TP-LINK lost control of two domains used to configure routers and Wi-Fi extenders

One way that hardware vendors try to make the configuration of a router easier is by instructing users to browse to a domain name rather than an IP address. TP-LINK routers use either tplinklogin.net or tplinkwifi.net.The label on the back of a TP-LINK TL-WR841N routerThe image above is the back of an old TP-LINK router, the TL-WR841N, showing the instructions to use tplinklogin.net.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3090959/networking/tp-link-lost-control-of-two-domains-used-to-configure-routers-and-wi-fi-extenders.html#tk.rss_all

Original article

You’re doing DevOps wrong

 Gone are the days of the quarterly product release cycle. To meet the evolving expectations of today’s end user, software must continuously adapt. As a result, hyper-automation of the software development process has become the thing on which companies, regardless of industry, compete. From fledgling startups to enterprise heavyweights, business leaders are realizing that they need to… Read More


Original URL: http://feedproxy.google.com/~r/Techcrunch/~3/qMiTOJuV-b4/

Original article

A look at 10x paradigm

10x or not: You’ve got to do things rightYou must have heard about 10x programmers. If not, here’s a little introduction from Sean Cassidy10x developers are quasi-mythical programmers whose ability to design complex systems and hammer out production-ready code is legendary. Their impact on their project or team is felt for years after they stop contributing, and their contributions don’t stop there.This concept, myth, or whatever you choose to call it, has existed for years. And yes, there are people who are able to think ahead, solve complex problems and get a lot of stuff done. It is a good thing to have such person on your team, you can be pretty sure that stuff will be done no matter what. But problem begins when you have imposters or even worse, jerks posing as 10x people. They may be pretty good in programming and get through interviews easily, but that’s


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/NYaJ1G-x0bo/10x-or-not-youve-got-to-do-things-right-8e45311ecbcb

Original article

Wget Arbitrary Commands Execution

Vulnerability DescriptionA vulnerability in the way wget handles redirects allows attackers that are able to hijack a connection initiated by wget or compromise a server from which wget is downloading files from, would allow them to cause the user running wget to execute arbitrary commands. The commands are executed with the privileges with which wget is running. This could prove to be quite severe when wget is launched as ‘root’.

Vulnerable VersionWget version 1.17 and prior
IntroductionGNU Wget (including the latest version) when supplied with a malicious website link can be tricked into saving an arbitrary remote file supplied by an attacker, with arbitrary contents and filename under the current directory. This can lead to potential code execution by creating system scripts (such as .bash_profile and others) within home directory as well as other unauthorized actions (such as request sniffing by proxy modification, or arbitrary system file retrieval) by uploading .wgetrc configuration


Original URL: https://blogs.securiteam.com/index.php/archives/2701

Original article

The blockchain may impede creative reuse

Chaining cultureUC Berkeley LibraryRecently there’s been a surge of interest in applying blockchain models to issues in digital culture. But every upsurging technology — particularly those which are seductively elegant — produce inherent conflicts. There are potentially tremendous social costs to blockchain, and we need to consider them carefully. At a basic level, blockchain’s taking is the loss of ambiguity.At CC:Rewire, a Creative Commons event that I attended in San Francisco, Joi Ito noted that blockchain was at a very early stage of implementation. We’re at a point akin to our mid-1980s experimentation with networking communication protocols, such as FDDI, Token Ring and Ethernet. But blockchain’s inherent attractions, including high apparent reliability, verifiability, and durable provenance, are extremely alluring. Millions of investment dollars are pouring into application development. Blockchain frameworks, simplistically, create digital ledgers for transactions: what some have described as an ability to “redefine trust.” I believe that trust and culture are symbiotic:


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/i3OCxHO75hM/chaining-culture-c5422bb252ca

Original article

Implementing a fuzzy suggestion mechanism at Skroutz

Intro

Our Fuzzy Otto project is all about
improving the autocomplete functionality of our search
field, by providing suggestions for mistyped keyphrases.

The autocomplete functionality of Skroutz’s main search field is
probably the first interaction a user has with our web app.

About 22% of all searches in Skroutz come straight from the
autocomplete box and even more originally begin as
autocompletes and continue with further refinements.We hope to further increase its usage in the future.

Auto completion contributes to a pleasant user experience
[1] by
(hopefully) reducing the amount of characters one needs to type
before they can execute a search action – particularly so for
keyphrases we know to be popular.Its importance is even greater for mobile and touch devices where
typing is typically slower, harder and also more error-prone.

Autocomplete is available in Skroutz.gr, Alve.com, Scrooge.co.uk.

Our previous autocomplete implementation had proved its worth.It was helpful, fast and could employ advanced scoring based


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/TagfJtKkWYU/

Original article

Ruma, a Matrix homeserver written in Rust

What is Matrix?
Matrix is an open specification for an online communication protocol. It includes all the features you’d expect from a modern chat platform including instant messaging, group chats, audio and video calls, searchable message history, synchronization across all your devices, and end-to-end encryption. Matrix is federated, so no single company controls the system or your data. You can use an existing server you trust or run your own, and the servers synchronize messages seamlessly. Learn more in the Introduction to Matrix.

What is Rust?
Rust is a systems programming language from Mozilla built with safety, concurrency, and performance in mind. Its novel approach to memory safety and its rich type system make it an excellent choice for writing fast, reliable programs. Learn more at The Rust Programming Language.

What is Ruma?
Ruma is a Matrix homeserver written


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/PJq_nag5ez0/

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: