Remove 2008 Remove Libraries Remove Video
article thumbnail

0patch releases free unofficial patches for Windows 0days exploited in the wild

Security Affairs

A few days ago, Microsoft warned of hackers actively exploiting two zero-day remote code execution vulnerabilities in Windows Adobe Type Manager Library. The vulnerabilities affects the way Windows Adobe Type Manager Library handles a specially-crafted multi-master font – Adobe Type 1 PostScript format. and Windows Server 2012.

Libraries 124
article thumbnail

Episode 233: Unpacking Log4Shell’s Un-coordinated Disclosure Chaos

The Security Ledger

In this episode of the podcast (#233) Mark Stanislav, a Vice President at the firm Gemini, joins Paul to talk about what went wrong with disclosure of Log4Shell, the critical, remote code execution flaw in the Log4j open source library. Read the whole entry. » » Click the icon below to listen. Log4j Disclosure Chaos.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IDEA 2008

ChiefTech

The “IDEA Conference&# :[link] took place in Chicago on October 7-9 at the Harold Washington Library Center. Jesse talks about the technology trends that will shape the future Web, outlines the challenges of designing a future product, and takes the audience for a behind the scenes look at the creation of the Aurora concept video.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. And that’s why Guido started fuzzing cryptographic libraries, to see if he could find any faults.

article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Digital technologies were actually pretty useful in this pursuit – when Spotify launched in 2008, I used it to curate playlists of the music I had purchased – it’s hard to believe, but back then, you could organize Spotify around your collection, tracks that lived on your computer, tracks that, for all intents and purposes, you owned.

Mining 52
article thumbnail

Documentation Theory for Information Governance

ARMA International

Library Trends 52, no.3, Chicago: American Library Association-Neal Shuman, 2019. Unintended Consequences: New Materialist Perspectives on Library Technologies and the Digital Record.” Libraries and the Academy 13, no. New Library World n116, no. Deflating Information: From Science Studies to Documentation.

article thumbnail

Time for Australian government to wake up to mobile?

ChiefTech

They used two specific testing tools, a W3C tool based on standards developed in 2008 and another that looks like it was designed to test to baseline of phones like the Nokia 6680 (from 2005). Actually, lets be specific: They surveyed 21 Australian federal Australian government, plus the mobile version of USA.gov.