February 2019 Archive
26431.
TurboTax Hack: Intuit Says There Was No Data Breach, Users Are Not at Risk (newsweek.com)
26432.
Earth's Geocorona Extends Past the Moon (earthsky.org)
26433.
Latex 2ε SVMult Document Class Author Instructions for Contributed Books [pdf] (iws.boku.ac.at)
26434.
Humpback whale found in middle of Amazon rainforest (motherboard.vice.com)
26435.
Mass scanning activity targeting NUUO devices detected (CVE-2018-14933) (twitter.com)
26436.
Check out chapters on my YouTube channel to my audio book, “Black Butterfly” (youtube.com)
26437.
Tesla stock plunges on SEC reportedly saying Elon Musk is violating deal (electrek.co)
26438.
YouTube Kids. There is still a problem (cnn.com)
26439.
Koreans Living in Japan Embrace North Korea (nytimes.com)
26440.
What It Means to Be Serverless (mayoatte.com)
26441.
Amplituhedron: A Jewel at the Heart of Quantum Physics (2013) (quantamagazine.org)
26442.
I'll Let Myself In: Tactics of Physical Pen Testers (2017) (m.youtube.com)
26443.
The Significance of the x86 Sfence Instruction (hadibrais.wordpress.com)
26444.
Facing Financial Pressures, GOG Quietly Lays Off at Least a Dozen Staff (kotaku.com)
26445.
Energizer Produces a Phone That’s Nothing but Battery (expertreviews.co.uk)
26446.
Jorge Ramos, Univision Crew Detained by Maduro (foxnews.com)
26447.
Ask HN: What Is Your Experience with PA-DSS and PCI Compliance?
26448.
“Proof-of-Nuclear-Bombs”: a most reliable design for stablecoin utility (hackernoon.com)
26449.
Engineers: Amazon doesn't care about your ivy degree (jobscan.co)
26450.
E=MC² for Diamonds: universal access to investment diamonds with open algorithms (hackernoon.com)
26451.
Y Combinator: Bookmarklet (news.ycombinator.com)
26452.
Chinese gov funds may have been used for ‘CRISPR babies’ project (statnews.com)
26453.
Opsec: Because Jail Is for Wuftpd (2016) [video] (0ps.ec)
26454.
Skyskyft.com – Best way to guarantee cheapest last and last price on any flight
26455.
Debug Your Live Apps Running in Azure Virtual Machines and Azure Kubernetes (devblogs.microsoft.com)
26456.
Classic Myths Explained with Animation: Pandora’s Box, Sisyphus and More (openculture.com)
26457.
Quotes from 1992 (apenwarr.ca)
26458.
The Purpose of Life in an Hour and a Half (thechoice.one)
26459.
Most laptops vulnerable to attack via peripheral devices, say researchers (cam.ac.uk)
26460.
Ask HN: Which companies have radically simple privacy policies?