This wiki is intended to hold documentation of any kind about GNU Bash. The main motivation was to provide human-readable documentation and information so users aren’t forced to read every bit of the Bash manpage – which can be difficult to understand. However, the docs here are not meant as a newbie tutorial.
Github announced today the Teletype package for Atom, package for real-time collaborative coding. Below is an animation and video of how it works.
via Github blog
Images usually contain metadata referred to as exif data. Nowadays this includes your camera or phone name and model. Also the location where the image was taken is also included if the GPS is enabled and you did not turn off geo-tagging.
Here’s how such exif data looks like (excluding location which I have disabled):
Today, January 26, Facebook announced that they have introduced ‘physical keys’ (i.e. usb keys) as an option of the two-factor authentication. Google has already introduced this two years earlier.
A few years ago two-factor authentication was introduced by Google and Facebook among many other companies which allowed the user to set an extra security measure to avoid loosing their account in case their password was stolen. This extra layer required the user, if using a new computer or IP, to enter an authentication code generated (regularly) through an app (e.g. Google’s authenticator for Google accounts).
Many of the popular websites and services have been or at some point or will be targetted and exploited. As a result, it is most likely that at least one of your online accounts has been pwned at some point. This doesn’t mean your account has been cracked but it could mean that some of your private information has been leaked (e.g. email, password, personal info like date of birth, etc…). Recently Gmail has been exploited by attachement phishing.
There’s no guaranteed way to check if your account has been hacked but one way is to check if you’ve been pwned. Just enter your username or email to check if you’ve been pwned.
Pixels on your gadgets’ screens act as accidental antennae that constantly broadcast screens’ contents. A new paper says the industry needs to fix this security risk before hackers can exploit it.
This hack is possible because the internals of every computing device we own give off electromagnetic radiation. It leaks from the cables and circuitry that carry the display signal from the processor to the screen, and it’s even emitted by the screen pixels themselves. These pixels [Correct? Else what?] become accidental antennas that transmit the display signal into our surroundings—one that a would-be hacker could tune into.