#programacao #pr1v8
The RedMonk Programming Language Rankings: January 2017
» https://redmonk.com/sogrady/2017/03/17/language-rankings-1-17/
🌐 @PR1V8
The RedMonk Programming Language Rankings: January 2017
» https://redmonk.com/sogrady/2017/03/17/language-rankings-1-17/
🌐 @PR1V8
tecosystems
The RedMonk Programming Language Rankings: January 2017
After clearing a series of obstacles – some mundane and irrelevant, others much less so – it’s time to publish our bi-annual RedMonk Programming Language Rankings. As many are aware, these rankings are a continuation of the original work that Drew Conway…
#github #pr1v8 #motherboard
GitHub Uses Broken Cryptography, But It Has a Plan
» https://motherboard.vice.com/en_us/article/github-uses-broken-encryption-but-it-has-a-plan
🌐 @PR1V8
GitHub Uses Broken Cryptography, But It Has a Plan
» https://motherboard.vice.com/en_us/article/github-uses-broken-encryption-but-it-has-a-plan
🌐 @PR1V8
Motherboard
GitHub Uses Broken Encryption, But It Has a Plan - Motherboard
SHA-1 rears its ugly head.
#motherboard #pr1v8 #espionagem
Como funciona o mercado brasileiro de ferramentas espiãs para celular
» https://motherboard.vice.com/pt_br/article/como-funciona-o-mercado-brasileiro-de-ferramentas-espias-para-celular
🌐 @PR1V8
Como funciona o mercado brasileiro de ferramentas espiãs para celular
» https://motherboard.vice.com/pt_br/article/como-funciona-o-mercado-brasileiro-de-ferramentas-espias-para-celular
🌐 @PR1V8
Motherboard
Como funciona o mercado brasileiro de ferramentas espiãs para celular
Com muita publicidade, vendedores comercializam produtos que passam conversas, dados e ligações de qualquer um em tempo real.
#hacking #vault7 #cia
Programa da cia para obter acesso aparelhos com Mac OS a nível de firmware.
🌐@pr1v8
http://www.hacking.land/2017/03/dark-matter-programa-de-la-cia-para.html?utm_source=dlvr.it&utm_medium=facebook&m=1
Programa da cia para obter acesso aparelhos com Mac OS a nível de firmware.
🌐@pr1v8
http://www.hacking.land/2017/03/dark-matter-programa-de-la-cia-para.html?utm_source=dlvr.it&utm_medium=facebook&m=1
www.hacking.land
Dark Matter: programa de la CIA para infectar Mac a nivel de firmware
¿Recuerdan cuándo todo se hackeaba con Telnet y una IP? Pues bueno, hoy no...
#vault7 #cia #pr1v8
Wikileaks Reveals How CIA Was Hacking Your iPhones And MacBooks
» http://thehackernews.com/2017/03/wikileaks-cia-mac-iphone-hacking.html
🌐 @PR1V8
Wikileaks Reveals How CIA Was Hacking Your iPhones And MacBooks
» http://thehackernews.com/2017/03/wikileaks-cia-mac-iphone-hacking.html
🌐 @PR1V8
#pr1v8 #china #trojan
Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
» http://thehackernews.com/2017/03/rogue-bts-android-malware.html
🌐 @PR1V8
Hackers Using Fake Cellphone Towers to Spread Android Banking Trojan
» http://thehackernews.com/2017/03/rogue-bts-android-malware.html
🌐 @PR1V8
#ssd #secure #pr1v8
Cómo borrar datos de un SSD de manera segura
» http://www.hacking.land/2017/03/c-borrar-datos-de-un-ssd-de-manera.html
🌐 @PR1V8
Cómo borrar datos de un SSD de manera segura
» http://www.hacking.land/2017/03/c-borrar-datos-de-un-ssd-de-manera.html
🌐 @PR1V8
www.hacking.land
Cómo borrar datos de un SSD de manera segura
Cuando eliminamos un archivo de una unidad de almacenamiento, lo que en realidad estamos haciendo es decirle al ordenador que esos bits que...
#News #Rules #Privacy #ISPs
Senado dos EUA vota 50-48 para acabar com as regras de privacidade de banda larga; Deixando os ISPs de telecomunicações para vender seu historico da internet.
https://www.privateinternetaccess.com/blog/2017/03/us-senate-votes-50-48-away-broadband-privacy-rules-let-isps-telecoms-sell-internet-history
@pr1v8
Senado dos EUA vota 50-48 para acabar com as regras de privacidade de banda larga; Deixando os ISPs de telecomunicações para vender seu historico da internet.
https://www.privateinternetaccess.com/blog/2017/03/us-senate-votes-50-48-away-broadband-privacy-rules-let-isps-telecoms-sell-internet-history
@pr1v8
Privacy Online News
US Senate votes 50-48 to do away with broadband privacy rules; let ISPs and telecoms to sell your internet history | Privacy Online…
Despite widespread disapproval from constituents, S.J.Res 34 has passed the United States Senate with a vote of 50-48, with two absent votes. Earlier today, at 12:25 Eastern March 23, 2017, the US Senate voted on S.J.Res 34, and will use the Congressional…
#filosofia #pr1v8 #livros
Nietzsche e Schopenhauer - 39 livros em PDF
» https://filosofandoporaiblog.wordpress.com/2017/03/24/nietzsche-e-schopenhauer-bibliografia-em-pdf-39-livros-para-download/
🌐 @PR1V8
Nietzsche e Schopenhauer - 39 livros em PDF
» https://filosofandoporaiblog.wordpress.com/2017/03/24/nietzsche-e-schopenhauer-bibliografia-em-pdf-39-livros-para-download/
🌐 @PR1V8
#podcast #security
Lista de alguns dos melhores podcasts, em inglês, sobre segurança da informação
http://resources.infosecinstitute.com/best-security-podcasts/#gref
@PR1V8
Lista de alguns dos melhores podcasts, em inglês, sobre segurança da informação
http://resources.infosecinstitute.com/best-security-podcasts/#gref
@PR1V8
Infosec Resources
Best Security Podcasts
One of the most important aspects of security is staying up to date with trends, best practices and current events. News sites and Twitter are great ways
#Hacking #Iphone
Cibercriminosos podem estar certos: iPhones devem ser apagados em breve
Caso você não se lembre, um grupo de hackers black hat identificado como Turkish Crime Family está tentando extorquir a Apple: eles reivindicam acesso ao cache do iCloud e 300 milhões de contas de email Apple e pedem US$ 75 mil em Bitcoins ou Ethereum para não apagar o conteúdo dos serviços.
https://www.tecmundo.com.br/ataque-hacker/115269-hackers-turcos-certos-iphones-devem-apagados.htm
🌐 @PR1V8
Cibercriminosos podem estar certos: iPhones devem ser apagados em breve
Caso você não se lembre, um grupo de hackers black hat identificado como Turkish Crime Family está tentando extorquir a Apple: eles reivindicam acesso ao cache do iCloud e 300 milhões de contas de email Apple e pedem US$ 75 mil em Bitcoins ou Ethereum para não apagar o conteúdo dos serviços.
https://www.tecmundo.com.br/ataque-hacker/115269-hackers-turcos-certos-iphones-devem-apagados.htm
🌐 @PR1V8
TecMundo - Descubra e aprenda tudo sobre tecnologia
Cibercriminosos podem estar certos: iPhones devem ser apagados em breve
Todos os iPhones poderão ter o conteúdo apagado? Não, mas tudo indica que alguns aparelhos poderão sofrer no dia 7 de abril
Forwarded from .: PR1V8 :.
#ebook #docker #casa_do_codigo
"Containers com docker do desenvolvimento à produção", feito por Daniel Romero.
🌐 @pr1v8
"Containers com docker do desenvolvimento à produção", feito por Daniel Romero.
🌐 @pr1v8
#cyberpunk #media
/cyb/ - The Cyberpunk General
>IRC: #/g/punk on irc.rizon.net
>TOX: #/g/punk TOX groupchat; add the following [code]B2074450B92DAC83964363EC52F9700BB9E7B330958509BBD795980C8D1A73308354F6F36659[/code] and message "invite"
»> News «<
Healthy reminder that cyberpunk is now and that one should start living it instead of fantasizing like some cyberhipster
http://www.antipope.org/charlie/blog-static/2013/12/psa-why-there-wont-be-a-third-.html
>Latest news from the spit jockeys
No one updates it, read thread instead.
»> Finding out more «<
http://jinteki.industries/
http://tracerneo.eu.org/cyb/
https://wiki.installgentoo.com/Cyberpunk
Linux For Beginners, Nackt's Cyberpunk Tech & Library: http://tracerneo.eu.org/cyb/textfiles/
Archive: https://archive.rebeccablacktech.com/g/?task=search2&search_subject=Cyberpunk&search_op=op
» Contains:
Circumventing surveillance, in meatspace
Encrypting your communications on the grid
Search engines that respect your freedoms
Mesh network technology
Build your own GSM network
Things for your smartphone
BBS
Public UNIX systems
Required reading
Cybermedia
Etc.
»creditos: @xXx0xXx0Xx0x
🌐 @pr1v8
/cyb/ - The Cyberpunk General
>IRC: #/g/punk on irc.rizon.net
>TOX: #/g/punk TOX groupchat; add the following [code]B2074450B92DAC83964363EC52F9700BB9E7B330958509BBD795980C8D1A73308354F6F36659[/code] and message "invite"
»> News «<
Healthy reminder that cyberpunk is now and that one should start living it instead of fantasizing like some cyberhipster
http://www.antipope.org/charlie/blog-static/2013/12/psa-why-there-wont-be-a-third-.html
>Latest news from the spit jockeys
No one updates it, read thread instead.
»> Finding out more «<
http://jinteki.industries/
http://tracerneo.eu.org/cyb/
https://wiki.installgentoo.com/Cyberpunk
Linux For Beginners, Nackt's Cyberpunk Tech & Library: http://tracerneo.eu.org/cyb/textfiles/
Archive: https://archive.rebeccablacktech.com/g/?task=search2&search_subject=Cyberpunk&search_op=op
» Contains:
Circumventing surveillance, in meatspace
Encrypting your communications on the grid
Search engines that respect your freedoms
Mesh network technology
Build your own GSM network
Things for your smartphone
BBS
Public UNIX systems
Required reading
Cybermedia
Etc.
»creditos: @xXx0xXx0Xx0x
🌐 @pr1v8
#Hangout
Hangout dia 28 de Março (Amanhã) as 22:00 horário de Brasília, com Jullio Della Flora.
Tema:
Gadgets Malignos para "Hackers do Bem"
https://www.youtube.com/watch?v=FhwLZ6cSai8
🌐 @PR1V8
Hangout dia 28 de Março (Amanhã) as 22:00 horário de Brasília, com Jullio Della Flora.
Tema:
Gadgets Malignos para "Hackers do Bem"
https://www.youtube.com/watch?v=FhwLZ6cSai8
🌐 @PR1V8