att page 2 - Dave's Blog

Search
My timeline on Mastodon

Tweet from David_Risney

2015 Sep 19, 1:08
Designing the least JPG compressible fabric pattern: http://dsp.stackexchange.com/questions/2010/what-is-the-least-jpg-compressible-pattern-camera-shooting-piece-of-cloth-sca …. This is the anti @ericlaw
PermalinkComments

Tweet from David_Risney

2015 Aug 18, 10:23
RL point & click adv game via Twitter gets man out of hole. Use shirt on dog. Use dog on umbrella. Use leash on shirt http://www.polygon.com/2015/8/18/9173621/ryan-north-stuck-hole-twitter …
PermalinkComments

Retweet of anildash

2015 Jul 11, 5:09
Theaters will probably be like most industries: "We have a strict prohibition policy on tech. Unrelatedly, youth attendance is plummeting."
PermalinkComments

Retweet of kleinmatic

2015 Jun 16, 3:56
Bruce Schneier sees your paranoid conjecture about the Snowden docs and raises you double. http://www.wired.com/2015/06/course-china-russia-snowden-documents/ …
PermalinkComments

Retweet of secretGeek

2015 Apr 2, 5:00
So a centralized website for managing distributed repos is being hit by a distributed attack.
PermalinkComments

Retweet of ericlaw

2015 Apr 2, 12:23
Nice writeup of the attack on GitHub: http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html#.VRye4mK9KK0 …
PermalinkComments

Tweet from David_Risney

2015 Mar 30, 10:20
More GitHub DDoS details: http://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub … Wouldn't it be safer for attacker to load DDoS victim's content via img than script tag?
PermalinkComments

laughingsquid:Photo-Editing Professionals React With Surprise...

2015 Mar 17, 3:05


laughingsquid:

Photo-Editing Professionals React With Surprise and Frustration as They Attempt to Use Photoshop 1.0 From 1990

PermalinkComments

laughingsquid:Photo-Editing Professionals React With Surprise...

2015 Mar 17, 3:05


laughingsquid:

Photo-Editing Professionals React With Surprise and Frustration as They Attempt to Use Photoshop 1.0 From 1990

PermalinkComments

Retweet of chockenberry

2015 Mar 9, 11:56
More about the attack on the developer tools: https://firstlook.org/theintercept/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/ …
PermalinkComments

Retweet of industrial_book

2015 Mar 6, 6:11
Old war. New battlefield. #mathjoke pic.twitter.com/TvWxI0h8Xw
PermalinkComments

Tweet from David_Risney

2015 Mar 3, 4:06
How do you conditionally sprite/concat/shard based on http version? https://mattwilcox.net/web-development/http2-for-front-end-web-developers …
PermalinkComments

Tweet from David_Risney

2015 Mar 2, 1:12
Finished re-watching Galaxy Quest: still awesome. For how long did I mistakenly attribute "Never give up, never surrender" to Toy Story?
PermalinkComments

Retweet of matthew_d_green

2015 Feb 18, 10:07
If you're a technology worker who has any access to sensitive keys or secrets, read all the way through this piece. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ …
PermalinkComments

Tweet from David_Risney

2015 Feb 11, 1:12
Months later still can't stop watching @MattBesser and The Vandals 'Its Got To Be Ska'. http://www.ifc.com/shows/comedy-bang-bang/blog/2014/10/cbb-the-vandals-ska-extended-song … Besser skanking is the best.
PermalinkComments

Tweet from David_Risney

2015 Jan 28, 9:57
Ross: Attorney built on IBM's Watson http://www.poweredbyross.com/  Can Ross legally practice law? We'd have to research that... Let's ask Ross
PermalinkComments

David_Risney: Reading about new Odd Couple TV series includes an interview with Gary Marshal but I can only hear voice

2015 Jan 15, 9:33
David Risney @David_Risney :
Reading about new Odd Couple TV series includes an interview with Gary Marshal but I can only hear @PFTompkins voice http://www.nerdist.com/2015/01/matthew-perry-and-thomas-lennon-introduce-us-to-their-odd-couple/ …
PermalinkComments

ericlaw: A nice look at HTTP/2 in practice, including use of data frame padding to attempt to thwart datalength-leak attacks.

2015 Jan 15, 9:32
Eric Lawrence @ericlaw :
A nice look at HTTP/2 in practice, including use of data frame padding to attempt to thwart datalength-leak attacks. http://blog.httpwatch.com/2015/01/16/a-simple-performance-comparison-of-https-spdy-and-http2/ …
PermalinkComments

Gamers Messed With The Steam Sale, Then Valve Changed The Rules

2014 Jun 24, 3:51

Applied game theory 101: Valve’s Steam Summer Sale involves a meta game with teams of Steam users competing for daily prizes. On Reddit the players join together to take turns winning daily. Valve gets wise and performs an existential attack, changing the rules to make it harder for players to want to coordinate.

Still, that all the players joined together to game the system gives me hope for humanity. Its a self organized solution to a tragedy of the commons problem. Only in this case the tragedy is by design and is updated to be more tragic.

PermalinkCommentsgame video-game game-theory valve

On exploiting security issues in botnet C&C...

2014 Jun 23, 4:26


On exploiting security issues in botnet C&C software:

Hackers “are learning that it’s not so easy to write secure code,” Toro says. “Most of us in the business of securing our applications and systems know that bulletproofing software is an extremely expensive and exhaustive undertaking. Malware creators who have to look to their own defences would have to slow down the production of new attacks.”

FYI, if you want to know what it looks like when you hack a hacker, look no further than the seminal 1995 film Hackers.

PermalinkCommentstechnical security
Older EntriesNewer Entries Creative Commons License Some rights reserved.