The MIT License, Line by Line

The MIT License is the most popular open-source software
license. Here’s one read of it, line by line.

Read the License

If you’re involved in open-source software and haven’t taken the time
to read the license from top to bottom—it’s only 171 words—you need
to do so now. Especially if licenses aren’t your day-to-day. Make a
mental note of anything that seems off or unclear, and keep trucking.
I’ll repeat every word again, in chunks and in order, with context
and commentary. But it’s important to have the whole in mind.

The MIT License (MIT)

Copyright (c)

Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
“Software”), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to
the following conditions:


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/oqe_A8B9r6k/MIT-License-Line-by-Line.html

Original article

Massive Yahoo hack is the world’s biggest — for now

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn’t just admitting to a huge failing in data security — it was admitting to the biggest hack the world has ever seen.
Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the “Have I been pwned” website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.
And only three breaches had ranked above the 100 million level:
LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground “dark market” site.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3123421/security/massive-yahoo-hack-is-the-worlds-biggest-for-now.html#tk.rss_all

Original article

Verizon learned of massive Yahoo data breach just two days ago

Verizon, which is finalizing its $4.8 billion purchase of Yahoo, said late Thursday it was notified of the massive data breach at Yahoo only in the last two days.Verizon said it would evaluate what it will do next. In an emailed statement, the company acknowledged that it now has only “limited information and understanding of the impact” of the hack.Yahoo earlier in the day blamed the attack on a “state-sponsored actor”without further elaboration and said its ongoing investigation indicates that information from at least 500 million user accounts was stolen.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3123063/cybercrime-hacking/verizon-learned-of-massive-yahoo-data-breach-just-two-days-ago.html#tk.rss_all

Original article

Yahoo to confirm a historic hack affecting 200M users

caption
Yahoo CEO Marissa Mayer.
source
Getty/Kimberly White
Yahoo is
getting ready to confirm a huge, historic hack affecting 200
million users, Recode reports.

Back in August,
Motherboard’s Joseph Cox reported that 200 million apparent Yahoo
user credentials were being sold on the dark web. At the
time, the company’s response was only that it was “aware of [the]
claim.”

But now Kara Swisher, one of the tech industry’s most-respected
journalists, is reporting for Recode that Yahoo sources tell her
the company is preparing to publicly confirm its existence. (Her
sources did not confirm its exact size, only that it was
“widespread” and serious.”)

Yahoo did not immediately respond to Business Insider’s request
for comment.

Motherboard was told by the hacker who held the data (and was
selling it for 3 bitcoins, worth $1,860 at the time) that the
breach was back in


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/oxFK9llW4R4/yahoo-to-confirm-2012-hack-200-million-users-report-peace-2016-9

Original article

The Essence of the Blockchain

Here we attempt a simple explanation of the blockchain for a not overly technical audience.

1 Introduction
The blockchain is a testament to the power of a single cryptographic primitive — the hash function. Really nothing else is required, so if you can get your head around the hash function, you can understand the basics of the blockchain.
2 The Hash Function
A cryptographic hash function takes one input and calculates one output. For example for the input “We hold these truths to be self-evident”, the well known hash function SHA256 produces the output
84ba74b2661c87470665a1a5f5ab526afcf266f8c5effb795bef2d2514a8afd3
For the slightly different input “we hold these truths to be self-evident” (note the lower case w), the output is
246160c031a4ddd9d940e931721fdec7e72087c8eccf5ea5621bb15d22959c19
That tells us a few things about a hash function. The output bears no obvious relationship to the input, indeed it looks completely random. A tiny change to the input produces a completely different output. You will need to


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/yTLRQMc7SoI/the-essence-of-the-blockchain

Original article

The Ethereum network is currently undergoing a DoS attack

Posted by Jeffrey Wilcke
on September 22nd, 2016.

URGENT ALL MINERS: The network is under attack. The attack is a computational DDoS, ie. miners and nodes need to spend a very long time processing some blocks. This is due to the EXTCODESIZE opcode, which has a fairly low gasprice but which requires nodes to read state information from disk; the attack transactions are calling this opcode roughly 50,000 times per block. The consequence of this is that the network is greatly slowing down, but there is NO consensus failure or memory overload. We have currently identified several routes for a more sustainable medium-term fix and have developers working on implementation.
It is highly reccomended to switch to Parity mining. Use these settings:
–cache-size-db 1024 –gas-floor-target 1000000 –gasprice 50000000000
Parity mining guides:https://docs.google.com/document/d/1j3v8bKjXQcMNNdx5Juwo3PRRCcHy8XcA6R9-0W7NCso/edithttps://github.com/ethcore/parity/wiki/MiningIf you continue to use geth, use the following settings:
–cache 1024 –targetgaslimit 1000000 –gasprice 50000000000


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/fanval1rHuQ/

Original article

Yahoo reportedly to confirm massive data breach

Following reports that Yahoo will confirm a data breach that affects hundreds of millions of accounts, some users reported Thursday on Twitter and elsewhere that they were prompted to change their email password when trying to log in.
Yahoo launched an investigation into a possible breach in early August after someone offered to sell a data dump of more than 200 million Yahoo accounts on an underground market, including usernames, easy-to-crack password hashes, dates of birth and backup email addresses.
The company has since determined that the breach is real and that it’s worse than initially believed, news website Recode reported Thursday, citing unnamed sources familiar with the investigation.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3123149/security/yahoo-reportedly-to-confirm-massive-data-breach.html#tk.rss_all

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: