In this last chapter we will look at the security aspects of HTTP, including how to identify users, how HTTP authentication works, and why some scenarios require HTTPS (secure HTTP). Along the way, we are also going to learn a bit about how to manage state with HTTP.
via Pocket http://ift.tt/1bFS0b9
Today at the Chaos Computer Congress (30C3), xobs and I disclosed a finding that some SD cards contain vulnerabilities that allow arbitrary code execution — on the memory card itself.
via Pocket http://ift.tt/19vp3O7
Our mind is not a camera. Seeing is not a passive act. We see what we expect to see, or, as Anaïs Nin put it so beautifully: “We don’t see things as they are, we see them as we are.”
via Pocket http://ift.tt/14NJf09
Yes, these two iconoclasts have disrupted multiple industries, but TED curator Chris Anderson goes much deeper and argues that what Musk and Jobs really have in common is a rare form of design thinking powered by unfettered conviction.
via Pocket http://ift.tt/1eloABU
There is a war coming soon. The arms merchants of the cloud and a new wave of developers armed with APIs are going to cause massive technology disruption. And APIs are the ammunition fueling this change.
via Pocket http://ift.tt/1jyy9Of