Bypassing Windows Kernel Mitigations: A Deep Dive into Violet Phosphorus

2024-12-13

This post delves into bypassing modern Windows 10 and 11 kernel mitigations like SMEP and VBS. The author details Violet Phosphorus, a universal VBS/SMEP bypass technique, providing PoC code and a ROP chain. It explains SMEP and VBS, demonstrating how to exploit a vulnerability in the HackSysExtremeVulnerableDriver to use ROP gadgets and the MiGetPteAddress function to modify page table entries for kernel code execution. The author also shows how to use Kristal-G's SYSRET shellcode to return to user mode. This is a valuable resource for kernel exploit development and security researchers, categorized as Development.

Read more

Major Breakthrough in Nuclear Clock Technology Promises Ultraprecise Timekeeping

2024-12-13

An international research team led by scientists at JILA, a joint institute of the National Institute of Standards and Technology (NIST) and the University of Colorado Boulder, has made a significant advance in developing a novel nuclear clock. Nuclear clocks use energy transitions within an atom's nucleus to measure time, promising greater accuracy and resistance to external disturbances compared to atomic clocks. The team used a specially designed ultraviolet laser to precisely measure the frequency of an energy jump in thorium nuclei and an optical frequency comb to count the cycles. This breakthrough paves the way for more precise navigation, faster internet speeds, and advancements in fundamental physics research, potentially even aiding in the detection of dark matter or verifying the constancy of nature's constants.

Read more

Blogger Resurfaces 2004 MIT Spam Conference Talk Intro Video

2024-12-13

Blogger John Graham-Cumming recently shared on his blog the intro video from his 2004 MIT Spam Conference talk. The video cleverly uses the "All your base are belong to us" meme, adapting it to discuss spam and machine learning, and paying homage to Paul Graham. It showcases early machine learning applications in anti-spam and the blogger's creative and humorous approach to tech communication.

Read more

Italian Town Solves Winter Darkness with Giant Mirror

2024-12-13

Nestled in a valley between Italy and Switzerland, the town of Viganella suffers from three months of winter darkness each year. To combat this, in 2006, residents ingeniously installed a massive mirror on a nearby mountain peak. This mirror reflects sunlight into the town square, providing much-needed light and warmth during the long winter. The project, a testament to human ingenuity and community spirit, has since inspired similar initiatives worldwide.

Read more

Exotic New Superconductors Delight and Confound

2024-12-13

Three new types of superconductors were discovered this year, challenging our understanding of this phenomenon. These two-dimensional materials, like graphene, exhibit unprecedented flexibility, switching between insulating, conducting, and superconducting states with simple adjustments. One even defies expectations by strengthening in a magnetic field. These discoveries deepen the mystery of superconductivity while offering hope for room-temperature superconductors, potentially revolutionizing energy and transportation.

Read more

Node.js EPUB Library @smoores/epub Released

2024-12-13

A new Node.js library, @smoores/epub, has been released. It allows developers to inspect, modify, and create EPUB 3 publications. The library offers high-level APIs that simplify interaction with the EPUB specification, such as setting the title and retrieving author information. Lower-level APIs provide granular control over the EPUB structure, enabling tasks like adding chapters and metadata. Built upon fast-xml-parser, @smoores/epub provides robust XML parsing and manipulation capabilities, facilitating efficient handling of EPUB file XML content.

Read more
Development Library

NASA Visualizes Global Internal Ocean Tides

2024-12-13

NASA's Goddard Space Flight Center has released a stunning visualization of global internal ocean tides, created using satellite altimetry data and simulations. The animation showcases how internal tidal waves, generated by the interaction of underwater topography, such as the Hawaiian Ridge, and tidal energy, propagate across the ocean. While these waves have a subtle surface expression, they play a significant role in ocean mixing and circulation. The visualization also highlights other regions with strong internal tidal activity, including Tahiti, the Southwest Indian Ocean, and the Luzon Strait, offering new insights into ocean dynamics.

Read more

Kowloon Walled City: A Cross-Section of Density and Decay

2024-12-13

In the 1990s, Kowloon Walled City in Hong Kong was the world's most densely populated place, cramming roughly 50,000 people into just 2.6 hectares. After WWII, it became a refuge for refugees, its buildings growing organically into a labyrinthine structure. Crime and poor living conditions led to its demolition in 1994. Artist Hitomi Terasawa's cross-section illustration vividly captures this unique and ultimately tragic urban phenomenon, preserving its memory as a 'living organism'.

Read more

Hardware-Level Network Time Security: Netnod's FPGA Implementation of NTS

2024-12-13

Following a 2019 software implementation of Network Time Security (NTS), Netnod has deployed NTS at the hardware level using FPGAs for their NTP and NTS protocols. This hardware implementation offers enhanced security, mitigating side-channel attacks and improving efficiency and scalability. While challenges existed in processing complex NTS packets, Netnod overcame them with a multi-engine parallel processing solution. Their NTS service is now in production.

Read more

Scheduled Reboots: A Preventative Approach

2024-12-13

A university research team faced a challenging sysadmin problem: their servers had been running for too long and needed rebooting, but frequent reboots disrupt user experience. Their default was to avoid reboots, but a recent large-scale reboot due to prolonged uptime forced a change. To prevent similar issues, they've decided on a yearly reboot schedule—at least three times a year, aligning with the university's teaching schedule—balancing preventative maintenance with user experience.

Read more

Microsoft Open-Sources MarkItDown: A File-to-Markdown Conversion Tool

2024-12-13

Microsoft has open-sourced MarkItDown, a Python tool that converts various files (including PDF, PowerPoint, Word, Excel, images, audio, and HTML) into Markdown format. The tool boasts a simple API, supports a wide range of file types, and incorporates OCR and speech transcription for enhanced functionality, making it ideal for text analysis or indexing. Contributions are welcome, and the project adheres to the Microsoft Open Source Code of Conduct.

Read more

Reading Skills and Brain Structure: A Neuroimaging Study

2024-12-13

A new study reveals significant differences in brain structure between individuals with varying reading abilities. Analyzing open-source data from over 1,000 participants, researchers found correlations between reading proficiency and the structure of the left anterior temporal lobe and Heschl's gyrus. The left temporal pole integrates diverse information, while Heschl's gyrus, part of the auditory cortex, showed thickness correlated with reading ability. The study highlights brain plasticity, suggesting reading shapes brain structure, benefiting both individuals and humanity.

Read more

Concurrent Cycle Collection: Garbage-Collected Smart Pointers in Rust for Scheme

2024-12-13

This article details the implementation of a concurrent cycle collector in Rust for garbage-collected smart pointers (Gc) within a Scheme interpreter. Gc functions similarly to Arc>, supporting interior mutability, cloning, and sending across threads. The article thoroughly explains the implementation of Gc, including thread-safe interior mutability using semaphores and read/write locks, and the implementation details of concurrent cycle collection based on the Bacon and Rajan algorithm. This includes the Trace trait, cycle detection, and mechanisms for handling concurrent modifications.

Read more

Open Source Pen Plotter Robot Project

2024-12-13

Robertleoj has open-sourced a project on GitHub called Pen Plotter Robot, a pen plotting robot. The project includes the robot's design, construction, and control program, aiming to help makers and enthusiasts learn about robotics and mechanical design. The code and documentation are publicly available for learning and improvement.

Read more
Hardware pen plotter

Maker Builds Laser Shooting Game: From Legoland Ride to ESP32-Powered Halloween Fun

2024-12-13

Inspired by a Legoland Egyptian adventure ride, the author decided to create a similar shooting game. Using inexpensive ESP32 microprocessors, infrared laser guns, and homemade targets, he successfully built a Halloween-themed shooting game. Along the way, he learned Arduino and MicroPython programming, overcoming challenges in hardware connections, power supply, and communication. The game was a hit at school and home events. Future plans include improving target design, lighting effects, and circuit boards to enhance the gaming experience.

Read more
Development Maker

Caves of Qud's Gigantic World Map: A 13.8 Gigapixel Adventure

2024-12-13

The upcoming sci-fi roguelike Caves of Qud, launching December 5th, boasts a massive world map totaling an astounding 13.8 gigapixels! This immense map consists of 240 x 75 zones, each zone containing 25 x 80 tiles, with each tile being 16 x 24 pixels. A web viewer allows exploration of the surface and even the first underground level (the remaining 2 billion+ levels are omitted due to data size). This breathtaking scale promises an epic, fantastical adventure, ripe with exploration possibilities.

Read more

New Hash Functions Rain Hashes: Speed and Security Combined

2024-12-13

DOSAYGO Research has released Rain Hashes, a new family of hash functions featuring Rainbow and Rainstorm algorithms. Rainbow boasts exceptional speed, making it ideal for general-purpose hashing. Its C++ implementation has passed all SMHasher3 tests and is characterized by its concise and efficient code. Rainstorm prioritizes security; while not formally audited, its design incorporates elements from cryptographic hash functions and offers output sizes from 64 to 512 bits. The project provides C++, WASM, and Node.js implementations, along with a command-line tool and benchmark tests for easy evaluation and usage.

Read more
Development hash function

Web Origami: A New Programming Language for Simplified Website Building

2024-12-13

Web Origami is a new programming language designed to simplify the creation of small- to medium-sized websites. Using a concise syntax that complements HTML and CSS, users can describe website structure using formulas similar to spreadsheets, transforming data and files into HTML and other website resources through simple programs. Even without JavaScript knowledge, features like full-text search and RSS feeds can be created. Origami provides a command-line interface, built-in functions, and an async-tree library, with support for JavaScript extensions. Its core concept is to abstract website building as data transformation, making site creation and deployment efficient, low-cost, and easy to understand.

Read more

Demonic Possession Predicted the Fall of the Carolingian Empire

2024-12-13

In the early 9th century, a Frankish courtier recorded a tale of demonic possession. The demon, Wiggo, confessed to destroying crops, livestock, and spreading plagues, blaming the Franks' sins and their rulers' many crimes. Wiggo described rampant greed, mutual suspicion among rulers, and lack of piety. This story mirrored the crisis of the Carolingian Empire: internal strife, economic instability, and famine. The courtier, Einhard, used this tale to subtly criticize the rulers' corruption and foreshadow the empire's decline.

Read more

In Memoriam: Donald Bitzer, Pioneer of Computing

2024-12-13

The Computer History Museum mourns the passing of Donald L. Bitzer (1934-2024), a pioneering computer scientist. Co-inventor of the flat-panel plasma display and creator of the PLATO system—the world's earliest time-shared computer-based education system and a groundbreaking online community—Bitzer's innovations presaged many modern online features. PLATO included forums, message boards, online testing, email, chat rooms, instant messaging, and multiplayer games, laying the groundwork for the interconnected digital world we know today.

Read more

Security Vulnerabilities Stemming from Dart/Flutter's Weak PRNG

2024-12-13

Zellic's research uncovered multiple security vulnerabilities caused by a weak pseudorandom number generator (PRNG) in Dart/Flutter. A flaw in the initialization of the `Random()` function within the Dart SDK resulted in insufficient entropy in generated keys, making them susceptible to brute-force attacks. This allowed attackers to easily gain access to the Dart Tooling Daemon, enabling them to read or write workspace files and even execute arbitrary code. Furthermore, Proton Wallet and SelfPrivacy projects were also affected by this weak PRNG, experiencing encryption vulnerabilities and predictable password issues, respectively. While the vulnerability has been patched, developers are urged to exercise caution when using the `Random()` function and utilize `Random.secure()` when cryptographically secure random numbers are required.

Read more

US Health Insurers Hiding a Dirty Secret: Soaring Denial Rates

2024-12-13

This article exposes a dark secret within the US health insurance industry: claim denial rates have skyrocketed tenfold in the last decade. Insurers are no longer selling insurance, but a gamble. Government agencies have failed to fulfill their oversight responsibilities, allowing denial rates to soar, severely harming consumers. Some insurers deny up to 42% of claims, sparking public outrage and even leading to the murder of UnitedHealthcare's CEO. The article calls for government transparency on denial rates to protect consumers.

Read more

Revolutionary Idea: Applying Magit Principles to the jj Version Control System

2024-12-13

The author proposes a novel approach: applying the Magit version control interface from Emacs (which uses text files as its UI) to the nascent jj version control ecosystem. The article points out that Magit's text-based UI offers efficiency and portability. By leveraging the LSP protocol, a Magit-like experience can be implemented in various editors, avoiding redundant development. The author envisions generating specific text files (such as .jj/status.jj) and utilizing LSP features like semantic tokens, folding ranges, and goto definition to achieve Magit-like version control operations. The ultimate goal is to create a cross-platform, efficient user interface for jj version control.

Read more
Development

Mirror Bacteria Research Raises Significant Risks, Scientists Warn

2024-12-13

Synthetic biologists have achieved remarkable breakthroughs, such as creating bacteria with chemically synthesized genomes. However, two synthetic biologists recently joined other scientists in calling for a halt to research that could lead to the creation of "mirror bacteria." These bacteria are composed of the same components as natural cells but with opposite stereochemistry in all biopolymers. Because mirror bacteria might lack natural predators and evade immune systems, they pose a catastrophic risk. The article emphasizes that while scientific research should be open, certain research, like mirror bacteria research, is too risky given the potential for devastating consequences. Therefore, it should be stopped.

Read more

MIT Develops Noninvasive Imaging Method for Deeper Tissue Penetration

2024-12-13

MIT researchers have developed a novel noninvasive imaging technique that more than doubles the depth limit of metabolic imaging. Using high-powered lasers and a specialized fiber shaper, the method minimizes light scattering, allowing for clearer and faster imaging of living tissue. This label-free approach avoids tissue preprocessing, providing a more natural representation of cellular structures and functions. The increased depth penetration and speed promise significant advancements in cancer research, tissue engineering, drug discovery, and immunology.

Read more

Eventual Consistency: Challenges and Patterns in Distributed Systems

2024-12-13

Eventual consistency is unavoidable in distributed systems. This article explores four common patterns for handling eventual consistency: event-based eventual consistency, background sync eventual consistency, saga-based eventual consistency, and CQRS-based eventual consistency. Each pattern has its advantages and disadvantages. For example, the event-based pattern emphasizes loose coupling and scalability, but consistency takes time; while the saga-based pattern is suitable for complex, long-running transactions, ensuring consistency through compensating transactions. The choice of pattern depends on the specific needs and trade-offs of the system.

Read more

AI Product Management: New Best Practices in a Generative AI World

2024-12-13

The rise of generative AI and AI-based developer tools is reshaping best practices in AI product management. This article highlights the importance of using concrete examples (inputs and desired outputs) to clearly define product specifications. This not only helps teams move faster but also improves the efficiency of assessing technical feasibility. For example, prompting LLMs to test their accuracy on specific tasks allows for quick validation of product ideas. Furthermore, tools like Replit and Vercel empower product managers to build prototypes independently and gather user feedback, accelerating iteration. In short, AI is revolutionizing AI product management, demanding that product managers master new best practices to meet the rapidly evolving market demands.

Read more
1 2 14 15 16 17 19 21 22