack jack Ve...

Linked on 2017-02-13 20:43:01 | Similar Links
noah glass on Twitter: "Belon is like an indelible bloom as she heel spins, bearing absolute sole:-) while always hiding from the paparazzi. Who cares if I had a camera, She says "s..."

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up noah's profile noah glass @ noah noah glass @ noah i...

Linked on 2017-02-13 20:39:51 | Similar Links
Pilate on Twitter: "ok try this QUIT :oops ok"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up noptical's profile Pilate @ noptical Pilate @ noptica...

Linked on 2017-02-13 20:39:00 | Similar Links
Tom Darby on Twitter: "Spider Man, Spider Man Chillin' in his camper van Kickin' back, drinkin' booze head to toe in sweet tattoos Hang on That is not Spider Man"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up magicChopstick's profile Tom Darby @ magicChopstick To...

Linked on 2017-02-13 20:37:24 | Similar Links
Leslie M.R on Twitter: "I have a friend that insisted on dressing up like a clown for his family pic back when he was like 8 and it's my favorite picture ever https://t.co/LtAjhbs1wh"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up Lejlie's profile Leslie M.R @ Lejlie Leslie M.R @ Lej...

Linked on 2017-02-13 20:31:33 | Similar Links
Things Every Hacker Once Knew

by Eric S. Raymond <esr@thyrsus.com> One fine day in January 2017 I was reminded of something I had half-noticed a few times over the previous decade. That is, younger hackers don’t know the bit structure of ASCII and the meaning of the odder control characters in it. This is knowledge every fledgling hacker used to absorb through their pores. It’s nobody’s fault this changed; the obsolescence of hardware terminals and the near-obsolescence of the RS-232 protocol is what did it. Tools generate culture; sometimes, when a tool becomes obsolete, a bit of cultural commonality quietly evaporates. It can be difficult to notice that this has happened. This document is a collection of facts about ASCII and related technologies, notably hardware terminals and RS-232 and modems. This is lore that was at one time near-universal and is no longer. It’s not likely to be dire...

Linked on 2017-02-13 18:07:17 | Similar Links
Imgur: The most awesome images on the Internet

we're hiring! blog about imgur imgur store imgur apps developer api advertise need help? terms privacy ad choices Upload Images Video to GIF Make a Meme New post sign in sign up #secondary-nav .header-center #topbar Uploaded 9s Love Imgur? Join our team! about store help blog terms privacy apps api advertise ad choices report ad request deletion community rules forum TAKE ME UP No way! I'm sure hide post details Use old embed code Copy and paste the HTML below into your website: Theme: Dark Light Custom Preview Background: # Text: # Link: # Hide Thumbnails: Hide old embed code ...

Linked on 2017-02-13 17:57:30 | Similar Links
Scott Thurm on Twitter: "Law of unintended consequences: Google paid early staffers for self-driving car so much they could quit https://t.co/dxbDenyUJ1"

Home Moments Search query Search Twitter Remove In this conversation Verified account @ Suggested users Verified account @ Verified account @ Language: English Bahasa Indonesia Bahasa Melayu Català Čeština Dansk Deutsch English UK Español Filipino Français Hrvatski Italiano Magyar Nederlands Norsk Polski Português Română Slovenčina Suomi Svenska Tiếng Việt Türkçe Ελληνικά Български език Русский Српски Українська мова עִבְרִית العربية فارسی मराठी हिन्दी বাংলা ગુજરાતી தமிழ் ಕನ್ನಡ ภาษาไทย 한국어 日本語 简体中文 繁體中文 Have an account? Log in Have an account? Remember me · Forgot password? New to Twitter? Sign up ScottThurm's profile Scott Thurm Verified account @ ScottThurm ...

Linked on 2017-02-13 17:08:30 | Similar Links
Who is Anna-Senpai, the Mirai Worm Author? — Krebs on Security

Advertisement Subscribe to RSS Follow me on Twitter Join me on Facebook class="grid_16" #header About the Author Blog Advertising #pgnav 18 Jan 17 by BrianKrebs On September 22, 2016, this site was forced offline for nearly four days after it was hit with “ Mirai ,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack — using the name “ Anna-Senpai ” — released the source code for Mirai, spawning dozens of copycat attack armies online. After months of digging, KrebsOnSecurity is now confident to have uncovered Anna-Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware. Mirai co-author Anna-...

Linked on 2017-02-13 16:37:11 | Similar Links
Mirai (malware) - Wikipedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Mirai Original author(s) "Anna-senpai" (online pseudonym) Repository github .com /James-Gallagher /Mirai Written in C (agent), Go (controller) Operating system Linux Type Botnet Mirai (Japanese for "the future", 未来) is malware that turns computer systems running Linux into remotely controlled "bots", that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as remote cameras and home routers. [1] The Mirai botnet has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks , including an attack on 20 September 2016 [2] on computer security journalist Brian Krebs 's web site, an attack on French web host OVH [3] and the October 2016 Dyn cyberattack . [4] [5] [6] Accordi...

Linked on 2017-02-13 16:27:32 | Similar Links
University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices | Network World

<![endif] BEGIN PAGE HEADER blx4 #809 blox4.raw_link_list Trending : University attacked by its own vending machines REVIEW: Windows 10 Yoga Book RSA 2017 preview Techie Valentine's Day gifts Resources/White Papers Search network world <img class="print-only" src="/www.idge.nww/images/networkworld-logo-print.png"> Sign In | Register Hi ! Here are the latest Insider stories. 10 tips for helming IT through ups and downs Driving digital strategy with customer journey maps How San Diego fights off 500,000 cyberattacks a day 10 super-user tricks to boost Windows 10 productivity More Insider Sign Out Search for Suggestions for you Insider email Applications All Applications Big Data/Business Intelligence CRM ERP Linux Windows Careers All Careers Education Salaries Skills and Training Cloud Computing All Cloud Comp...

Linked on 2017-02-13 16:22:10 | Similar Links
« 514 515 516 517 518 1506 »

Pages are deceptive. Live life in a basket.