Another tutorial I make today about highmaps.js.
This simple example just allow us to understanding how this library working.
The tutorial can be found here.
This is result of the html5 files:
tutorials, tips, tricks, commands, programming, linux, windows, database, sql, python, programming language, Fedora, drawing, painting, tutorial, tutorials
Saturday, February 13, 2016
Tuesday, February 9, 2016
Google celebrate Safer Internet Day 2016 with one great gift.
All you have to do is check your secure account.
After that will see this message: To help celebrate Safer Internet Day 2016, we added 2 GB of free Drive storage to your Google account because you completed the Security Checkup.
After that will see this message: To help celebrate Safer Internet Day 2016, we added 2 GB of free Drive storage to your Google account because you completed the Security Checkup.
Monday, February 8, 2016
News: Copy and CudaDrive will be discontinued.
Today I got one questionable mail survey about cloud services and I think about the cloud and prices.
Now I saw one news about Copy and CudaDrive after my Dropbox take some space.
The news it's come from Copy and CudaDrive and will be closed.
This is the message from the official website: copy.
Now I saw one news about Copy and CudaDrive after my Dropbox take some space.
The news it's come from Copy and CudaDrive and will be closed.
This is the message from the official website: copy.
Copy and CudaDrive services will be discontinued. We are announcing today that the Copy and CudaDrive services will be discontinued on May 1, 2016. Copy and CudaDrive have provided easy-to-use cloud file services and sharing functionality to millions of users the past 4+ years. However, as our business focus has shifted, we had to make the difficult decision to discontinue the Copy and CudaDrive services and allocate those resources elsewhere. For more information on this decision, please view the blog post from Rod Mathews our VP & GM, Storage Business.
Sunday, January 17, 2016
News: jQuery 3.0 Beta Released.
The team member of jQuery Core - Timmy Willison told us in a blog post about Query 3.0 Beta Released.
Developers with jQuery 3.0 alpha had experimented with methods like an inline-display-none-remover (.show()) and inline-display-none-adder (.hide()) and removing inline display:none did not always show the element.
Fix the custom selectors like :visible make is up to 17 times faster now.
Link jQuery with :
https://code.jquery.com/jquery-3.0.0-beta1.js
https://code.jquery.com/jquery-3.0.0-beta1.min.js
...or get the beta version from npm:
npm install jquery@3.0.0-beta1
Sunday, January 10, 2016
About me ... and comics, linux and games!
Most of us have some problems or old things..., it's a good day or a bad day !? ... all of us have one good sense of the day and the next day.
So today I got one mail from one author of comics, and this help me into happy way.
I don't know if this is because the subject was about me when I reading books and comics, but that make me happy.
I remember when I make my first account under internet and about my nicknames, like catafest.
Also I remember when I put for the first time the RedHat 6 on my computer.
The first accounts I make it on my old computer with Athlon XP 1700+ CPU ( I have it and working with the old Linux Fedora).
When I make and run the first script with bash and vi and the first yum instalations.
About the old game I try to fix on linux and I happy now because can be fix by using Steam application.
And more and more...
Have a great day !
So today I got one mail from one author of comics, and this help me into happy way.
I don't know if this is because the subject was about me when I reading books and comics, but that make me happy.
I remember when I make my first account under internet and about my nicknames, like catafest.
Also I remember when I put for the first time the RedHat 6 on my computer.
The first accounts I make it on my old computer with Athlon XP 1700+ CPU ( I have it and working with the old Linux Fedora).
When I make and run the first script with bash and vi and the first yum instalations.
About the old game I try to fix on linux and I happy now because can be fix by using Steam application.
And more and more...
Have a great day !
Paul Baliker - sculptor of nature’s.
Paul Baliker has been sculpting wood and bronze for 35 years, working out of his studio in the Hammock, where he also maintains a gallery.
I like this:
Monday, January 4, 2016
News: Tutorials with node.js and jpm.
Dear friends,
... today I started a new series of tutorials.
The subject from this is firefox add-ons with node.js.
Into this tutorial, we can see the first steps to make one unsigned default addon.
I used Windows OS, but also you can install under Linux OS easy node.js.
Most of Linux users can know how to do it.
The first tutorial is here.
Thank you. Best regards.
... today I started a new series of tutorials.
The subject from this is firefox add-ons with node.js.
Into this tutorial, we can see the first steps to make one unsigned default addon.
I used Windows OS, but also you can install under Linux OS easy node.js.
Most of Linux users can know how to do it.
The first tutorial is here.
Thank you. Best regards.
Posted by
Cătălin George Feștilă
Labels:
2016 news,
addon,
firefox mozilla,
java script,
node.js,
tutorials
News: OpenBSD and Nightly Mozilla Firefox security.
W^X ("Write XOR Execute"; spoken as W xor X[1]) is the name of a security feature present in the OpenBSD operating system. It is a memory protection policy whereby every page in a process' address space is either writable or executable, but not both simultaneously. from wikipedia.
The new Nightly Mozilla Firefox comes with enabled the security feature W^X.
Also will be it available to other versions of its web browser once they are upgraded to version 46.
The implementation of W^X makes all Just in Time ( named JIT) code page working with the browser.
This will need to write to pages, a function needs to be called to explicitly make the page writable. Also, that will remove the execute flag at the same time. The good thing is the permissions for memory pages which allows the compiler to patch code without performance overhead.
The new Nightly Mozilla Firefox comes with enabled the security feature W^X.
Also will be it available to other versions of its web browser once they are upgraded to version 46.
The implementation of W^X makes all Just in Time ( named JIT) code page working with the browser.
This will need to write to pages, a function needs to be called to explicitly make the page writable. Also, that will remove the execute flag at the same time. The good thing is the permissions for memory pages which allows the compiler to patch code without performance overhead.
Posted by
Cătălin George Feștilă
Labels:
2016,
2016 news,
firefox,
firefox mozilla,
internet security,
news,
Nightly Firefox,
security
Wednesday, December 30, 2015
Joanna Rutkowska talk on the 32C3 streaming site.
Joanna Rutkowska covered the last few decades of security on computers.
You can see Joanna Rutkowska 32c3 streaming media.
You can see Joanna Rutkowska 32c3 streaming media.
Tuesday, December 29, 2015
Nemesis Bootkit Malware the new stealthy Payment Card.
After I read many articles I got this infos about Nemesis Bootkit Malware:
- suspected to originate from Russia;
- infect PCs by loading before Windows starts
- has ability to modify the legitimate volume boot record;
- seam to be like another Windows rootkit named Alureon;
- intercepts several system interrupts to pass boot process;
- can steal payment data from anyone's not just targeting financial institutions and retailers;
- this malware hides between partitions and is also almost impossible to remove;
I think about the antivirus and internet security solutions can deal with this type of issues.
Take a look at how fast working the scan disk and how it's working the memory traps, how it's working the booting process or maybe try to see how selinux works.
In my opinion these Antivirus and Internet security solutions are just not effective in design and heuristic detection.
Most of that the prices of this softwars is huge versus non make anything all.
Maybe will see into the future a mega malware wich jump from first boot to any operating system and this because the hardware is more complex and fast.
- suspected to originate from Russia;
- infect PCs by loading before Windows starts
- has ability to modify the legitimate volume boot record;
- seam to be like another Windows rootkit named Alureon;
- intercepts several system interrupts to pass boot process;
- can steal payment data from anyone's not just targeting financial institutions and retailers;
- this malware hides between partitions and is also almost impossible to remove;
I think about the antivirus and internet security solutions can deal with this type of issues.
Take a look at how fast working the scan disk and how it's working the memory traps, how it's working the booting process or maybe try to see how selinux works.
In my opinion these Antivirus and Internet security solutions are just not effective in design and heuristic detection.
Most of that the prices of this softwars is huge versus non make anything all.
Maybe will see into the future a mega malware wich jump from first boot to any operating system and this because the hardware is more complex and fast.
Posted by
Cătălin George Feștilă
Labels:
2015,
2015 news,
antivirus,
error,
internet security,
malware
Thursday, December 24, 2015
How to fix Grub2 bootloader flaw.
According to researchers Ismael Ripoll and Hector Marco,who wrote this article:
A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009) to 2.02 (December, 2015) are affected. The vulnerability can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And so, the attacker may take control of the computer.
Just hit the backspace key 28 times at the Grub username prompt during power-up.
This will open a Grub rescue shell with the rescue shell allows unauthenticated access to a computer and the ability to load another environment.
The Grub versions 1.98 to 2.02 are affected and suffer integer overflow problem.
The basic of the fault lies within two functions; the grub_password_get() function and the and grub_password_get() script.
To fix it use this patch.
A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009) to 2.02 (December, 2015) are affected. The vulnerability can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And so, the attacker may take control of the computer.
Just hit the backspace key 28 times at the Grub username prompt during power-up.
This will open a Grub rescue shell with the rescue shell allows unauthenticated access to a computer and the ability to load another environment.
The Grub versions 1.98 to 2.02 are affected and suffer integer overflow problem.
The basic of the fault lies within two functions; the grub_password_get() function and the and grub_password_get() script.
To fix it use this patch.
Posted by
Cătălin George Feștilă
Labels:
2015 news,
error,
fix,
Grub fault,
linux,
tutorial,
tutorials,
vulnerability
Tuesday, December 22, 2015
Sunday, November 22, 2015
Ghostscript tutorial ...
Today I wrote a simple tutorial about Ghostscript under Windows 10.
Most parts of this tutorial can be used also with Linux - example only.
Also the part of stack working on Linux like Windows.
I will come also with one tutorial about Ghostscript and Linux only.
The tutorial can be found here.
Most parts of this tutorial can be used also with Linux - example only.
Also the part of stack working on Linux like Windows.
I will come also with one tutorial about Ghostscript and Linux only.
The tutorial can be found here.
Subscribe to:
Posts (Atom)