Search Results for: Expose
Printer malware: print a malicious document, expose your whole LAN: Holy cats, this is so not cool. As part of his presentation, he performed two demonstrations: in the first, he sent a document to a printer that contained a malicious version of the OS that caused it to copy the documents it printed and post [...]
Content structure is achieved at a variety of levels — structure within a property, structure withing a content object, structure between different content objects, etc.
Knowledge management requires you to ask some very basic question about how you plan to turn knowledge into content in which to be managed.
Exploring the software behind Facebook, the world’s largest site: Interesting details on how they make Facebook scale. Facebook still uses PHP, but it has built a compiler for it so it can be turned into native code on its web servers, thus boosting performance. […] Facebook uses Linux, but has optimized it for its own [...]
Why I switched from PHP to Python : Here’s the best description I’ve heard yet for why PHP is the way it is (emphasis mine). What makes PHP, as a language, awesome is also what makes it horrible to work with, which is that it’s not really a language, but rather a giant plugin architecture [...]
Here are a couple pages I’ve really enjoyed in the field of cognitive science — Top 10 Thinking Traps Exposed page explains things like the “Sunk Cost Trap”: You pre-ordered a non-refundable ticket to a basketball game. On the night of the game, you’re tired and there’s a blizzard raging outside. You regret the fact [...]
As content moves “beyond the web page,” we need to start handling it in such a way that it lends itself better to multi-channel publishing.
Threat Analysis & Modeling v2.1.2: If you have some time, consider taking a look at this free tool from Microsoft. Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. I spent about [...]
Content management systems should include an API for filtering a bucket of content, obtained through any means
Aussie exposes online poker rip-off: Write online poker software, leave a backdoor…profit! […] Michael Josem […] analysed detailed hand history data from Absolute Poker and UltimateBet and uncovered that certain player accounts won money at a rate too fast to be legitimate. His findings led to an internal investigation by the parent company that owns [...]