Pinecone
Pynecone is a full-stack Python environment that simplifies the creation and deployment of web applications in minutes.
Pinecone
Pynecone is a full-stack Python environment that simplifies the creation and deployment of web applications in minutes.
Penpot
Penpot is a platform for designing the design of graphical interfaces of programs and websites.
InstructPix2Pix
A method of editing already created images taking into account the user's text hint using AI
Extrapolate
Extrapolate is an application that allows you to see how you age by transforming your face with the help of artificial intelligence. Freely and confidentially.
🌐 Fake Wi-Fi access points.
It is necessary to note one more risk factor (and for some, an opportunity) when using Wi-Fi technologies: fake access points. Attacks of this type have been carried out for about 15 years (the first known case was the use of a tool called "Jasager" in 2008), and are very simple: firstly, it is not difficult to develop a tool for such an attack on your own, and secondly, a number of relevant devices are available for sale (for example, Wi-Fi Pineapple).
🌐Devices with Wi-Fi and Bluetooth support. Part2
Now back to the Wi-Fi access points. It has been reliably established that it is possible to track not only your location with high accuracy, but also body movements (position in space) directly through walls — by radio signals passing through a room or building.
And this is not the voice of a conspiracy theorist from under a foil cap - we offer you to get acquainted with the results of scientific research:
Peer-to-peer networks
Usually the client and server software are run on different computers, but one computer can also do this. In small corporate and home networks, many computers work both as servers and as clients. Such networks are called peer-to-peer.
The Chinese have created a liquid metal robot that can get out of the cage, like the terminator T-1000🤖
The new robots can transition from a solid state to a liquid state, which allows them to jump, scramble and even flow out of the cage.
Yandex private repositories merged into the network🤣
Anonymous hackers have published an archive on the BreachForums forum, including the contents of internal Git repositories of Yandex Corporation.
The UK pays people not to use electricity💰
For a few hours this week and until the end of winter, UK residents can earn money by turning off the lights, unplugging laptops from the mains and using the microwave to warm up lunch, rather than cooking it in an electric oven.
Hackers stole the source codes of League of Legends and Teamfight Tactics🤷🏼♀️
The developer and publisher of video games Riot Games reported that during a recent cyberattack, hackers stole the source codes of League of Legends, Teamfight Tactics and tools for developing an old version of anti-cheat.
The CryptoAPI vulnerability has been given a second life and most Windows-based data center systems and applications still remain vulnerable.
GoTo has published an update on the incident, warning customers that attackers who hacked its development environment in November 2022 stole encrypted backups containing information about the client and the encryption key for part of this data.
Riot Games confirmed that hackers leaked the sources for League of Legends and Teamfight Tactics, and also received a ransom letter in which the attackers threatened to publish the source code online if the developer did not pay.
Technical details have been published about the vulnerability of the Arm Mali GPU, which leads to RCE in the kernel and the rooting of Pixel 6 devices using a malicious application installed on the target device.