New Kernel Exploit: Bypassing the modprobe_path Patch with AF_ALG

2025-03-19
New Kernel Exploit: Bypassing the modprobe_path Patch with AF_ALG

This security research blog post details a novel method for exploiting the modprobe_path technique, circumventing a patch merged into the Upstream kernel last year. This patch rendered the previous method of triggering modprobe_path by executing dummy files ineffective. The new method leverages AF_ALG sockets. By calling bind(), it triggers request_module(), allowing execution of the file pointed to by modprobe_path, achieving privilege escalation. Combined with lau's memfd_create() technique, this results in a completely fileless exploit, reducing the chance of detection. The patch hasn't yet reached stable kernel releases, so the older method still works; however, the AF_ALG method will be crucial in the future.

Read more
Development

Burrows-Wheeler Transform: Unlocking Efficient Data Compression

2025-02-01

The Burrows-Wheeler Transform (BWT) is a clever data compression algorithm that rearranges a character string to create runs of similar characters, making it easier to compress using techniques like run-length encoding. Imagine shuffling a text to create many consecutive 'the's – much easier to compress! BWT sorts all cyclic shifts of the string and extracts the last column. Remarkably, this transformation is reversible without needing extra data. Used in bzip2 and other compression tools, BWT also finds applications in genomics, image compression, and more. Its efficiency is further enhanced by algorithms that update the transform quickly after text edits, minimizing computational overhead.

Read more

Google Sunsets Nest Protect and Nest x Yale Lock, Partners with Third-Parties

2025-03-30
Google Sunsets Nest Protect and Nest x Yale Lock, Partners with Third-Parties

Google announced it's discontinuing the Nest Protect smoke alarm and Nest x Yale smart lock, ending its manufacturing in these categories. While exiting these hardware markets, Google is partnering with First Alert and Yale to offer replacements. The First Alert SC5 smoke alarm will succeed the Nest Protect, while the Yale Smart Lock with Matter supports the Matter protocol, integrating with Google Home, Alexa, and Apple Home. Although existing products will continue to function, users are encouraged to replace the Nest Protect due to its CO sensor's 10-year lifespan. This signifies a shift in Google's smart home strategy, focusing on software and platform partnerships.

Read more
Tech

Critical Cache Poisoning Vulnerability in Dnsmasq: Single Character Attack

2025-08-19

Researchers from Tsinghua University and Nankai University discovered a critical cache poisoning vulnerability (SHAR attack) in the Dnsmasq DNS software. Attackers can inject malicious DNS records by using a single special character, bypassing Dnsmasq's defenses. This vulnerability exploits the silent handling of queries containing special characters by some upstream recursive resolvers, creating a large attack window for brute-forcing TxID and source port. The success rate is 100%, affecting all Dnsmasq versions. Mitigation includes detecting silent upstream resolvers and implementing rate limiting and spoof detection.

Read more

Tmux Mastery: Essential Commands for Terminal Efficiency

2025-03-05

Tmux is a powerful tool for managing multiple terminal sessions and layouts. This guide covers essential Tmux commands and concepts, including session management (creation, detachment, reattachment), window and pane manipulation (creation, switching, renaming, splitting, zooming), and keyboard shortcuts. Even with just a handful of commands, you'll significantly boost your daily workflow. Say goodbye to tedious terminal switching and embrace the efficiency of Tmux!

Read more

Parasitic Worms Manipulate Praying Mantises to Their Deaths on Asphalt

2025-01-04
Parasitic Worms Manipulate Praying Mantises to Their Deaths on Asphalt

Researchers from Kyoto University have discovered that a parasitic horsehair worm manipulates praying mantises into walking onto asphalt roads, leading to their demise. The worm, which lives inside the mantis, causes it to mistake the reflective properties of asphalt for water. Experiments showed infected mantises are attracted to horizontally polarized light, similar to that reflected by water surfaces. This research highlights the cunning survival strategies of parasites and the unintended consequences of human activity on ecosystems. The findings were published in PNAS Nexus.

Read more

Real-time Hand Gesture & Voice Control for 3D Models

2025-06-03
Real-time Hand Gesture & Voice Control for 3D Models

Control 3D models in real-time using only your hands and voice! This interactive web app leverages three.js, MediaPipe computer vision, the Web Speech API, and Rosebud AI. You can drag, rotate, scale, and animate models, and import your own GLTF models by drag-and-drop. All you need is a modern WebGL-enabled browser, camera and microphone access. Clone the repo and experience the magic!

Read more
Development

Lost in Love: A Generative Art Maze Based on Names

2025-02-14
Lost in Love: A Generative Art Maze Based on Names

Bèr Kessels' "Lost in Love" is a generative art project that creates a unique maze based on two names provided by the user. Using a recursive backtracking algorithm, the project animates the maze generation process. The maze's design is determined by randomness seeded from the names, offering no customization options. The aim is to create unique artwork based solely on the two names. The code is open-source and available on GitHub.

Read more

Llama from Scratch: A Practical Guide (Without the Tears)

2025-05-19
Llama from Scratch: A Practical Guide (Without the Tears)

This blog post meticulously documents the author's journey in implementing a scaled-down version of the Llama language model from scratch, training it on the TinyShakespeare dataset. Employing an iterative approach, the author progressively implements key components like RMSNorm, Rotary Positional Embeddings (RoPE), and the SwiGLU activation function, rigorously testing and visualizing each part to ensure correctness. The post emphasizes the importance of iterative development and shares numerous debugging techniques, such as tensor shape checks, assertions, and visualization tools, providing invaluable practical experience. The author successfully trains a model capable of generating Shakespearean-style text and evaluates its performance.

Read more
Development model implementation

Page Objects: Making Your UI Tests Less Brittle

2025-09-15
Page Objects: Making Your UI Tests Less Brittle

Testing web pages requires interacting with elements, but directly manipulating HTML makes tests fragile. Page Objects solve this by encapsulating a page or fragment as an application-specific API. This allows interacting with elements without directly accessing HTML. The goal is to mimic user actions, providing a clean interface that hides underlying widgets. Text fields use string accessors, checkboxes booleans, and buttons action-oriented methods. Good Page Objects model the user's perspective, not the UI's internal structure, returning basic data types or other Page Objects. There's debate on including assertions within Page Objects. The author prefers keeping assertions in test scripts, avoiding bloated Page Objects and using assertion libraries to reduce redundancy. This pattern works across various UI technologies, useful not just for testing but also as a scripting interface for applications.

Read more
Development Page Objects

Ozempic Shows Remarkable Anti-Aging Effects in Clinical Trial

2025-08-06
Ozempic Shows Remarkable Anti-Aging Effects in Clinical Trial

A clinical trial has revealed that the diabetes drug Ozempic (semaglutide) demonstrates significant anti-aging effects. In a 32-week study involving patients with HIV-associated lipohypertrophy, participants receiving Ozempic became an average of 3.1 years biologically younger. Researchers used epigenetic clocks to measure biological age, finding that Ozempic slowed and even reversed biological aging, particularly in the inflammatory system and brain. The anti-aging properties are believed to stem from Ozempic's impact on fat distribution and metabolic health. While the study focused on a specific population, the findings suggest potential benefits for a broader population. Further research is needed to confirm these effects in larger, more diverse groups.

Read more

Remembering Duane Blehm: A Pioneer of Mac Shareware

2025-03-05

This article tells the story of Duane Blehm, an early Macintosh shareware game developer in the 1980s. The author, a fellow developer influenced by Blehm, reminisces about Blehm's classic games, *Stunt Copter* and *Cairo Shootout*, and their unique place in the early Macintosh ecosystem. Blehm's games were known for their simple graphics, clever mouse controls, and non-violent gameplay, reflecting the minimalist aesthetic of the early Mac. The article also recounts the author's poignant interactions with Blehm, including a heartbreaking discovery of Blehm's death and a later heartwarming reunion with his source code, which the author ultimately shared with the world. It's a tribute not only to a talented programmer but also to the unique game culture of the early Macintosh era.

Read more
Game

Chinese Scientists Develop Revolutionary Battery Repair Tech, Extending Lifespan Sixfold

2025-02-18
Chinese Scientists Develop Revolutionary Battery Repair Tech, Extending Lifespan Sixfold

Chinese scientists have unveiled a groundbreaking, low-cost, and eco-friendly repair technology for lithium-ion batteries, capable of extending their lifespan by over six times. Published in Nature, the research details an injection solution that rejuvenates aging batteries, countering efficiency loss in cold temperatures. This technology promises a significant leap forward for smartphones, electric vehicles, and other modern technologies, with market readiness anticipated soon.

Read more

Senior Devs Embrace AI Code Generation, But at What Cost?

2025-09-07
Senior Devs Embrace AI Code Generation, But at What Cost?

A Fastly survey reveals that over half the shipped code of nearly a third of senior developers (10+ years experience) is AI-generated, compared to just 13% of junior developers. While AI tools boost productivity, nearly one-third of all respondents reported frequently fixing AI-generated code, offsetting time savings. This suggests that while experienced developers trust AI more in production, human oversight remains crucial to ensure code quality and security.

Read more
Development

A Blast from the Past: Exploring Vintage Optical Media from Japan

2025-04-02
A Blast from the Past: Exploring Vintage Optical Media from Japan

The author documents their journey collecting vintage optical media from Japan, both online and in person. The article details several brands of DVDs and CDs, including TDK, LG, Sony, Maxell, Mitsubishi, and Fujifilm, testing their performance across various metrics. Tests included burn speeds, read speeds, error rates, and physical characteristics. TDK's UV-protected discs performed exceptionally well, while an older Maxell CD-R showed signs of age-related degradation. The experience is a nostalgic trip down memory lane, showcasing the evolution of optical media technology and manufacturing across different eras and brands.

Read more

Critical Security Alert: Gravity Forms Plugin Supply Chain Attack

2025-07-12
Critical Security Alert: Gravity Forms Plugin Supply Chain Attack

Security researchers have uncovered a supply chain attack targeting the Gravity Forms WordPress plugin, with malicious code embedded in version 2.9.12. The attackers used backdoor functions, `update_entry_detail` and `list_sections`, to steal website information, create administrator accounts, and execute arbitrary code. The malicious code has been removed from the official download, and version 2.9.13 has been released. All Gravity Forms users are urged to update immediately and check their servers for malicious files and network requests.

Read more
Development WordPress plugin

Escape the Startup Idea Maze: The Hypothesis Sheet Method

2025-01-22
Escape the Startup Idea Maze: The Hypothesis Sheet Method

This article introduces the "Hypothesis Sheet" method, a process designed to help startup founders find and validate good startup ideas. The core concept is framing the startup journey as a series of hypothesis tests. The four steps involve: listing ideas/target customers, selecting one to validate, using Hypothesis Sheets to validate, and continuously de-risking or moving to the next idea. This efficiently de-risks the process, aiming to find product-market fit. The author emphasizes rapid iteration, suggesting one-week sprints, and shares customer discovery tips, including handling 'surprise factors'—instances where customer responses defy expectations.

Read more

React Photo Studio: Beta Launch of an Online Photo Editor

2025-05-25
React Photo Studio: Beta Launch of an Online Photo Editor

React Photo Studio is a web-based photo editing application currently in Beta. Many features are under active development. Developer Chase Manning welcomes contributions from interested individuals; check the contribution guide for details. This independent project is unaffiliated with any other photo studio products, brands, or companies. Any similarities to other products are purely coincidental and stem from common industry practices and technologies.

Read more

ChatGPT's Surprisingly Small Impact on the Danish Labor Market

2025-05-03
ChatGPT's Surprisingly Small Impact on the Danish Labor Market

A new study examining the Danish labor market in 2023-2024 reveals that generative AI models like ChatGPT have had a negligible impact on wages and employment, despite widespread adoption. Researchers from the University of Chicago and the University of Copenhagen analyzed data from 25,000 workers and 7,000 workplaces across 11 occupations often considered vulnerable to automation. While company investment spurred AI tool adoption, leading to time savings for a significant portion of users, the overall economic impact was minimal. Interestingly, the study found that AI chatbots created new tasks for 8.4% of workers, offsetting potential time savings. This suggests that while AI may automate some tasks, it also generates new ones, mitigating its initial disruptive potential.

Read more

Mercator: Extreme – A Mind-Bending Map Projection

2025-01-21

Mercator: Extreme isn't your average map. It lets you set any point on Earth as the 'pole,' extending the projection infinitely to reveal extreme distortions. From cities to atoms, everything is warped in a fascinating way. This project not only offers a unique visual experience but also reinterprets distance, direction, and location, giving you the sensation of being at the 'center of the universe'.

Read more

Measuring Decentralization in the Fediverse and Atmosphere

2025-08-31

This website uses the Herfindahl–Hirschman Index (HHI) to measure the concentration of user data on decentralized social networks like the Fediverse and Atmosphere. An HHI close to zero indicates high competition, while a value near 10000 signifies a highly concentrated monopoly. The site currently calculates HHI by analyzing the distribution of active users across servers (Fediverse) or data repositories (Atmosphere), aggregating servers controlled by the same entity. Beyond data location, the site highlights other crucial aspects of decentralization, including network structure, identity management, infrastructure, legal jurisdictions, and the distribution of social power. Code and data are available on GitHub.

Read more

The Italian Letter: Michael Ledeen and the Lies That Led to the Iraq War

2025-05-25
The Italian Letter: Michael Ledeen and the Lies That Led to the Iraq War

Michael Ledeen, a controversial national security journalist and scholar who died in 2018, played a significant role in manipulating intelligence for political gain, particularly in the lead-up to the 2003 US invasion of Iraq. This article exposes his involvement in fabricating false intelligence, such as the forged "Italian Letter" claiming Saddam Hussein purchased uranium from Niger, to justify the invasion. This led to a costly and disastrous war, resulting in immense military and diplomatic failures. The article also touches upon his previous involvement in disinformation campaigns, including efforts to discredit Jimmy Carter's brother and spreading false narratives about Bulgarian involvement in the Pope's assassination attempt. Ledeen's case serves as a stark example of manipulating secret and dishonest intelligence for political aims.

Read more

The End of an Era: Docomo's Custom Emoji Set is Retiring

2025-05-26
The End of an Era: Docomo's Custom Emoji Set is Retiring

Japanese mobile carrier Docomo announced it will end support for its unique emoji designs by late June 2025. This marks the end of a significant emoji era that began in 1999, even though the set hasn't been updated since 2013. While surprisingly still in use on specific Japanese devices, Docomo's 698 emoji designs will be replaced by Google's Noto Color Emoji or Samsung's custom set, depending on the device. Docomo's early foray into symbolic communication, dating back to a simple heart icon on its 1995 pager, foreshadowed the emoji revolution. The company's 1999 i-mode emoji set played a foundational role in emoji standardization.

Read more
Tech

Real-time SV2TTS: Transfer Learning for Multispeaker Text-to-Speech

2025-09-14
Real-time SV2TTS: Transfer Learning for Multispeaker Text-to-Speech

This open-source project implements real-time multispeaker text-to-speech (SV2TTS) synthesis using transfer learning from speaker verification, based on the author's master's thesis. It's a three-stage deep learning framework: creating a digital voice representation from short audio clips, then using this representation to generate speech from arbitrary text. While the project is older and may have lower quality than commercial alternatives, it supports Windows and Linux, with GPU acceleration recommended. Detailed installation and usage instructions are provided, along with support for various datasets.

Read more
Development transfer learning

Quad9: A Non-Profit DNS Provider Seeks Donations

2025-03-25
Quad9: A Non-Profit DNS Provider Seeks Donations

Quad9, a non-profit organization, relies on grants and partnerships to operate. Using Quad9 can prevent ransomware attacks, protect your bank account, and stop your computer from being used in illicit criminal activities. These protections, and millions of other interventions, directly save you, your business, and the companies you rely on (like banks and e-commerce firms) money. We hope this understanding inspires you to donate to Quad9, individually or through corporate sponsorship.

Read more
Tech non-profit

Unexpectedly Large Isospin Symmetry Violation Found at CERN

2025-03-31
Unexpectedly Large Isospin Symmetry Violation Found at CERN

Analysis of data from CERN's NA61/SHINE collaboration revealed a surprising anomaly: a significant imbalance between charged and neutral kaons produced in argon-scandium collisions. Charged kaons were produced 18.4% more frequently than neutral kaons, suggesting a much larger violation of isospin symmetry than predicted by existing models. This challenges our understanding of the strong interaction and quantum chromodynamics (QCD), opening avenues for further research into the role of electromagnetic interactions and quark behavior. The 4.7σ significance of the result demands further investigation and theoretical explanations.

Read more

Lisp's Advantages in Bioinformatics: Faster Programs, Faster Development

2025-01-21

This article argues for expanding the use of Lisp-family languages (Common Lisp, Scheme, and Clojure) in bioinformatics and computational biology. Lisp's strengths—speed, flexibility, and ease of creating domain-specific languages (DSLs)—enable faster program development and execution. Case studies of Pathway Tools and BioBike showcase Lisp's power in building complex, flexible bioinformatics applications. The authors discuss opportunities and challenges for Lisp's future in the field.

Read more

The Surprisingly Colorful World of 1888 Ostrich Feather Dyeing

2025-05-10
The Surprisingly Colorful World of 1888 Ostrich Feather Dyeing

Alexander Paul's *The Practical Ostrich Feather Dyer* (1888) is a surprisingly vibrant volume. Interspersed with detailed instructions and color adjustments, are 48 stunning examples of dyed ostrich feathers, showcasing a remarkable range of hues – from lemon yellow to deep browns. Paul's confidence in his methods is evident; he offers a $1000 reward to anyone who can disprove his instructions. This book isn't just a technical manual; it's a testament to meticulous craftsmanship, precision, and an egalitarian entrepreneurial spirit.

Read more

Trump's Attempted Firing of Fed Governor Tests US Rule of Law

2025-08-26
Trump's Attempted Firing of Fed Governor Tests US Rule of Law

Donald Trump claims to have fired Federal Reserve Governor Lisa Cook, alleging mortgage fraud before her Fed tenure. However, evidence supporting this claim is weak and irrelevant to her Fed duties. The move is widely seen as an attempt by Trump to exert control over the Fed, replacing independent officials with loyalists, severely threatening the rule of law and the independence of the central bank. Cook's refusal to resign puts Fed Chair Jerome Powell at a crossroads: uphold the rule of law or succumb to power? The outcome will determine whether the US remains a nation governed by law.

Read more

Bin: AI-Powered Business Intelligence, Dashboards in Seconds

2025-01-10

Bin is an AI-powered business intelligence analyst that lets you build stunning data visualizations and interactive dashboards in seconds. Forget complex SQL queries and cumbersome BI tools. Simply describe what you need in natural language, and Bin instantly creates beautiful charts and dashboards. It supports various data sources and offers a drag-and-drop interface for easy customization and iteration. Bin offers free and paid plans to suit different team sizes.

Read more
(bi.new)
1 2 425 426 427 429 431 432 433 596 597