« 10 11 12 13 14 227 »

Pages are deceptive. Live life in a basket.

QR Code Degenerators: Unmasking a Crypto Scam | ZenGo - Bitcoin & Cryptocurrency Wallet

Skip to content ZenGo – Bitcoin & Cryptocurrency Wallet The first keyless crypto wallet Menu Security About Us Blog Research Help Jobs Contact security Tal Be'ery August 29, 2019 Tweet Facebook As part of our ongoing research in the blockchain areas, we set our focus on QR code, as we are adding QR code support for ZenGo wallet soon. As we always do, we explored also the security aspects of this feature and found some reports on QR related scams . We wanted to check how prevalent this phenomenon and to our surprise, we found out that 4 out of the first 5 results presented when querying Google were leading to scammers site. These sites generate a QR code that encodes an address controlled by the scammers, instead of the one requested by the user, thus directing all payments for this QR code to the scammers. To protect users, we had shared the technical...

Linked on 2019-08-29 19:20:05 | Similar Links
0x0f0f0f (Alessandro) · GitHub

Skip to content Sign up Why GitHub? Features → Code review Project management Integrations Actions Package registry Team management Social coding Documentation Code hosting Customer stories → Security → Enterprise Explore Explore GitHub → Topics Collections Trending Learning Lab Open source guides Events Community forum GitHub Education Marketplace Pricing Plans → Compare plans Contact Sales Nonprofit → Education → '"` </textarea></xmp> In this user All GitHub ↵ Jump to ↵ No suggested jump to results In this user All GitHub ↵ Jump to ↵ In this user All GitHub ↵ Jump to ↵ Sign in Sign up '"` </textarea></xmp> Dismiss Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 40...

Linked on 2019-08-29 19:11:21 | Similar Links
Positional-only arguments in Python - DeepSource

Get started For teams Documentation Login Get started For teams Documentation Login Insights Python By Sanket on August 21, 2019 The ability to specify positional-only arguments using the / marker in function definitions is among the many new improvements to the Python language coming in the upcoming 3.8 release . This addition to syntax has performance benefits and enables better API design. Let's look at the motivation behind positional-only arguments and how to use it, with examples. Keyword-only arguments have been available in Python with the * marker, and addition of / marker for positional-only arguments improves the language’s consistency. With positional-or-keyword parameters, the mix of calling conventions is not always desirable. Consider these examples: Some function parameters already have semantic meaning: name...

Linked on 2019-08-29 17:58:47 | Similar Links
How to build a 8 GPU password cracker — #_shellntel

[if gte IE 9]> <link rel="stylesheet" type="text/css" href="//static1.squarespace.com/static/sitecss/555e03d8e4b0d64b51005ec7/58/50521cf884aeb45fa5cfdb80/555e5060e4b0a2312a6ec597/945-05142015/1551389124061/site.css?&filterFeatures=false&part=1"/><link rel="stylesheet" type="text/css" href="//static1.squarespace.com/static/sitecss/555e03d8e4b0d64b51005ec7/58/50521cf884aeb45fa5cfdb80/555e5060e4b0a2312a6ec597/945-05142015/1551389124061/site.css?&filterFeatures=false&part=2"/><link rel="stylesheet" type="text/css" href="//static1.squarespace.com/static/sitecss/555e03d8e4b0d64b51005ec7/58/50521cf884aeb45fa5cfdb80/555e5060e4b0a2312a6ec597/945-05142015/1551389124061/site.css?&filterFeatures=false&part=3"/><link rel="stylesheet" type="text/css" href="//static1.squarespace.com/static/sitecss/555e03d8e4b0d64b51005ec7/58/50521cf884aeb45fa5cfdb80/555e5060e4b0a231...

Linked on 2019-08-26 18:12:03 | Similar Links
Loggerhead Icons - Download Free Vector Icons | Noun Project Search

<![endif] DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD. DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD...

Linked on 2019-08-25 20:33:27 | Similar Links
With warshipping, hackers ship their exploits directly to their target’s mail room – TechCrunch

duplicate React-root div for styling Zack Whittaker @zackwhittaker / 20 hours Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to park outside a building and brute-force the Wi-Fi network password. Just drop your exploit in the mail and let your friendly postal worker deliver it to your target’s door. This newly named technique — dubbed “warshipping” — is not a new concept. Just think of the traditional Trojan horse rolling into the city of Troy, or when hackers drove up to TJX stores and stole customer data by breaking into the store’s Wi-Fi network. But security researchers at IBM’s X-Force Red say it’s a ...

Linked on 2019-08-07 18:53:45 | Similar Links
Car Seat Headrest: NPR Music Tiny Desk Concert - YouTube

Skip navigation Sign in Search Loading... Close Watch Queue Queue Remove all Disconnect The next video is starting stop Loading... Watch Queue Queue __count__/__total__ <p class="yt-spinner "> <span title="Loading icon" class="yt-spinner-img yt-sprite"></span> <span class="yt-spinner-message"> Loading... </span> </p> Loading... Our new desktop experience was built to be your music destination. Listen to official albums & more. Working... No thanks Check it out Find out why Close Car Seat Headrest: NPR Music Tiny Desk Concert NPR Music Loading... Unsubscribe from NPR Music? Cancel Unsubscribe Working... Subscribe Subscribed Unsubscribe 2.8M Load...

Linked on 2019-08-03 16:43:48 | Similar Links
The King of the Ferret Leggers | Outside Online

Critical JS GTM Google Tag Manager End Google Tag Manager Subscribe Menu Gear Gear Picks Gear Guy Gear Archive Travel Trail Life Travel Archive Fitness Sweat Science Fitness Archive Adventure Adventure Archive Culture Culture Notebook Culture Archive Video Gear Videos Fitness Videos Adventure Videos Culture Videos Magazine Issue Archive Features Subscribe Print Edition Give a Gift Free Newsletters Podcast Latest Science of Survival The Outside Interview Dispatches Search Close Search Search Search Microsoft Privacy Statement JSON-LD see https://developers.google.com/schemas/formats/json-ld “Then Reg Mellor let his trousers fall around his ankles.” (Ralph Steadman) [if IE 9]><video style="display: none;"><![endif] [if IE 9]></video><![endif] Donald Katz Donald Katz Feb 1, 1983 Facebo...

Linked on 2019-08-03 01:21:14 | Similar Links
floppy: take over maintainership · torvalds/linux@8206f66 · GitHub

Skip to content Why GitHub? Features → Code review Project management Integrations Actions Package registry Team management Social coding Documentation Code hosting Customer stories → Security → Enterprise Explore Explore GitHub → Topics Collections Trending Learning Lab Open source guides Events Community forum GitHub Education Marketplace Pricing Plans → Compare plans Contact Sales Nonprofit → Education → '"` </textarea></xmp> In this repository All GitHub ↵ Jump to ↵ No suggested jump to results In this repository All GitHub ↵ Jump to ↵ In this repository All GitHub ↵ Jump to ↵ Sign in Sign up Watch 6,737 Star 78,518 Fork 27,378 torvalds / linux Code Pull requests 277 Projects 0 Security Insights Per...

Linked on 2019-08-02 19:43:37 | Similar Links
Every Noise at Once

Every Noise at Once scan list playlist other things piano blues » indian jazz » liturgical » sung poetry » german punk rock » galway indie » pop chileno » uk contemporary r&b » pakistani pop » mexican post-rock » spanish new wave » chicha » classic psychedelic rock » caribbean metal » azonto » cantopop » judaica » jazz trumpet » viol » north dakota indie » mambo » dortmund indie » nitzhonot » classical string trio » chant religieux » indie platense » chinese indie » modern alternative rock » albany ny indie » folk rock » haitian dance » talent show » deep talent show » spanish hip hop » uk dancehall » italian tech house » school ensemble » traditional folk » classical contralto » jazz clarinet » country gospel » canadian celtic » rawstyle » russelater » eau claire indie » beninese pop »...

Linked on 2019-08-01 20:47:21 | Similar Links
« 10 11 12 13 14 227 »

Pages are deceptive. Live life in a basket.