« Advices for junior conference speakers » Nicolas Frankel, 20.10.2019
▻https://blog.frankel.ch/advices-junior-conference-speakers
#speaker #hacks
« Advices for junior conference speakers » Nicolas Frankel, 20.10.2019
▻https://blog.frankel.ch/advices-junior-conference-speakers
#speaker #hacks
Understand Top 25 #blockchain #hacks in History in 5 Minutes (1)
▻https://hackernoon.com/tech-explained-top-24-blockchain-hacks-in-history-first-half-40c390dc4a9
Revealing techniques of 25 successful attacks on blockchain: from 2010 to 2018, $1.8+ billion USD.OverviewHacks on blockchain have always been controversial topics throughout history. Countless exchanges and platforms have been exploited by talented attackers who made away millions of dollars without leaving a trace.Numerous great articles have been focusing on the discussion of the procedure and impact of an attack, but this article steps aside to emphasize the technical approach of the attack. No worries. Rather than going through sophiticated techie murmurs, this post translates the attack method into a format that is more friendly for children and grandparents.Various hacks have different levels of details opened to the public. Some hacks disclosed too few, and some missed the (...)
#identity on the #blockchain doesn’t need to be perfect, it just needs to be better than Yahoo
▻https://hackernoon.com/identity-on-the-blockchain-doesnt-need-to-be-perfect-it-just-needs-to-be
Source: PixabaCryptoSlate, a very useful blockchain aggregation website, maintains a list of projects which specialize in digital identity or at least some elements of personal identity on the blockchain. At present there are no less than 28 such projects, the bulk of which emerged in 2018.On the face of it, storing any personal information on a blockchain sounds like the most ill-advised thing one could do. A public, immutable, decentralized ledger should be no place to keep your name, date of birth, medical histories or anything that could be used to track you down and kidnap you for ransom. This information would be safer with a private enterprise following strict data protection laws in service of its customers, surely?Well, as it happens those enterprises have a tendency to leak (...)
Major #facebook Updates You Need to Know
▻https://hackernoon.com/major-facebook-updates-you-need-to-know-20730c658b16?source=rss----3a814
Earlier this year, on May 1st and 2nd, Facebook organized the F8 developer conference in San Jose, California. During the conference, Mark Zuckerberg introduced several new features of the social platforms Facebook, Messenger, and Instagram.The multiple updates are quite interesting considering what the company has gone through recently. Facebook has introduced some major updates like the first Facebook Analytics mobile app, omni-channel, and automated insights.If you still haven’t checked out the new updates, keep reading this post. I’ll talk about some of the major updates and takeaways from the F8 event.1. Automated InsightsThis is a tool which works in the backend and collects all of the important insights which you might need later. It can give you insights on things like the (...)
#facebook-marketing #social-media-marketing #hacks #marketing
How to Skyrocket Your #pinterest #traffic with a Few Simple Strategies
▻https://hackernoon.com/how-to-skyrocket-your-pinterest-traffic-with-a-few-simple-strategies-9f5
You’ve done all that you can to get people to visit your site and buy your products. But somehow, it’s not working as well as you’d expected it to.Well, that’s what we’re here for. To help you drive traffic to your website via Pinterest.A lot of people out there don’t understand how amazing Pinterest is, nor do they know how to use it to help expand their business.HANDPICKED RELATED CONTENT:15 Hashtag Campaigns That Maximized the Brands’ ReachHow to Monetize Instagram to Earn a FortuneWhich is why we are here to tell you how easy it is to get Pinterest to work to your advantage.Sound good?Let’s begin.Advantages of Driving Traffic from PinterestPinterest plays nice with most of the other social media platforms:Were you aware of the fact that Pinterest is and can be linked to other social media (...)
5 Rapid Ways to Hack Your Holiday Event
▻https://hackernoon.com/5-rapid-ways-to-hack-your-holiday-event-eff81ff1658c?source=rss----3a814
At its heart, hacking is all about finding ways to improve our lives, whether that’s by improving infrastructure, finding a new way to provide services, or figuring out how to get the most bang for your buck.Hacks allow us to do more with less and provide some much-needed support, which is something everyone needs more of during the holidays when faced with countless friendsgivings and professional holiday parties.These can be overwhelming for even the staunchest of networkers, but never fear — I’ve got some excellent tips for you that will help you seize these golden nuggets of opportunity and hack your way into success by the New Year!1. Know the EventAs simple as this sounds, half the time folks don’t really know why they are attending the events they are attending. So set some goals:If it’s (...)
How to Use Google Analytics for Social Media: A Beginner’s Guide
▻https://hackernoon.com/how-to-use-google-analytics-for-social-media-a-beginners-guide-7aa7cd3b1
Did you know that social media spend will increase by 71% in the next five years? And did you know that 42.3% of marketers believe that social media has a great impact on their businesses?No matter what your business is, or who your customers are, adding social media to your marketing mix can take your brand to the next level.But here’s one brutal truth about social media marketing: a large number of brands are unable to effectively measure the impact of their social media marketing efforts.In fact, the CMO survey 2018 claimed only 23.3% of marketers are able to prove the impact of social media marketing quantitatively.So the question is, how do marketers measure the impact of their social media marketingstrategies? And is it possible to do so without spending an arm and a leg on (...)
#google-analytics #hacks #seo #social-media #conversion-optimization
#ssh proxying through many hosts
▻https://hackernoon.com/ssh-proxying-through-many-hosts-49b9e4f37df1?source=rss----3a8144eabfe3-
“the #hacker is bouncing all over the globe, we can’t trace him.”There is an awesome flag that can be set for ssh. This is the idea of using ssh as a proxy, or specifically in our case forcing a tty allocation from one host to another and further on down the line.The command I am talking about is, ssh -ttman ssh: -t Force pseudo-terminal allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, e.g. when implementing menu services. Multiple -t options force tty allocation, even if ssh has no local tty.This is pretty straight forward and easy to do, lets just dive right in.ssh -tt pi@10.1.1.16 -p 22 ssh -tt pi@10.1.1.12 -p 4422 ssh -tt pi@10.1.1.17 -p 22 ssh -tt pi@10.1.1.13 -p 7722In the above example I am using different ssh (...)
Intéressant ce petit « hack » css, je n’en avais pas connaissance, mais beaucoup plus fun que !important doubler un selecteur ID supplante les autres règles…
Chrome extensions for quick site redesigns – Monica Dinculescu
▻https://meowni.ca/posts/extensions
Ah oui, pas mal ! Et c’est valide ça ?
Donc j’ai regardé @jeanmarie , un peut plus, sur ►http://csslint.net on a un warning, donc a priori cette rêgle serait valide. Sur le validateur w3c pas de signalement (mais ce n’est pas ce qu’il y’a de plus fiable actuellement).
C’est un trick d’un dev de google chrome, ça peut être utile surtout pour changer le thème d’un site (par exemple facebook) depuis une extension ou les styles utilisateur, sinon hors ça juste a savoir pour le cas ou.
merci, je note...
Par contre, csslint.net est un peu... comment dire ? ... tendu du warning, nan ?
“Don’t use IDs in selectors.” ou “Heading (h1) should not be qualified.” ou encore “The property -o-transform is compatible with -webkit-transform and -ms-transform and should be included as well.”
Really ?
clair ;-) faut tout personnaliser comme tu souhaite que ça t’avertisse, c’est surtout utile sur des gros projets ou tu met en place des rêgles pour canaliser tout les intervenants, sinon a titre perso normalement on sait a peut près ce qu’on fait ^^.
Ou quand on reprends un projet commencé par un/e d’autre, un petit check de principe …
A Demand for Russian ‘Hacking’ Proof
▻http://www.dedefensa.org/article/a-demand-for-russian-hacking-proof
Les VIPS à BHO : montrez les preuves
Veteran Intelligence Professionals for Sanity (VIPS), un groupement hautement qualifié d’anciens officiers du renseignement US communique un mémorandum au président Obama sur laquestion brûlante du “omplot russe” dans les élections présidentielles US. Le VIPS demande que des preiuves de ce “complot” soient produites aujourd’hui par Obama, lorsdesa defnières conférence de opresse de président. L’argument s’appuie sur l’évidence de jurispridence, montrée à plusieurs reprises par divers présidents,qu’en cas d’urgence de nationale, il est du devoir d’un président d’ignorer les règles de non-divulgation d’éléments obtenus par des moyens secrets par les services de renseignement, pour effectivement démontrer ce que ces servicxes avancent. Les VIPS, dont le mémo a été d’abord publié (...)
As President for a few more days, you have the power to demand concrete evidence of a link between the Russians and WikiLeaks, which published the bulk of the information in question. Lacking that evidence, the American people should be told that there is no fire under the smoke and mirrors of recent weeks.
We urge you to authorize public release of any tangible evidence that takes us beyond the unsubstantiated, “we-assess” judgments by the intelligence agencies. Otherwise, we – as well as other skeptical Americans – will be left with the corrosive suspicion that the intense campaign of accusations is part of a wider attempt to discredit the Russians and those – like Mr. Trump – who wish to deal constructively with them.
Remember the Maine?
(NB : une petite relecture du billet ne ferait pas de mal…)
Everyone Hacks
There is a lot of ambiguity – whether calculated or not – about “Russian hacking.” “Everyone knows that everyone hacks,” says everyone: Russia hacks; China hacks; every nation that can hacks. So do individuals of various nationalities. This is not the question.
Comme on le voit dans l’affaire Bauer, le mot « piratage » devient un fourre-tout qui permet d’accuser n’importe qui ou de camoufler n’importe quoi.
Our VIPS colleague William Binney, who was Technical Director of NSA and created many of the collection systems still in use, assures us that NSA’s “cast-iron” coverage – particularly surrounding Julian Assange and other people associated with WikiLeaks – would almost certainly have yielded a record of any electronic transfer from Russia to WikiLeaks. Binney has used some of the highly classified slides released by Edward Snowden to demonstrate precisely how NSA accomplishes this using trace mechanisms embedded throughout the network.
We strongly suggest that you ask NSA for any evidence it may have indicating that the results of Russian hacking were given to WikiLeaks. If NSA can produce such evidence, you may wish to order whatever declassification may be needed and then release the evidence. This would go a long way toward allaying suspicions that no evidence exists. If NSA cannot give you that information – and quickly – this would probably mean it does not have any.
In all candor, the checkered record of Director of National Intelligence James Clapper for trustworthiness makes us much less confident that anyone should take it on faith that he is more “trustworthy than the Russians,” as you suggested on Dec. 16. You will probably recall that Clapper lied under oath to the Senate Intelligence Committee on March 12, 2013, about NSA dragnet activities; later apologizing for testimony he admitted had been “clearly erroneous.”
#Hacks_or_Leaks?
Not mentioned until now is our conclusion that leaks are the source of the WikiLeaks disclosures in question – not hacking. Leaks normally leave no electronic trace. William Binney has been emphasizing this for several months and suggesting strongly that the disclosures were from a leaker with physical access to the information – not a hacker with only remote access.
(allez, un dernier…)
Prendre dans l’éducation ce dont on a besoin, tordre le système pour en tirer le meilleur et rejeter le pire.
Ce jeune « hacker de l’éducation » explique un état d’esprit qui le fait se faufiler dans le système éducatif, car il pratique le Hackschooling. Discipline réservée à ceux qui excellent déjà (mais pour qui popa et moman n’ont pas pu payer de prof particulier, je suppose).
Et comment le libéralisme et le libertarianisme s’immiscent dans ces pratiques de survie : Est ce que l’école tue la créativité ? Question déjà orientée…
▻http://graphism.fr/questce-le-hackschooling-rflexion-sur-lenseignement-le-hacking
#hackschooling #schoolhacking #school #hack
20 métiers étonnants qui pourraient exister dans le futur | Daily Geek Show
▻http://dailygeekshow.com/2013/09/16/20-metiers-etonnants-qui-pourraient-exister-dans-le-futur
Kesketufaislà @fil ?
Il faudra leur dire que #fermier_urbain ça existe déjà, et que c’est sûr que ça va se généraliser bientôt ...
Je vois plutôt : réparateur multifonction, recycleur de merdier, organisateur de circuits courts de covoiturage, conciliateur de proximité, conseiller en plantes locales, bidouilleur en récupérations énergétiques, dérivateur des fonctions premières des objets obsolètes.
Les plombiers et les électriciens seront les maîtres du monde.
Je suis en train de lire Wold War Z (ce qui me permet de comprendre à quel point le film éponyme n’est pas un machin fun mais bien une grosse bouse affligeante qui n’a rien compris au propos de l’auteur) et il décrit très bien les métiers de l’avenir : ceux qui sont utiles pour la survie, c’est à dire à peine 10% de ceux qui existent aujourd’hui.
les plombiers ne sont-ils pas déjà les maitres du monde ?
Et y’aura plein de conseillers de conseillers…
Tiens, je découvre le #Hackschooling
Je trouve déjà qu’avec les invasions de #coach on a atteint déjà un haut ratio d’inutilité !
Métiers disparus, métiers pas encore apparus - Information - France Culture
▻http://www.franceculture.fr/emission-ce-qui-nous-arrive-sur-la-toile-ce-qui-nous-arrive-sur-la-toi
J’en étais là de mes réflexions – encore une fois assez puissantes – quand quelqu’un, sur un réseau où j’avais mis en lien cette recension, a réagi en mettant en lien un autre article : « 20 métiers étonnants qui pourraient exister dans le futur. »
Laissez moi vous conter la petite histoire des circonvolutions de ce post :
Une amie cherchant du boulot tombe sur la page internet des « 20 métiers qui pourraient exister » et m’envoie un mail il y a une semaine pour me la signaler, je la partage sur seenthis, @xporte publie les « 20 métiers disparus » et fait du rapprochement des deux seen le sujet de son émission radio. Là où ça devient assez drôle c’est que cette amie l’a écoutée par hasard hier matin en prenant son p’tit déj’, elle vient de me renvoyer un mail pour s’en amuser !
Thai Flood Hacks
►http://thai-flood-hacks.tumblr.com
#thailande #inondation #hacks via @karlpro
{ visibility: inherit; } IE6 min/max - height/width
►http://www.visibilityinherit.com/code/ie6-min-max-height-width.php
hacks:contents \ Hacks \ Processing 1.0
►http://processing.org/hacks
pas mal de tips pour bien coupler processing et java + plein de trucs supers
CSS Hacks
►http://www.webdevout.net/css-hacks
Les bons et les méchants hacks css
#css #design #hacks #ie #ressources #reference #standards #browser