Sabitlenmiş Tweet
Akendo
3K posts

Akendo retweetledi
Akendo retweetledi

Observe the ones around you. Do they have True Ownership? blog.alexewerlof.com/p/broken-owner…
English
Akendo retweetledi

Akendo retweetledi
Akendo retweetledi
Akendo retweetledi
Akendo retweetledi

Good morning with good news: Renewables generated 95% of Portugal's electricity in April! Wow!
That compares to 76.5% in April 2023, 66.8% in April 2022 and 56.1% in April 2021.
Wind was 31%, solar nearly 12%, hydro 45% and bioenergy 7%!
Data from: ember-climate.org

English
Akendo retweetledi

Python was too hard so I've switched to C++.
Here's my first "Hello World"!

Gynvael Coldwind@gynvael
My first program in Python! I still find this syntax a bit confusing with no { } etc. def main( line0: print("Hello World!"), line1: print("What's your name?"), line2: (x := input("Name plz: ")), line3: print(f"Your name is: {x}") ): pass
English
Akendo retweetledi
Akendo retweetledi
Akendo retweetledi

When I look at this table, the first thing I see is that size matters more
I reckon users prefer being told: „use a password with at least 10 letters“ instead of „use at least 8 characters, lower and upper case letters, numbers and symbols“
hivesystems.com/blog/are-your-…

English
Akendo retweetledi

This type of AI abuse will be used by threat actors ASAP.
Does your security team have a playbook for identifying, countering and mitigating this from targeting your users and execs?
Implement secret phrases or secret physical items that can be used to verify identity.
Prakash@8teAPi
This is AI It’s so over
English
Akendo retweetledi
Akendo retweetledi
Akendo retweetledi

> Data Structures for Data-Intensive Applications: Tradeoffs and Design Guidelines
New book dropped
(And the full PDF is available too I guess)
cs-people.bu.edu/mathan/publica…

English
Akendo retweetledi

Time spent making this image: 2 minutes
Time spent explaining the joke to my wife: 8 minutes

Jarred Sumner@jarredsumner
@awesomekling you can fit so much stuff in the unused bits within a 64 bit pointer
English
Akendo retweetledi

Interesting new Docker vulns and escapes that might be accessible from malicious containers during build:
CVE-2024-21626: vulnerability in runc with race condition in WORKDIR instruction, enabling container breakout and root RCE by manipulating file descriptors to access the host's filesystem, affecting both docker build and docker run.
CVE-2024-23651: TOCTOU vulnerability in --mount=cache flag during a RUN command allows a symlink to bind mount, an a root host RCE, during docker build.
CVE-2024-23653: Inadequate validation of the StartRequest.SecurityMode in custom Buildkit LLB generators, permitting creation of privileged container resulting in host root RCE during docker build.
CVE-2024-23652: Arbitrary during build when RUN --mount is used; if the mount's target path is altered to a symlink, can delete host directories during docker build
snyk.io/blog/leaky-ves…
English

















