Digests » 240
this week's favorite
Recently I took a look at Atom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution.
In this post, I’ll describe the engineering practice of keeping a logbook, and show how it can be applied to programming work.
I used natural language processing techniques to analyze net neutrality comments submitted to the FCC from April-October 2017, and the results were disturbing.
By tracking latency at different levels we figured one particular PostgreSQL query was taking 20 sec to finish. This was a surprise for us, as both tables have indexes on the joined column.
In case you haven't heard the news there is a massive security flaw which affects the latest version of macOS (High Sierra). Essentially, bug allows anybody to log into the root account with a blank, or password of their choosing.
Join over 15,500 readers for a free weekly email with fresh news, articles and tutorials.