Bookmarks - September 2018
Parallel programming with Python, top 10 Android terminal commands, cyber security topics and more …
Parallel programming with Python
Short course on how to implement parallel programming patterns (e.g. map/reduce) in Python:
10 Basic Android terminal commands you should know
Summary of 10 commands you can use with the adb program. There is one important command that I think is missing from this article which is the backup command allowing you to create an image of your phone for backup to disk. https://www.androidcentral.com/10-basic-terminal-commands-you-should-know?amp
Stephanos Constantinou Blog
This blog is centered around PowerShell scripting. If you can get around the plethora of adverts there are some useful tips and tutorials here:
This is a tool for poking around with Windows security. You can use it to extract plaintext passwords, perform pass-the-hash, pass-the-ticket or build Golden tickets (a dangerous vulnerability in Active Directory). A useful tool for PEN testing or understanding how Windows security works. The developer’s blog is also well worth reading.
A node module for finding unused ports. It’s useful for example when creating a multi instance express server.
The standard example of parallax scrolling on a web page is when two background images are layered on top of each other, and when scrolling the page one of the images translates faster than the other.
Skrollr is a library that took this to another level. Unfortunately the project has been abandoned, and the repository is archived on GitHub, but the examples are well worth looking at because they demonstrate what’s possible when you take parallax scrolling to the extreme. My favourite example is tracing an SVG path when scrolling: https://prinzhorn.github.io/skrollr/examples/path.html.
Cryptography based on Algebraic Coding Theory
Article about post quantum cryptography algorithms. One of the contenders is code-based cryptography, which utilizes computationally hard problems in algebraic coding theory. The article describes how the McEliece algorithm works:
GitHub account takeover
Read this if you use GitHub. If you create a user/repository and subsequently delete it, then it’s possible for someone else to take over the name for their own account/repository. This could be open to abuse if someone deletes a popular repository and it then gets replaced with something malicious. Someone cloning from a git URL without checking what they were pulling could lead to trouble.
RSA 230 has been factorized!
Launch an elevated cmd without UAC challenge
If you run Windows as an administrator user then you can launch an elevated command prompt without a UAC challenge by running the following:
Google Optimize now has a free tier
The word for how it smells after it rains is
How to create an Ed25519 SSH key
By default the
ssh-keygen command creates a 2048 bit RSA key pair. Ed25519 is an elliptic curve cipher that offers a smaller key size for similar if not better security compared with RSA and ECDSA. To create one, run the following command and complete all the prompts:
NPM package for creating/managing git hooks
Git hooks are custom commands that are executed when you run
git commit or
git push on your repository. This allows you to perform checks such as linting, running tests, or beautifying code. By running the commands automatically you can prevent bad commits and pushes without needing to remember or rely on code review. If you’re writing a node.js app then there’s an NPM module called husky allows you to define your git hooks in the