Halaman

Minggu, 16 Februari 2014

Snabb Switch - Skip the OS and Get 40 million Requests Per Second in Lua

. Minggu, 16 Februari 2014 .

Snabb Switch - Skip the OS and Get 40 million Requests Per Second in Lua

 http://highscalability.com/blog/2014/2/13/snabb-switch-skip-the-os-and-get-40-million-requests-per-sec.html

 

 Paper: Network Stack Specialization for Performance

http://highscalability.com/blog/2014/2/12/paper-network-stack-specialization-for-performance.html


http://www.snabb.co/

 

https://github.com/SnabbCo/snabbswitch


http://lukego.github.io/blog/2013/06/23/echoing-packets-with-snabb-switch/


conferences.sigcomm.org/hotnets/2013/papers/hotnets-final43.pdf

(Read More..)

ServiceWorker & the offline web

.

https://speakerdeck.com/phuu/serviceworker-and-the-offline-web

(Read More..)

Generating test data for MySQL tables

.

http://www.mysqlperformanceblog.com/2014/02/10/generating-test-data-mysql-tables

(Read More..)

NIST-cybersecurity-framework

.

http://packetstormsecurity.com/files/download/125216/NIST-cybersecurity-framework.pdf

(Read More..)

Managing Your Build Tasks With Gulp.js

.

http://code.tutsplus.com/tutorials/managing-your-build-tasks-with-gulpjs--net-36910

(Read More..)

Using CreateJS - EaselJS

.

In this tutorial we will be exploring the CreateJS suite of libraries. CreateJS is suite of JavaScript libraries and tools for building rich, interactive experiences with HTML5. The CreateJS suite is divided into four libraries.

  • EaselJS - Makes working with HTML5 canvas easy.
  • TweenJS - For tweening HTML5 and JavaScript properties
  • SoundJS - Lets you easily work with HTML5 audio
  • PreloadJS - Lets you manage and coordinate loading of assets
The first library we will look at is EaselJs. Lets get started!

http://code.tutsplus.com/tutorials/using-createjs-easeljs--net-34840

(Read More..)

Supercharging your Gruntfile

.

http://www.html5rocks.com/en/tutorials/tooling/supercharging-your-gruntfile/

(Read More..)

JavaScript Animation That Works (Part 3 of 4)

.

http://code.tutsplus.com/tutorials/javascript-animation-that-works-part-3-of-4--net-35248

(Read More..)

chrome-cli

.

Control Google Chrome from the command line

https://github.com/prasmussen/chrome-cli

(Read More..)

LondonJS: Web Components Can Do That?!

.

https://speakerdeck.com/addyosmani/londonjs-web-components-can-do-that

(Read More..)

Kamis, 13 Februari 2014

Python with Braces

. Kamis, 13 Februari 2014 .

Python with Braces is a variant of the Python programming language, that has one significant difference: it uses standard C style braces for defining scopes rather than the classic python indentation. This makes Python more similar to other programming languages, and can also enable the introduction of new concepts such as anonymous functions and classes to Python.

http://www.pythonb.org/

(Read More..)

The TTY demystified

.

http://www.linusakesson.net/programming/tty/

(Read More..)

Minggu, 09 Februari 2014

Reverse Engineering A Bank’s Security Token

. Minggu, 09 Februari 2014 .

http://hackaday.com/2014/02/07/reverse-engineering-a-banks-security-token/

http://blog.valverde.me/2014/01/03/reverse-engineering-my-bank%27s-security-token/#.UveNa86GrMQ

https://github.com/Cathedrow/Cryptosuite

https://github.com/adafruit/RTClib

(Read More..)

A quick introduction to innodb_ruby

.

In On learning InnoDB: A journey to the core I introduced a new library and command-line tool in the innodb_ruby project. Now I’ll show off a few of the things it can do. I won’t try to explain all of the InnoDB structures exposed, since that will get the demos here way off track. We’ll come back to those structures later on!

http://blog.jcole.us/2013/01/03/a-quick-introduction-to-innodb-ruby/

(Read More..)

SublimeCodeIntel

.

http://sublimecodeintel.github.io/SublimeCodeIntel/
https://github.com/SublimeCodeIntel/SublimeCodeIntel

(Read More..)

Sabtu, 08 Februari 2014

RECESS

. Sabtu, 08 Februari 2014 .

http://twitter.github.io/recess/

(Read More..)

Tor exitmap

.

https://github.com/NullHypothesis/exitmap

(Read More..)

search for CHROME DEVELOPER VIDEOS

.

http://simpl.info/chromesearch/

(Read More..)

Damn Vulnerable iOS Application (DVIA)

.

http://damnvulnerableiosapp.com/

http://thehackernews.com/2014/02/test-your-mobile-hacking-and-pskills.html#

http://highaltitudehacks.com/

https://github.com/prateek147/DVIA

(Read More..)

Exploring MySQL Metadata Lock Instrumentation in Closer Detail

.

http://www.chriscalender.com/?p=1422

(Read More..)

Filesort optimization in 5.7.3: pack values in the sort buffer

.

http://mysqlserverteam.com/filesort-optimization-in-5-7-3-pack-values-in-the-sort-buffer/

(Read More..)

Migration of MTR suites to use InnoDB (2)

.

http://mysqlserverteam.com/migration-of-mtr-suites-to-use-innodb-continued/

(Read More..)

Migration of MTR suites to use Innodb (1)

.

http://mysqlserverteam.com/migration-of-mtr-suites-to-use-innodb/

(Read More..)

Cleanup a MySQL Schema

.

http://blog.mclaughlinsoftware.com/2014/02/07/cleanup-a-mysql-schema/

(Read More..)

SlateKit - Tablet UX Building Kit

.

slatekit.org/

(Read More..)

IPSet Bash Completion 2.3.1

.

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.
Changes: This release fixes two small bugs related to option completion.
 
http://packetstormsecurity.com/files/125105

(Read More..)

pMap 1.10

.

pMap is a tool for for passively discovering, scanning, and fingerprinting hosts on the local network. Included is a precompiled Windows binary.
Changes: Additional Multicast DNS and SSDP fingerprints. Excludes connected printers from fingerprinting process. Displays any available service configuration.
http://packetstormsecurity.com/files/125042

(Read More..)

SSL SPDY : Why we don’t use a CDN: A story about SPDY and SSL

.

https://thethemefoundry.com/blog/why-we-dont-use-a-cdn-spdy-ssl/
http://www.cyberciti.biz/faq/debian-ubuntulinux-unix-nginx-server-speeds-up-ssl-with-spdy-support/

(Read More..)

SmartDec : Native code to C/C++ decompiler.

.

Standalone

  • Supports x86 and x86-64 architectures.
  • Reads ELF and PE file formats.
  • Reconstructs functions, their names and arguments, local and global variables, expressions, integer, pointer and structural types, all types of control-flow structures, including switch.
  • Has a nice graphical user interface with one-click navigation between assembler code and reconstructed program.
  • The only decompiler that handles 64-bit code.

IDA Pro plug-in

  • Enjoys all executable file formats supported by the disassembler.
  • Benefits from IDA's signature search, parsers of debug information, and demanglers.
  • Push-button decompilation of a chosen function or the whole program.
  • Easy jumping between the disassembler and the decompiled code.
  • Full GUI integration.
http://derevenets.com/

(Read More..)

Analyzing Server Performance with R

.

http://blog.fan.tv/2013/10/08/analyzing-server-performance-in-r/

(Read More..)

How I hacked Github again.

.

http://homakov.blogspot.com/2014/02/how-i-hacked-github-again.html

(Read More..)

Mapping Relational Databases and SQL to MongoDB

.

http://code.tutsplus.com/articles/mapping-relational-databases-and-sql-to-mongodb--net-35650

(Read More..)

PGP Web of Trust: Core Concepts Behind Trusted Communication

.

http://www.linux.com/learn/tutorials/760909-pgp-web-of-trust-core-concepts

(Read More..)

HASHES : Kumpulsn hash password

.

Our database contains 314'250'971 cracked and 42'167'212 uncracked hashes.

Hashes.org attempts to reveal the plain text of your submitted hash. This is done in an effort to assist security professionals to evaluate the security provided by the relevant hash submitted.

Hashes.org is not a hacking site and assumes all submitted hashes are for testing purposes only and are obtained in a legal way.

Hashes.org is also happy to help computer users recover their own forgotten passwords, however this does not extend to recovery of passwords belonging to a third party.

Please ensure all submitted hashes are legally obtained and you have permission to recover the plain text before uploading them to Hashes.org.

If you object to a particular hash listed in the Hashes.org database please contact us explaining why.

If you decide to create a user account at Hashes.org your searches will be saved and you can view if they become cracked. You will also be able to upload hash lists and you can view their progress finding the plain texts and also load them.

If you are interested in participating in recovering hashes you can download the left list of our database and try to get some of them and upload it to our database. It is not needed that you register to do this and even if you are logged in, there will not be saved any information about the person who recovered the hash, it is completely anonymous.

http://hashes.org/index.php

(Read More..)

A simple rule for sane timestamps in MySQL

.

http://www.xaprb.com/blog/2014/01/30/timestamps-in-mysql/

(Read More..)

textql

.

https://github.com/dinedal/textql

(Read More..)

Octocard

.

Highly flexible github info card for every github lover. And it's open source. Please feel free to fork and build your own Octocard.

Features

  • Show your public github info on your website
  • Easy to customize
  • Almost no Rate Limiting of Github api by using server cache
  • Open source, you can even build your own Octocard server
http://octocard.info/

(Read More..)

mona.py

.

 Overview
This is the Corelan Team project page for 'mona', a debugger plugin / Exploit Development Swiss Army Knife.
This plugin replaces pvefindaddr, which is no longer supported as of mid june 2011.
The plugin has been tested on

  • Immunity Debugger 1.83 and up. (Older versions of Immunity Debugger are not supported and may not work.)
  • WinDBG


http://redmine.corelan.be/projects/mona

(Read More..)

mona codealign

.

http://www.floyd.ch/?p=795

(Read More..)

Sabtu, 01 Februari 2014

Working with quota on mobile browsers: A research report on browser storage - HTML5 Rocks

. Sabtu, 01 Februari 2014 .

http://www.html5rocks.com/en/tutorials/offline/quota-research/

(Read More..)

ascii drawing tool

.

http://www.asciiflow.com/#

(Read More..)

List of minimalist frameworks

.

https://github.com/neiesc/ListOfMinimalistFrameworks

(Read More..)

An Overview of Exploit Packs (Update 20) Jan 2014

.

http://contagiodump.blogspot.ro/2010/06/overview-of-exploit-packs-update.html

(Read More..)

Bootstrap 3.1.0 released : wth sass port

.

http://blog.getbootstrap.com/2014/01/30/bootstrap-3-1-0-released/

(Read More..)

tinypng : Shrink PNG files

.

https://tinypng.com/

(Read More..)

Live edit browserified code in chrome devtools

.

http://thlorenz.com/blog/live-editing-browserify

(Read More..)

Anatomy of a Python Package

.

http://xion.org.pl/2014/01/27/anathomy-of-a-python-package/

(Read More..)

Parallelism in one line

.

https://medium.com/building-things-on-the-internet/40e9b2b36148

(Read More..)

Owning Windows Networks with Responder 1.7

.

http://blog.spiderlabs.com/2013/01/owning-windows-networks-with-responder-17.html

Owning Windows Networks With Responder Part 2

http://blog.spiderlabs.com/2013/02/owning-windows-network-with-responder-part-2.html

Introducing Responder-1.0

http://blog.spiderlabs.com/2012/10/introducing-responder-10.html

(Read More..)

Windows Security : Incognito

.

https://labs.mwrinfosecurity.com/blog/2012/07/18/incognito-v2-0-released/

(Read More..)

Windows Securit : Token Knidnapping

.

argeniss.com/research/TokenKidnapping.pdf

(Read More..)

Current Windown attack method

.

http://labs.portcullis.co.uk/blog/se-and-you/

(Read More..)

MySQL server memory usage troubleshooting tips

.

http://www.mysqlperformanceblog.com/2014/01/24/mysql-server-memory-usage-2

(Read More..)

PHP The Right Way

.

http://www.phptherightway.com/

(Read More..)

What is Meld?

.

http://meldmerge.org/

(Read More..)

ls* Commands Are Even More Useful Than You May Have Thought

.

http://www.cyberciti.biz/open-source/command-line-hacks/linux-ls-commands-examples/

(Read More..)

The Magic of Strace

.

http://chadfowler.com/blog/2014/01/26/the-magic-of-strace/

(Read More..)

node-webgl

.

https://github.com/mikeseven/node-webgl

(Read More..)

You might not need jQuery

.

http://youmightnotneedjquery.com/

(Read More..)

Time a Python Function

.

http://www.pythoncentral.io/time-a-python-function/

(Read More..)

Maltrieve The Python Tool To Collect Malware Samples For Security Researchers

.

http://blog.hackersonlineclub.com/2014/01/maltrieve-python-tool-to-collect.html
https://github.com/technoskald/maltrieve

(Read More..)
 
{nama-blog-anda} is proudly powered by Blogger.com | Template by Agus Ramadhani | o-om.com