Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ryancdotorg
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ryancdotorg
-
Prikvačeni tweet
Much of hacking is about understanding systems better than those who built them, and using that knowledge to do what is supposed to be "impossible".
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Don't have good pictures, but I also have a second USB battery, ultra slim 3m HDMI cable, a few usb cables, HDMI adapters & usb hubs for both laptops, and a travel router.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It all fits nicely in the charging cable compartment of my new laptop backpack. It's much smaller than the previous ones I've had, which has required a bit more thoughtfulness about what I'm carrying.pic.twitter.com/WNnEdlHZ9c
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New international travel kit for my device charging needs. The key here is IEC C7/C8 cables and adapters, with a splitter to connect both the charger for my surface pro and the Anker USB-C (pixelbook) + 4x USB-A "desktop" charger to a single outlet.pic.twitter.com/TaHkMcgMsz
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ryan Castellucci proslijedio/la je Tweet
Calling all 60% keyboard users in the Seattle area. Send an email to media@kinesis.com if you'd like to test out our prototype at Kinesis HQ next week and provide feedback.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ryan Castellucci proslijedio/la je Tweet
You can buy a feed of all number ports happening in close to real time. [PortData Validate] is the magic phase to Google.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I know you can do a "location routing number" lookup to see what carrier is associated with a phone number, but running that regularly seems ridiculous. Note also that the LRN won't change in the case of a SIM swap, only a port.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I recently ported my cell number. None of the services that use it for auth seem to care, but within hours I got a text from CVS pharmacy saying "A recent change in your mobile service requires you to reply YES to continue receiving text alerts". I'm curious how that works.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
@Avvo I am also getting spam attempts at an email address created with you in 2017. Pretty sure you've been breached.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Oh, and a huge unexpected side benefit: this exercise is forcing me to learn to use gdb because "printf() debugging" isn't feasible.https://twitter.com/ryancdotorg/status/1218896134887870464 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The algorithms I'm using for this are not fast, but they're plenty fast enough to be run once in order to write a table to memory for future use.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I think maybe I can consolidate the code to do both the square and cube roots by binary search, but the FPU code is small enough it may not reduce overall size.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
General approach: 1) Generate the first 64 primes by starting with 2, then increment and do trial division. 2) Calculate square root of P and multiply by 2^40 in the FPU, then extract the needed bits. 3) Binary search for largest values N where N^3 < P*2^96
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
For SHA256, there are 288 bytes of constants - the first 32 bits of the fractional parts of the square roots of the first 8 primes, and the first 32 bits of the fractional parts of the cube roots of the first 64 primes. So far, am able to generate that in 176 bytes.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'm learning x86 assembly by implementing cryptographic algorithms using as few bytes of machine code as I can. Tweeted my SipHash code about a week ago, then got a fixed parameter finite field Diffie-Hellman done a few days ago. Working on SHA256 now.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I miss the days when "expertsexhange" was the search engine problem folks complained about.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I would be thrilled to pay like $50/mo for access to a good search engine. The combination of over optimizing for ad revenue, emphasizing "do what I mean" over control for power users and the war with SEO spammers is just awful.https://twitter.com/SarahJamieLewis/status/1218357255919112192 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Attacks only get better. Sometimes quickly.https://twitter.com/saleemrash1d/status/1218072079762894848 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
WTF is going on here? Also,
@Avvo, your customer data appears to have leaked. https://pastebin.com/raw/UFYUtrguPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is disgusting but amazing.https://twitter.com/jedisct1/status/1217454553236373505 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ryan Castellucci proslijedio/la je Tweet
"By exploiting this vuln, an attacker may be able to spoof a valid X.509 certificate chain on a vulnerable Windows system. This may allow various actions including, but not limited to, interception/modification of TLS-encrypted communications or spoofing an Authenticode signature
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.