TechNews
When I come accross interesting TechNews, you can find it here.
My goal is to share a mix of interesting Tech-related readings. Covering Core, Infra, Apps, Geeky, PiProjects, NerdAlert, … and shuffle them around from time to time.
Ideas and suggestions?
Drop me a note.
How to Secure Your Website and Online Database from Hackers in 2020
The 2016 US election cycle made international hacking part of the global conversation. Hacking is now one of the most widely discussed threats across all professional sectors. While Russian hacking dominated the political sphere, Chinese hacking is proving to be the biggest threat to corporations.
Emotional intelligence: 5 ways to handle criticism
It’s happened to all of us. You’ve slaved over something – a presentation, a design, a product concept, you name it – only to have someone say you’ve overlooked a critical flaw or a better solution. It’s even worse when that person is someone you respect, or maybe someone you’re supposed to lead.
Sudo? More like Su-doh: There’s a fun bug that gives restricted sudoers root access (if your config is non-standard)
It’s only Monday, and we already have a contender for the bug of the week. Linux users who are able to run commands as other users, via the sudoer mechanism, though not as the all-powerful root user, can still run commands as root, thanks to a fascinating coding screw-up.
7 Bash history shortcuts you will actually use
Most guides to Bash history shortcuts exhaustively list every single one available. The problem with that is I would use a shortcut once, then glaze over as I tried out all the possibilities. Then I’d move onto my working day and completely forget them, retaining only the well-known !!
Any finger will do? Samsung Galaxy S10 with a screen protector reportedly easy to fool
Samsung is investigating a critical issue with its Galaxy S10 and Note 10 smartphones after reports that it fails to discriminate between different fingerprints if a screen protector is fitted. The Galaxy S10 features what Samsung calls “a revolutionary new biometric authentication feature…
Facebook is funding brain experiments to create a device that reads your mind
In 2017, Facebook announced that it wanted to create a headband that would let people type at a speed of 100 words per minute, just by thinking. Now, a little over two years later, the social-media giant is revealing that it has been financing extensive university research on human volunteers.
Asco blijft worstelen met cyberaanval: ‘Dit is een economische moordpoging’
Fabrikant vliegtuigonderdelen al drie weken plat na cyberaanval Het Zaventemse Asco levert al vier weken een bijna heroïsche strijd tegen hackers die hen nagenoeg volledig stilgelegd hebben. De veiligheidsdiensten volgen de zaak met een vergrootglas op. ‘Dit is een economische moordpoging.
Langer Karp Breakthrough Hearing
Frequency Therapeutics: Fundamentally changing how noise-induced hearing loss is understood and treated.
Find out more here.
The mysterious history of the MIT License
Recently, David Humphrey posed a seemingly straightforward question on Twitter. When was the MIT License created? I can’t find any source that gives a year. – David Humphrey (@humphd) April 1, 2019 I say “seemingly straightforward” because the MIT License is one of the most popular licenses used by open source software.
Bots and botnets in 2018
Due to the wide media coverage botnets activities have become largely associated with DDoS attacks. Yet this is merely the tip of the iceberg, and botnets are used widely not only to carry out DDoS attacks, but to steal various user information.
Krijgen we het werk van algoritmes nog wel uitgelegd?
Algoritmes zullen bepalen of u verzekerd wordt en met wie u op date gaat. Maar het gevaar van een ‘black box’ loert om de hoek. De algoritmes beslissen, maar we weten niet meer waarom. ‘Er moeten mechanismen zijn om algoritmes, en wat ze produceren, ter verantwoording te roepen.’
A beginner’s guide to building DevOps pipelines with open source tools
DevOps has become the default answer to fixing software development processes that are slow, siloed, or otherwise dysfunctional. This article explores what a DevOps pipeline is and offers a five-step process to create one.
IKEA start verspreiding update voor HomeKit-ondersteuning Trådfri-stopcontacten
IKEA is begonnen met de distributie van de update die ondersteuning voor Apples HomeKit toevoegt aan de Trådfri Verbindingshub voor slimme stopcontacten. Per direct is de update verkrijgbaar in de VS; de rest van de wereld volgt volgende week. IKEA bevestigt de komst van de update op Reddit, met een verontschuldiging dat de release zo lang op zich liet wachten.
There’s No Good Reason to Trust Blockchain Technology.
In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: “We have proposed a system for electronic transactions without relying on trust.” He was referring to blockchain, the system behind bitcoin cryptocurrency. The circumvention of trust is a great promise, but it’s just not true.
Docker meldt dat gegevens van 190.000 Hub-gebruikers mogelijk zijn gestolen
Docker heeft te kennen gegeven dat hackers mogelijk een database hebben binnengedrongen, waarbij zij toegang hebben gekregen tot gebruikersgegevens. Daarbij denkt het bedrijf dat er ongeveer 190.000 klanten zijn getroffen. Volgens de loggegevens van Docker is er op 25 april ongeoorloofde toegang geweest tot een database van Hub, waarbij het bedrijf naar eigen zeggen ‘niet-financiële’ data heeft opgeslagen.
Internet Relay Chat.
Good memories to cherish!!! Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model. IRC clients are computer programs that users can install on their system or web based applications running either locally in the browser or on 3rd party server.
Use an 8-char Windows NTLM password? Don’t. Every single one can be cracked in under 2.5hrs
HashCat, an open source password recovery tool, can now crack an eight-character Windows NTLM password hash in less time than it will take to watch Avengers: Endgame. In 2011 security researcher Steven Myer demonstrated that an eight-character (53-bit) password could be brute forced in 44 days, or in 14 seconds if you use a GPU and rainbow tables – pre-computed tables for reversing hash functions.
DevOps transformation: Key differences in small, midsize, and large organizations
The continuous innovation journey to DevOps is just that-continuous-meaning it’s unlikely you’ll ever reach the destination. At the core, it is people and their culture, not an organization’s size, that molds and differentiates organizations from one other.
How to Make Your iPhone Black and White (And Why You Should)
So, I tried this for a day. Yes, I have to say, it does work: it felt better for my eyes, it made my phone less distracting and the need to check my phone every 5 minutes fell sharply. However, the major downside to it and the very reason I reverted to coloured settings are photo’s. They end up in black and white too. Bummer.
Rotsen in de Noordzee kunnen dienen als gigantische natuurlijke batterij
Ingenieurs en aardrijkskundigen van de Universiteiten van Edinburgh en Strathclyde in Glasgow onderzochten of rotsen in en op de zeebodem daarvoor kunnen gebruikt worden. in de poreuze zandsteen kan onder hoge druk perslucht gepompt worden, een techniek die “Compressed Air Energy Storage” of CAES genoemd wordt.
DIY 30km/h Electric Skateboard – Raspberry Pi and Wiimote powered
Over the summer, I made my own electric skateboard using a £4 Raspberry Pi Zero. Controlled with a Nintendo Wiimote, capable of going 30km/h, and with a range of over 10km, this project has been pretty darn fun. In this video, you see me racing around Cambridge and I explain the ins and outs of this project.
Shell-o world: Turtle graphics in Python
Turtle graphics is a popular way to introduce young learners to programing. It was part of the original Logo programming language, which, according to Wikipedia, is an educational programming language Seymour Papert and others designed in 1967. I first encountered Logo as a graduate student in education.
Nyrstar slachtoffer van cyberaanval
Het zit Nyrstar echt niet mee: maandag kreeg de zinkverwerker de zoveelste opdoffer op de beurs. Dinsdag legden criminelen het IT-systeem van de groep plat na een cyberaanval. Als gevolg van die plotse aanval kon er niet langer worden ge-emaild vanuit het hoofkantoor in het Zwitserse Zürich, gaf Nyrstar gisteravond mee in een persbericht.
What Is Two-Factor Authentication (2FA)? – Authy
Before addressing the question ‘ what is two-factor authentication ‘ or ‘ what is 2FA ,’ let’s consider why it’s important to do everything you can to improve your online account security . With so much of our lives happening on mobile devices and laptops, it’s no wonder our digital accounts have become a magnet for criminals.
World’s first robot hotel massacres half of its robot staff
Rise of the Machines™ The world’s first hotel “staffed by robots” has culled half of its steely eyed employees, because they’re rubbish and annoy the guests. “Our hotel’s advanced technologies, introduced with the aim of maximizing efficiency, also add to the fun and comfort of your stay,” the Henn na Hotel boasted on its website.
DuckDuckGo gebruikt Apple Maps in zoekresultaten
De privacyvriendelijke zoekmachine DuckDuckGo heeft plattegronden van Apple Maps geïntegreerd. Bepaalde zoekresultaten tonen relevante locaties, zonder dat de privacy van gebruikers in het geding zou zijn. DuckDuckGo claimt een van de eerste wereldwijde bedrijven te zijn die de Apple MapKit JS gebruikt. “We kunnen gebruikers nu verbeterde adresresultaten, visuele weergaven, satellietbeelden en actuele plattegronden bieden”, aldus de zoekdienst.
Apples AirPower draadloze lader toch op komst? – c’t
Apple kondigde in 2017 de AirPower draadloze lader aan. Een release in 2018 lukte niet, maar nu lijkt het erop dat de lader in productie is genomen. ChargerLAB meldde in een tweet dat de Chinese fabrikant Luxshare Precision is gestart met de productie van de AirPower.
Getting started with Pelican: A Python-based static site generator
Pelican is a great choice for Python users who want to self-host a simple website or blog.
De beste Docker containers – c’t
Het vinden van goede Docker containers valt niet mee. Het aanbod is bijna oneindig en vaak lossen ze alleen een deel van een probleem op. We hebben een selectie van images samengesteld waarvan we denken dat ze goed doordacht zijn, goed onderhouden worden en veel werk kunnen besparen.
Hot sysadmin reads for the new year
Archit Modi – OpenStack enthusiast. Linux and Networking guy. Currently working as a Software Test Engineer at Red Hat, involved in Nova project- OpenStack. Just trying to give my two cents in this billion-trillion dollar “Open Source” world.



