[{"title":"How to write tests that will still be used in one year","link":"https://www.reddit.com/r/programming/comments/iv4c9a/how_to_write_tests_that_will_still_be_used_in_one/","comments":"https://www.reddit.com/r/programming/comments/iv4c9a/how_to_write_tests_that_will_still_be_used_in_one/","updated_at":"2020-09-18T11:32:02+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv4c9a/how_to_write_tests_that_will_still_be_used_in_one/","link_host":"reddit.com","from":"reddit"},{"title":"Configurable startup script for Microsoft Teams (or any other app after customization)","link":"https://www.reddit.com/r/programming/comments/iv4bus/configurable_startup_script_for_microsoft_teams/","comments":"https://www.reddit.com/r/programming/comments/iv4bus/configurable_startup_script_for_microsoft_teams/","updated_at":"2020-09-18T11:31:08+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv4bus/configurable_startup_script_for_microsoft_teams/","link_host":"reddit.com","from":"reddit"},{"title":"Search and replace tricks with ripgrep","link":"https://www.reddit.com/r/programming/comments/iv4b96/search_and_replace_tricks_with_ripgrep/","comments":"https://www.reddit.com/r/programming/comments/iv4b96/search_and_replace_tricks_with_ripgrep/","updated_at":"2020-09-18T11:29:50+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv4b96/search_and_replace_tricks_with_ripgrep/","link_host":"reddit.com","from":"reddit"},{"title":"The Most Popular Programming Languages - 1965/2020","link":"https://www.reddit.com/r/programming/comments/iv47ar/the_most_popular_programming_languages_19652020/","comments":"https://www.reddit.com/r/programming/comments/iv47ar/the_most_popular_programming_languages_19652020/","updated_at":"2020-09-18T11:21:05+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv47ar/the_most_popular_programming_languages_19652020/","link_host":"reddit.com","from":"reddit"},{"title":"Electronic space beats for programming at work today","link":"https://www.reddit.com/r/programming/comments/iv41u6/electronic_space_beats_for_programming_at_work/","comments":"https://www.reddit.com/r/programming/comments/iv41u6/electronic_space_beats_for_programming_at_work/","updated_at":"2020-09-18T11:08:11+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv41u6/electronic_space_beats_for_programming_at_work/","link_host":"reddit.com","from":"reddit"},{"title":"RTX3080 TensorFlow and NAMD Performance on Linux (Preliminary)","description":"<a href="https://news.ycombinator.com/item?id=24515229">Comments</a>","link":"https://www.pugetsystems.com/labs/hpc/RTX3080-TensorFlow-and-NAMD-Performance-on-Linux-Preliminary-1885/","comments":"https://news.ycombinator.com/item?id=24515229","updated_at":"2020-09-18T10:59:57+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24515229","link_host":"www.pugetsystems.com","from":"hackernews"},{"title":"GPT-3: new AI can write like a human but don't mistake that for thinking – neuroscientist","link":"https://www.reddit.com/r/programming/comments/iv3rll/gpt3_new_ai_can_write_like_a_human_but_dont/","comments":"https://www.reddit.com/r/programming/comments/iv3rll/gpt3_new_ai_can_write_like_a_human_but_dont/","updated_at":"2020-09-18T10:44:53+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv3rll/gpt3_new_ai_can_write_like_a_human_but_dont/","link_host":"reddit.com","from":"reddit"},{"title":"What happened to Firefox Send?","description":"<a href="https://news.ycombinator.com/item?id=24515063">Comments</a>","link":"https://support.mozilla.org/en-US/kb/what-happened-firefox-send","comments":"https://news.ycombinator.com/item?id=24515063","updated_at":"2020-09-18T10:36:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24515063","link_host":"support.mozilla.org","from":"hackernews"},{"title":"I wrote down my thoughts and experiences with code review, and proposed some tips for everybody involved – to make the process more about the code quality and less about personal traumas. What do you think?","link":"https://www.reddit.com/r/programming/comments/iv3mo9/i_wrote_down_my_thoughts_and_experiences_with/","comments":"https://www.reddit.com/r/programming/comments/iv3mo9/i_wrote_down_my_thoughts_and_experiences_with/","updated_at":"2020-09-18T10:33:16+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv3mo9/i_wrote_down_my_thoughts_and_experiences_with/","link_host":"reddit.com","from":"reddit"},{"title":"Reinventing virtualization with the AWS Nitro System","description":"<a href="https://news.ycombinator.com/item?id=24515019">Comments</a>","link":"https://www.allthingsdistributed.com/2020/09/reinventing-virtualization-with-aws-nitro.html","comments":"https://news.ycombinator.com/item?id=24515019","updated_at":"2020-09-18T10:27:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24515019","link_host":"www.allthingsdistributed.com","from":"hackernews"},{"title":"OpenSCAD - The Programmers Solid 3D CAD Modeller","description":"<a href="https://news.ycombinator.com/item?id=24514978">Comments</a>","link":"http://www.openscad.org/","comments":"https://news.ycombinator.com/item?id=24514978","updated_at":"2020-09-18T10:20:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514978","link_host":"www.openscad.org","from":"hackernews"},{"title":"Security Headlines: cURL special with Daniel Stenberg [audio]","description":"<a href="https://news.ycombinator.com/item?id=24514932">Comments</a>","link":"https://blog.firosolutions.com/2020/09/security-headlines-curl-special/","comments":"https://news.ycombinator.com/item?id=24514932","updated_at":"2020-09-18T10:10:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514932","link_host":"blog.firosolutions.com","from":"hackernews"},{"title":"Piratebay.org Now Being Used to Crowdsource “The Torrent Man” Film","description":"<a href="https://news.ycombinator.com/item?id=24514863">Comments</a>","link":"https://torrentfreak.com/piratebay-org-now-being-used-to-crowdsource-the-torrent-man-film-200918/","comments":"https://news.ycombinator.com/item?id=24514863","updated_at":"2020-09-18T09:56:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514863","link_host":"torrentfreak.com","from":"hackernews"},{"title":"Update on Firefox Send and Firefox Notes","link":"https://www.reddit.com/r/programming/comments/iv2y76/update_on_firefox_send_and_firefox_notes/","comments":"https://www.reddit.com/r/programming/comments/iv2y76/update_on_firefox_send_and_firefox_notes/","updated_at":"2020-09-18T09:32:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv2y76/update_on_firefox_send_and_firefox_notes/","link_host":"reddit.com","from":"reddit"},{"title":"John Carmack’s presentation at Facebook Connect [video]","description":"<a href="https://news.ycombinator.com/item?id=24514702">Comments</a>","link":"https://www.youtube.com/watch?v=sXmY26pOE-Y","comments":"https://news.ycombinator.com/item?id=24514702","updated_at":"2020-09-18T09:26:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514702","link_host":"www.youtube.com","from":"hackernews"},{"title":"When double.Epsilon can equal 0","link":"https://www.reddit.com/r/programming/comments/iv2vwr/when_doubleepsilon_can_equal_0/","comments":"https://www.reddit.com/r/programming/comments/iv2vwr/when_doubleepsilon_can_equal_0/","updated_at":"2020-09-18T09:26:05+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv2vwr/when_doubleepsilon_can_equal_0/","link_host":"reddit.com","from":"reddit"},{"title":"JoCrypt. Easy low-level encryption framework","link":"https://www.reddit.com/r/programming/comments/iv2rvg/jocrypt_easy_lowlevel_encryption_framework/","comments":"https://www.reddit.com/r/programming/comments/iv2rvg/jocrypt_easy_lowlevel_encryption_framework/","updated_at":"2020-09-18T09:15:39+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv2rvg/jocrypt_easy_lowlevel_encryption_framework/","link_host":"reddit.com","from":"reddit"},{"title":"2 Hackers Charged for Defacing Sites after U.S. Airstrike Killed Iranian General","description":"The US Department of Justice (DoJ) on Tuesday indicted two hackers for their alleged involvement in defacing several websites in the country following the assassination of Iranian major general Qasem Soleimani earlier this January.\n\nBehzad Mohammadzadeh (aka Mrb3hz4d), 19, and Marwan Abusrour (aka Mrwn007), 25, have been charged with conspiracy to commit intentional damage to a protected<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/99yKi5Hfleo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/99yKi5Hfleo/soleimani-website-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/99yKi5Hfleo/soleimani-website-hacking.html","updated_at":"2020-09-18T08:48:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/99yKi5Hfleo/soleimani-website-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"U.S. Treasury Sanctions Hacking Group Backed by Iranian Intelligence","description":"The U.S. government on Thursday imposed sweeping sanctions against an Iranian threat actor backed by the country's Ministry of Intelligence and Security (MOIS) for carrying out malware campaigns targeting Iranian dissidents, journalists, and international companies in the telecom and travel sectors.\nAccording to the U.S. Treasury and the Federal Bureau of Investigation (FBI), the sanctions target<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/j52Nzlm09Xc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/j52Nzlm09Xc/iranian-hackers-sanctioned.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/j52Nzlm09Xc/iranian-hackers-sanctioned.html","updated_at":"2020-09-18T08:45:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/j52Nzlm09Xc/iranian-hackers-sanctioned.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Accused of Watching Instagram Users Through Cameras","description":"<a href="https://news.ycombinator.com/item?id=24514433">Comments</a>","link":"https://www.bloomberg.com/news/articles/2020-09-18/facebook-accused-of-watching-instagram-users-through-cameras","comments":"https://news.ycombinator.com/item?id=24514433","updated_at":"2020-09-18T08:43:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514433","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"Extracting data from simple online dictionary's entries","link":"https://www.reddit.com/r/programming/comments/iv2406/extracting_data_from_simple_online_dictionarys/","comments":"https://www.reddit.com/r/programming/comments/iv2406/extracting_data_from_simple_online_dictionarys/","updated_at":"2020-09-18T08:15:35+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv2406/extracting_data_from_simple_online_dictionarys/","link_host":"reddit.com","from":"reddit"},{"title":"Actix Web v3.0","description":"<a href="https://news.ycombinator.com/item?id=24514212">Comments</a>","link":"https://paper.dropbox.com/published/Announcing-Actix-Web-v3.0-QOXXb1lXgTubzXHzUq9ONY5","comments":"https://news.ycombinator.com/item?id=24514212","updated_at":"2020-09-18T08:12:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514212","link_host":"paper.dropbox.com","from":"hackernews"},{"title":"Writing an x86 bootloader in Rust that can launch vmlinux","description":"<a href="https://news.ycombinator.com/item?id=24514100">Comments</a>","link":"https://vmm.dev/en/rust/krabs.md","comments":"https://news.ycombinator.com/item?id=24514100","updated_at":"2020-09-18T07:54:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24514100","link_host":"vmm.dev","from":"hackernews"},{"title":"Android 11 — 5 New Security and Privacy Features You Need to Know","description":"After a long wait and months of beta testing, Google last week finally released Android 11, the latest version of the Android mobile operating system—with features offering billions of its users more control over their data security and privacy.\nAndroid security is always a hot topic and almost always for the wrong reason, including Google's failure to prevent malicious apps from being<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/k7U3jsgD2Y0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/k7U3jsgD2Y0/android-11-security-privacy.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k7U3jsgD2Y0/android-11-security-privacy.html","updated_at":"2020-09-18T07:47:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k7U3jsgD2Y0/android-11-security-privacy.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Design System Starter Kit & Wireframes builder & 120 customizable illustrations. Tetrisly + Whoooa! great bundle 25% off.","description":"https://gumroad.com/l/tetrislywhoooa/designernews","link":"https://www.designernews.co/stories/110930-design-system-starter-kit--wireframes-builder--120-customizable-illustrations-tetrisly--whoooa-great-bundle-25-off","comments":"https://www.designernews.co/stories/110930-design-system-starter-kit--wireframes-builder--120-customizable-illustrations-tetrisly--whoooa-great-bundle-25-off","updated_at":"2020-09-18T07:45:09+00:00","link_to_comments":"https://www.designernews.co/stories/110930-design-system-starter-kit--wireframes-builder--120-customizable-illustrations-tetrisly--whoooa-great-bundle-25-off","link_host":"gumroad.com","from":"designernews"},{"title":"21 years after the request OpenPGP support gets added to Thunderbird","link":"https://www.reddit.com/r/programming/comments/iv1iho/21_years_after_the_request_openpgp_support_gets/","comments":"https://www.reddit.com/r/programming/comments/iv1iho/21_years_after_the_request_openpgp_support_gets/","updated_at":"2020-09-18T07:19:45+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv1iho/21_years_after_the_request_openpgp_support_gets/","link_host":"reddit.com","from":"reddit"},{"title":"Apple: Unreal Engine is a trojan horse.","link":"https://www.reddit.com/r/programming/comments/iv1dn4/apple_unreal_engine_is_a_trojan_horse/","comments":"https://www.reddit.com/r/programming/comments/iv1dn4/apple_unreal_engine_is_a_trojan_horse/","updated_at":"2020-09-18T07:08:08+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iv1dn4/apple_unreal_engine_is_a_trojan_horse/","link_host":"reddit.com","from":"reddit"},{"title":"How can we, as web professionals, help to make the web more energy efficient?","description":"<a href="https://news.ycombinator.com/item?id=24513427">Comments</a>","link":"https://cmhb.de/web-design-and-carbon-impact","comments":"https://news.ycombinator.com/item?id=24513427","updated_at":"2020-09-18T06:02:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24513427","link_host":"cmhb.de","from":"hackernews"},{"title":"FreeCAD: A free and open source multiplatform 3D parametric modeler","description":"<a href="https://news.ycombinator.com/item?id=24513340">Comments</a>","link":"https://github.com/FreeCAD/FreeCAD","comments":"https://news.ycombinator.com/item?id=24513340","updated_at":"2020-09-18T05:41:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24513340","link_host":"github.com","from":"hackernews"},{"title":"Lua in the Kernel?","description":"<a href="https://news.ycombinator.com/item?id=24513261">Comments</a>","link":"https://lwn.net/Articles/830154/","comments":"https://news.ycombinator.com/item?id=24513261","updated_at":"2020-09-18T05:21:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24513261","link_host":"lwn.net","from":"hackernews"},{"title":"GitHub CLI 1.0: All you need to know","link":"https://www.reddit.com/r/programming/comments/iuzjq8/github_cli_10_all_you_need_to_know/","comments":"https://www.reddit.com/r/programming/comments/iuzjq8/github_cli_10_all_you_need_to_know/","updated_at":"2020-09-18T04:38:48+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuzjq8/github_cli_10_all_you_need_to_know/","link_host":"reddit.com","from":"reddit"},{"title":"AlpineJS Guides and Examples","description":"<a href="https://news.ycombinator.com/item?id=24513044">Comments</a>","link":"https://www.alpinetoolbox.com/","comments":"https://news.ycombinator.com/item?id=24513044","updated_at":"2020-09-18T04:34:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24513044","link_host":"www.alpinetoolbox.com","from":"hackernews"},{"title":"Project Loom: Modern Scalable Concurrency for the Java Platform","link":"https://www.reddit.com/r/programming/comments/iux6dd/project_loom_modern_scalable_concurrency_for_the/","comments":"https://www.reddit.com/r/programming/comments/iux6dd/project_loom_modern_scalable_concurrency_for_the/","updated_at":"2020-09-18T01:54:32+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iux6dd/project_loom_modern_scalable_concurrency_for_the/","link_host":"reddit.com","from":"reddit"},{"title":"Trials begin for a new weapon against Parkinson’s: light","description":"<a href="https://news.ycombinator.com/item?id=24512158">Comments</a>","link":"https://www.sciencemag.org/news/2020/09/trials-begin-new-weapon-against-parkinson-s-light","comments":"https://news.ycombinator.com/item?id=24512158","updated_at":"2020-09-18T01:53:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24512158","link_host":"www.sciencemag.org","from":"hackernews"},{"title":"Ice","description":"<a href="https://news.ycombinator.com/item?id=24511321">Comments</a>","link":"https://hivewired.wordpress.com/2020/09/06/ice/","comments":"https://news.ycombinator.com/item?id=24511321","updated_at":"2020-09-17T23:45:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24511321","link_host":"hivewired.wordpress.com","from":"hackernews"},{"title":"Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack","link":"https://www.reddit.com/r/programming/comments/iuts0i/chinese_antivirus_firm_was_part_of_apt41_supply/","comments":"https://www.reddit.com/r/programming/comments/iuts0i/chinese_antivirus_firm_was_part_of_apt41_supply/","updated_at":"2020-09-17T22:21:10+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuts0i/chinese_antivirus_firm_was_part_of_apt41_supply/","link_host":"reddit.com","from":"reddit"},{"title":"21 years after the request OpenPGP support gets added to Thunderbird","description":"<a href="https://news.ycombinator.com/item?id=24510053">Comments</a>","link":"https://bugzilla.mozilla.org/show_bug.cgi?id=22687","comments":"https://news.ycombinator.com/item?id=24510053","updated_at":"2020-09-17T21:14:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24510053","link_host":"bugzilla.mozilla.org","from":"hackernews"},{"title":"The Russian vaccine for COVID-19","description":"<a href="https://news.ycombinator.com/item?id=24509389">Comments</a>","link":"https://www.thelancet.com/journals/lanres/article/PIIS2213-2600(20)30402-1/fulltext","comments":"https://news.ycombinator.com/item?id=24509389","updated_at":"2020-09-17T20:12:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24509389","link_host":"www.thelancet.com","from":"hackernews"},{"title":"Marker - Open source hand-drawn illustrations","description":"https://usepastel.com/marker-illustrations","link":"https://www.designernews.co/stories/110926-marker--open-source-handdrawn-illustrations","comments":"https://www.designernews.co/stories/110926-marker--open-source-handdrawn-illustrations","updated_at":"2020-09-17T17:34:19+00:00","link_to_comments":"https://www.designernews.co/stories/110926-marker--open-source-handdrawn-illustrations","link_host":"usepastel.com","from":"designernews"},{"title":"My Favorite Rust Function Signature","link":"https://www.reddit.com/r/programming/comments/iunihz/my_favorite_rust_function_signature/","comments":"https://www.reddit.com/r/programming/comments/iunihz/my_favorite_rust_function_signature/","updated_at":"2020-09-17T16:58:38+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iunihz/my_favorite_rust_function_signature/","link_host":"reddit.com","from":"reddit"},{"title":"Endlessh – an SSH tarpit that slowly sends an endless banner","link":"https://www.reddit.com/r/programming/comments/iulz8w/endlessh_an_ssh_tarpit_that_slowly_sends_an/","comments":"https://www.reddit.com/r/programming/comments/iulz8w/endlessh_an_ssh_tarpit_that_slowly_sends_an/","updated_at":"2020-09-17T15:42:33+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iulz8w/endlessh_an_ssh_tarpit_that_slowly_sends_an/","link_host":"reddit.com","from":"reddit"},{"title":"Evernote spent 18 months fixing their Tech Debt to be better prepared for the future.","link":"https://www.reddit.com/r/programming/comments/iulp4q/evernote_spent_18_months_fixing_their_tech_debt/","comments":"https://www.reddit.com/r/programming/comments/iulp4q/evernote_spent_18_months_fixing_their_tech_debt/","updated_at":"2020-09-17T15:28:19+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iulp4q/evernote_spent_18_months_fixing_their_tech_debt/","link_host":"reddit.com","from":"reddit"},{"title":"The mmap() copy-on-write trick: reducing memory usage of array copies","link":"https://www.reddit.com/r/programming/comments/iuksrl/the_mmap_copyonwrite_trick_reducing_memory_usage/","comments":"https://www.reddit.com/r/programming/comments/iuksrl/the_mmap_copyonwrite_trick_reducing_memory_usage/","updated_at":"2020-09-17T14:42:01+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuksrl/the_mmap_copyonwrite_trick_reducing_memory_usage/","link_host":"reddit.com","from":"reddit"},{"title":"Why empathy is vital in design","description":"https://www.imaginarycloud.com/blog/why-empathy-is-vital-in-a-user-centered-design-approach/","link":"https://www.designernews.co/stories/110925-why-empathy-is-vital-in-design","comments":"https://www.designernews.co/stories/110925-why-empathy-is-vital-in-design","updated_at":"2020-09-17T14:31:10+00:00","link_to_comments":"https://www.designernews.co/stories/110925-why-empathy-is-vital-in-design","link_host":"www.imaginarycloud.com","from":"designernews"},{"title":"Data-Oriented Programming in Python","description":"<a href="https://news.ycombinator.com/item?id=24504947">Comments</a>","link":"https://www.moderndescartes.com/essays/data_oriented_python/","comments":"https://news.ycombinator.com/item?id=24504947","updated_at":"2020-09-17T14:21:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24504947","link_host":"www.moderndescartes.com","from":"hackernews"},{"title":"Zenscrape: A Simple Web Scraping Solution for Penetration Testers ","description":"Did you ever try extracting any information from any website? Well, if you have then you have surely enacted web scraping functions without even knowing it!\n\nTo put in simpler terms, Web scraping, or also known as web data extraction, is the process of recouping or sweeping data from web-pages. It is a much faster and easier process of retrieving data without undergoing the time-consuming<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jMaLNotLkHA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jMaLNotLkHA/zenscrape-simple-web-scraping-solution.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jMaLNotLkHA/zenscrape-simple-web-scraping-solution.html","updated_at":"2020-09-17T14:14:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jMaLNotLkHA/zenscrape-simple-web-scraping-solution.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The future of .NET Standard | .NET Blog","link":"https://www.reddit.com/r/programming/comments/iuk4sf/the_future_of_net_standard_net_blog/","comments":"https://www.reddit.com/r/programming/comments/iuk4sf/the_future_of_net_standard_net_blog/","updated_at":"2020-09-17T14:06:13+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuk4sf/the_future_of_net_standard_net_blog/","link_host":"reddit.com","from":"reddit"},{"title":"Shortt–Synchronome free pendulum clock","description":"<a href="https://news.ycombinator.com/item?id=24504583">Comments</a>","link":"https://en.wikipedia.org/wiki/Shortt–Synchronome_clock","comments":"https://news.ycombinator.com/item?id=24504583","updated_at":"2020-09-17T13:51:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24504583","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"How to Design Mobile Product Pages for Greater Sales","description":"https://designmodo.com/mobile-product-pages/","link":"https://www.designernews.co/stories/110922-how-to-design-mobile-product-pages-for-greater-sales","comments":"https://www.designernews.co/stories/110922-how-to-design-mobile-product-pages-for-greater-sales","updated_at":"2020-09-17T13:20:34+00:00","link_to_comments":"https://www.designernews.co/stories/110922-how-to-design-mobile-product-pages-for-greater-sales","link_host":"designmodo.com","from":"designernews"},{"title":"Cloudflare and the Wayback Machine, joining forces for a more reliable Web","description":"<a href="https://news.ycombinator.com/item?id=24504080">Comments</a>","link":"http://blog.archive.org/2020/09/17/internet-archive-partners-with-cloudflare-to-help-make-the-web-more-useful-and-reliable/","comments":"https://news.ycombinator.com/item?id=24504080","updated_at":"2020-09-17T13:03:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24504080","link_host":"blog.archive.org","from":"hackernews"},{"title":"GitHub CLI 1.0","link":"https://www.reddit.com/r/programming/comments/iuiz13/github_cli_10/","comments":"https://www.reddit.com/r/programming/comments/iuiz13/github_cli_10/","updated_at":"2020-09-17T13:01:15+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuiz13/github_cli_10/","link_host":"reddit.com","from":"reddit"},{"title":"OCaml Labs breakthrough - good things come to those who wait","link":"https://www.reddit.com/r/programming/comments/iuio1n/ocaml_labs_breakthrough_good_things_come_to_those/","comments":"https://www.reddit.com/r/programming/comments/iuio1n/ocaml_labs_breakthrough_good_things_come_to_those/","updated_at":"2020-09-17T12:42:12+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iuio1n/ocaml_labs_breakthrough_good_things_come_to_those/","link_host":"reddit.com","from":"reddit"},{"title":"U.S. Announces Charges Against 2 Russian and 2 Iranian Hackers","description":"Immediately after revealing criminal charges against 5 Chinese and 2 Malaysian hackers, the United States government yesterday also made two separate announcements charging two Iranian and two Russian hackers and added them to the FBI's most-wanted list.\nThe two Russian nationals—Danil Potekhin and Dmitrii Karasavidi—are accused of stealing $16.8 million worth of cryptocurrencies in a series of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/qOA2VNflNh0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/qOA2VNflNh0/us-announces-charges-against-2-russian.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qOA2VNflNh0/us-announces-charges-against-2-russian.html","updated_at":"2020-09-17T12:01:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qOA2VNflNh0/us-announces-charges-against-2-russian.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Show HN: Oscillator Bank / Spectral Synthesizer","description":"<a href="https://news.ycombinator.com/item?id=24503529">Comments</a>","link":"https://github.com/grz0zrg/fas","comments":"https://news.ycombinator.com/item?id=24503529","updated_at":"2020-09-17T11:59:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24503529","link_host":"github.com","from":"hackernews"},{"title":"Free sketch welcome and onboarding email templates","description":"https://craftingemails.com/email-templates","link":"https://www.designernews.co/stories/110918-free-sketch-welcome-and-onboarding-email-templates","comments":"https://www.designernews.co/stories/110918-free-sketch-welcome-and-onboarding-email-templates","updated_at":"2020-09-17T11:33:53+00:00","link_to_comments":"https://www.designernews.co/stories/110918-free-sketch-welcome-and-onboarding-email-templates","link_host":"craftingemails.com","from":"designernews"},{"title":"Introducing the Overflow plugin for Figma","description":"https://blog.overflow.io/introducing-the-overflow-plugin-for-figma-60413248c9f1","link":"https://www.designernews.co/stories/110917-introducing-the-overflow-plugin-for-figma","comments":"https://www.designernews.co/stories/110917-introducing-the-overflow-plugin-for-figma","updated_at":"2020-09-17T11:00:10+00:00","link_to_comments":"https://www.designernews.co/stories/110917-introducing-the-overflow-plugin-for-figma","link_host":"blog.overflow.io","from":"designernews"},{"title":"Croc: Easily and securely send things from one computer to another","description":"<a href="https://news.ycombinator.com/item?id=24503077">Comments</a>","link":"https://github.com/schollz/croc","comments":"https://news.ycombinator.com/item?id=24503077","updated_at":"2020-09-17T10:51:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24503077","link_host":"github.com","from":"hackernews"},{"title":"Rails Concerns: To Concern or Not to Concern","description":"<a href="https://news.ycombinator.com/item?id=24503022">Comments</a>","link":"https://blog.appsignal.com/2020/09/16/rails-concers-to-concern-or-not-to-concern.html","comments":"https://news.ycombinator.com/item?id=24503022","updated_at":"2020-09-17T10:44:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24503022","link_host":"blog.appsignal.com","from":"hackernews"},{"title":"To All the Jobs I Had Before","description":"<a href="https://news.ycombinator.com/item?id=24502983">Comments</a>","link":"https://elisabethirgens.github.io/notes/2020/09/to-all-jobs-i-had-before/","comments":"https://news.ycombinator.com/item?id=24502983","updated_at":"2020-09-17T10:37:57+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24502983","link_host":"elisabethirgens.github.io","from":"hackernews"},{"title":"Help us make pip (Python's default package manager) better by telling us what features you value","link":"https://www.reddit.com/r/programming/comments/iufyku/help_us_make_pip_pythons_default_package_manager/","comments":"https://www.reddit.com/r/programming/comments/iufyku/help_us_make_pip_pythons_default_package_manager/","updated_at":"2020-09-17T09:15:27+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iufyku/help_us_make_pip_pythons_default_package_manager/","link_host":"reddit.com","from":"reddit"},{"title":"FBI adds 5 Chinese APT41 hackers to its Cyber's Most Wanted List","description":"The United States government today announced charges against 5 alleged members of a Chinese state-sponsored hacking group and 2 Malaysian hackers that are responsible for hacking more than 100 companies throughout the world.\n\nNamed as APT41 and also known as 'Barium,' 'Winnti, 'Wicked Panda,' and 'Wicked Spider,' the cyber-espionage group has been operating since at least 2012 and is not just<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/6steMmbPRmE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/6steMmbPRmE/apt41-hackers-wanted-by-fbi.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6steMmbPRmE/apt41-hackers-wanted-by-fbi.html","updated_at":"2020-09-17T08:29:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6steMmbPRmE/apt41-hackers-wanted-by-fbi.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Introduction to the Modeling and Analysis of Complex Systems","description":"<a href="https://news.ycombinator.com/item?id=24502294">Comments</a>","link":"https://textbooks.opensuny.org/introduction-to-the-modeling-and-analysis-of-complex-systems/","comments":"https://news.ycombinator.com/item?id=24502294","updated_at":"2020-09-17T08:20:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24502294","link_host":"textbooks.opensuny.org","from":"hackernews"},{"title":"Landing Page 101: How to design a landing page that converts","description":"https://dribbble.com/stories/2020/09/10/design-landing-pages-that-convert","link":"https://www.designernews.co/stories/110916-landing-page-101-how-to-design-a-landing-page-that-converts","comments":"https://www.designernews.co/stories/110916-landing-page-101-how-to-design-a-landing-page-that-converts","updated_at":"2020-09-17T08:15:02+00:00","link_to_comments":"https://www.designernews.co/stories/110916-landing-page-101-how-to-design-a-landing-page-that-converts","link_host":"dribbble.com","from":"designernews"},{"title":"Space Tethers: Stringing Up the Solar System","description":"<a href="https://news.ycombinator.com/item?id=24502140">Comments</a>","link":"https://toughsf.blogspot.com/2020/07/tethers-all-way.html","comments":"https://news.ycombinator.com/item?id=24502140","updated_at":"2020-09-17T07:48:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24502140","link_host":"toughsf.blogspot.com","from":"hackernews"},{"title":"7 Principles Of Icon Design","description":"https://marketsplash.com/icon-design/","link":"https://www.designernews.co/stories/110915-7-principles-of-icon-design","comments":"https://www.designernews.co/stories/110915-7-principles-of-icon-design","updated_at":"2020-09-17T07:39:37+00:00","link_to_comments":"https://www.designernews.co/stories/110915-7-principles-of-icon-design","link_host":"marketsplash.com","from":"designernews"},{"title":"Array Programming with NumPy","description":"<a href="https://news.ycombinator.com/item?id=24501511">Comments</a>","link":"https://www.nature.com/articles/s41586-020-2649-2","comments":"https://news.ycombinator.com/item?id=24501511","updated_at":"2020-09-17T05:31:25+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24501511","link_host":"www.nature.com","from":"hackernews"},{"title":"Hacking on Bug Bounties for Four Years","description":"<a href="https://news.ycombinator.com/item?id=24500198">Comments</a>","link":"https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/","comments":"https://news.ycombinator.com/item?id=24500198","updated_at":"2020-09-17T01:29:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24500198","link_host":"blog.assetnote.io","from":"hackernews"},{"title":"This electrical transmission tower has a problem","description":"<a href="https://news.ycombinator.com/item?id=24499924">Comments</a>","link":"https://twitter.com/tubetimeus/status/1306359385656946688","comments":"https://news.ycombinator.com/item?id=24499924","updated_at":"2020-09-17T00:49:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=24499924","link_host":"twitter.com","from":"hackernews"},{"title":"DesignerNews is billing my credit card and not displaying the job post","description":"I have been trying to publish a job post on this platform since last week. Every time I tried, I got a red 500 error screen.\n\nI tried more than 10 times and always got the same result. I sent you an email asking for support on this (hello@designernews.co), no luck, never replied back. Also, I can't even remove my credit card because the "Remove card" button doesn't work.\n\nToday I called my bank and ask if there were some sort of issue with my card. It turns out you have been billing my credit card (around 11 times already, which is more than $2000) and you never published the job on the platform.\n\nIs this even legal? Can you please fix your platform and refund my money?","link":"https://www.designernews.co/stories/110910-designernews-is-billing-my-credit-card-and-not-displaying-the-job-post","comments":"https://www.designernews.co/stories/110910-designernews-is-billing-my-credit-card-and-not-displaying-the-job-post","updated_at":"2020-09-16T21:18:55+00:00","link_to_comments":"https://www.designernews.co/stories/110910-designernews-is-billing-my-credit-card-and-not-displaying-the-job-post","link_host":null,"from":"designernews"},{"title":"I Suspect many Task Deadlines are Designed to Force Engineers to Work for Free","link":"https://www.reddit.com/r/programming/comments/iu4cud/i_suspect_many_task_deadlines_are_designed_to/","comments":"https://www.reddit.com/r/programming/comments/iu4cud/i_suspect_many_task_deadlines_are_designed_to/","updated_at":"2020-09-16T20:48:10+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/iu4cud/i_suspect_many_task_deadlines_are_designed_to/","link_host":"reddit.com","from":"reddit"},{"title":"The Most Important Rule in UX Design that Everyone Breaks","description":"https://blog.prototypr.io/the-most-important-rule-in-ux-design-that-everyone-breaks-1c1cb188931","link":"https://www.designernews.co/stories/110897-the-most-important-rule-in-ux-design-that-everyone-breaks","comments":"https://www.designernews.co/stories/110897-the-most-important-rule-in-ux-design-that-everyone-breaks","updated_at":"2020-09-16T11:52:31+00:00","link_to_comments":"https://www.designernews.co/stories/110897-the-most-important-rule-in-ux-design-that-everyone-breaks","link_host":"blog.prototypr.io","from":"designernews"},{"title":"Angel Steger | Director Of Product Design at Facebook - How a “bad hookup face” helped Pinterest increase virality and retention.","description":"https://www.churn.fm/episode/more-than-numbers-how-a-bad-hookup-face-helped-pinterest-increase-virality-and-retention?utm_source=designer_news&utm_medium=story&utm_campaign=new_episodes&utm_content=angel_steger","link":"https://www.designernews.co/stories/110893-angel-steger--director-of-product-design-at-facebook--how-a-bad-hookup-face-helped-pinterest-increase-virality-and-retention","comments":"https://www.designernews.co/stories/110893-angel-steger--director-of-product-design-at-facebook--how-a-bad-hookup-face-helped-pinterest-increase-virality-and-retention","updated_at":"2020-09-16T09:57:03+00:00","link_to_comments":"https://www.designernews.co/stories/110893-angel-steger--director-of-product-design-at-facebook--how-a-bad-hookup-face-helped-pinterest-increase-virality-and-retention","link_host":"www.churn.fm","from":"designernews"},{"title":"New Raccoon Attack Could Let Attackers Break SSL/TLS Encryption","description":"A group of researchers has detailed a new timing vulnerability in Transport Layer Security (TLS) protocol that could potentially allow an attacker to break the encryption and read sensitive communication under specific conditions.\n\nDubbed "Raccoon Attack," the server-side attack exploits a side-channel in the cryptographic protocol (versions 1.2 and lower) to extract the shared secret key used<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/zwWadhRLYNM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/zwWadhRLYNM/raccoon-ssl-tls-encryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zwWadhRLYNM/raccoon-ssl-tls-encryption.html","updated_at":"2020-09-16T09:45:36+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zwWadhRLYNM/raccoon-ssl-tls-encryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Form design","description":"https://gerireid.com/forms.html","link":"https://www.designernews.co/stories/110892-form-design","comments":"https://www.designernews.co/stories/110892-form-design","updated_at":"2020-09-16T09:16:18+00:00","link_to_comments":"https://www.designernews.co/stories/110892-form-design","link_host":"gerireid.com","from":"designernews"},{"title":"New Report Explains COVID-19's Impact on Cyber Security","description":"Most cybersecurity professionals fully anticipated that cybercriminals would leverage the fear and confusion surrounding the Covid-19 pandemic in their cyberattacks.\n\nOf course, malicious emails would contain subjects relating to Covid-19, and malicious downloads would be Covid-19 related. This is how cybercriminals operate. Any opportunity to maximize effectiveness, no matter how contemptible<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/3aXr-TXpuQw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/3aXr-TXpuQw/covid-cybersecurity-report.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3aXr-TXpuQw/covid-cybersecurity-report.html","updated_at":"2020-09-16T09:00:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3aXr-TXpuQw/covid-cybersecurity-report.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Design Principles: What, Why, and How","description":"https://mediatemple.net/blog/design-creative/design-principles-what-why-and-how/","link":"https://www.designernews.co/stories/110889-design-principles-what-why-and-how","comments":"https://www.designernews.co/stories/110889-design-principles-what-why-and-how","updated_at":"2020-09-16T07:56:03+00:00","link_to_comments":"https://www.designernews.co/stories/110889-design-principles-what-why-and-how","link_host":"mediatemple.net","from":"designernews"},{"title":"Top 20 Restaurant Sites That Use Qode WordPress Themes","description":"https://qodeinteractive.com/magazine/restaurant-sites-in-qode-themes/","link":"https://www.designernews.co/stories/110888-top-20-restaurant-sites-that-use-qode-wordpress-themes","comments":"https://www.designernews.co/stories/110888-top-20-restaurant-sites-that-use-qode-wordpress-themes","updated_at":"2020-09-16T07:51:40+00:00","link_to_comments":"https://www.designernews.co/stories/110888-top-20-restaurant-sites-that-use-qode-wordpress-themes","link_host":"qodeinteractive.com","from":"designernews"},{"title":"5 Basic Types of Images in Web Design","description":"https://design4users.com/types-of-images-web-design/","link":"https://www.designernews.co/stories/110883-5-basic-types-of-images-in-web-design","comments":"https://www.designernews.co/stories/110883-5-basic-types-of-images-in-web-design","updated_at":"2020-09-15T17:05:46+00:00","link_to_comments":"https://www.designernews.co/stories/110883-5-basic-types-of-images-in-web-design","link_host":"design4users.com","from":"designernews"},{"title":"The Megaton Problem with Mega Menus","description":"https://uxmovement.com/navigation/the-megaton-problem-with-mega-menus/","link":"https://www.designernews.co/stories/110882-the-megaton-problem-with-mega-menus","comments":"https://www.designernews.co/stories/110882-the-megaton-problem-with-mega-menus","updated_at":"2020-09-15T16:38:02+00:00","link_to_comments":"https://www.designernews.co/stories/110882-the-megaton-problem-with-mega-menus","link_host":"uxmovement.com","from":"designernews"},{"title":"Why product copy should be thought of as a system","description":"https://blog.dittowords.com/text-as-a-system/","link":"https://www.designernews.co/stories/110880-why-product-copy-should-be-thought-of-as-a-system","comments":"https://www.designernews.co/stories/110880-why-product-copy-should-be-thought-of-as-a-system","updated_at":"2020-09-15T16:10:57+00:00","link_to_comments":"https://www.designernews.co/stories/110880-why-product-copy-should-be-thought-of-as-a-system","link_host":"blog.dittowords.com","from":"designernews"},{"title":"Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark Web","description":"In a new report into the global cybersecurity industry's exposure on the Dark Web this year, global application security company, ImmuniWeb, uncovered that 97% of leading cybersecurity companies have data leaks or other security incidents exposed on the Dark Web, while on average, there are over 4,000 stolen credentials and other sensitive data exposed per cybersecurity company.\n\nEven the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XI4IeW6Cap0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XI4IeW6Cap0/dark-web-cybersecurity-report.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XI4IeW6Cap0/dark-web-cybersecurity-report.html","updated_at":"2020-09-15T11:30:04+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XI4IeW6Cap0/dark-web-cybersecurity-report.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CISA: Chinese Hackers Exploiting Unpatched Devices to Target U.S. Agencies","description":"The US Cybersecurity and Infrastructure Security Agency (CISA) issued a new advisory on Monday about a wave of cyberattacks carried by Chinese nation-state actors targeting US government agencies and private entities.\n\n"CISA has observed Chinese [Ministry of State Security]-affiliated cyber threat actors operating from the People's Republic of China using commercially available information<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/aD6sQCu-e58" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/aD6sQCu-e58/chinese-hackers-agencies.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/aD6sQCu-e58/chinese-hackers-agencies.html","updated_at":"2020-09-15T09:14:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/aD6sQCu-e58/chinese-hackers-agencies.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Live Design System Bootcamp in Figma and Notion","description":"https://www.memorisely.com/live-bootcamp/design-system-bootcamp","link":"https://www.designernews.co/stories/110871-live-design-system-bootcamp-in-figma-and-notion","comments":"https://www.designernews.co/stories/110871-live-design-system-bootcamp-in-figma-and-notion","updated_at":"2020-09-15T08:20:30+00:00","link_to_comments":"https://www.designernews.co/stories/110871-live-design-system-bootcamp-in-figma-and-notion","link_host":"www.memorisely.com","from":"designernews"},{"title":"Designing SaaS Products in 2020","description":"https://blog.plantapp.io/post/designing-saas-products-in-2020","link":"https://www.designernews.co/stories/110870-designing-saas-products-in-2020","comments":"https://www.designernews.co/stories/110870-designing-saas-products-in-2020","updated_at":"2020-09-15T07:25:02+00:00","link_to_comments":"https://www.designernews.co/stories/110870-designing-saas-products-in-2020","link_host":"blog.plantapp.io","from":"designernews"},{"title":"10 Best Free and Premium Photo Stock Websites","description":"https://wpklik.com/wordpress-tips/photo-stock-websites/","link":"https://www.designernews.co/stories/110869-10-best-free-and-premium-photo-stock-websites","comments":"https://www.designernews.co/stories/110869-10-best-free-and-premium-photo-stock-websites","updated_at":"2020-09-15T07:14:17+00:00","link_to_comments":"https://www.designernews.co/stories/110869-10-best-free-and-premium-photo-stock-websites","link_host":"wpklik.com","from":"designernews"},{"title":"My first attempt at minimalistic design","description":"https://remoteworkly.co","link":"https://www.designernews.co/stories/110868-my-first-attempt-at-minimalistic-design","comments":"https://www.designernews.co/stories/110868-my-first-attempt-at-minimalistic-design","updated_at":"2020-09-15T06:42:16+00:00","link_to_comments":"https://www.designernews.co/stories/110868-my-first-attempt-at-minimalistic-design","link_host":"remoteworkly.co","from":"designernews"},{"title":"Claudio Guglieri - Design Playground","description":"https://guglieri.com/","link":"https://www.designernews.co/stories/110865-claudio-guglieri--design-playground","comments":"https://www.designernews.co/stories/110865-claudio-guglieri--design-playground","updated_at":"2020-09-15T03:19:23+00:00","link_to_comments":"https://www.designernews.co/stories/110865-claudio-guglieri--design-playground","link_host":"guglieri.com","from":"designernews"},{"title":"Is Google a Good Brand Name?","description":"https://toolbox.humandeluxe.com/good-brand-name/","link":"https://www.designernews.co/stories/110862-is-google-a-good-brand-name","comments":"https://www.designernews.co/stories/110862-is-google-a-good-brand-name","updated_at":"2020-09-14T19:22:54+00:00","link_to_comments":"https://www.designernews.co/stories/110862-is-google-a-good-brand-name","link_host":"toolbox.humandeluxe.com","from":"designernews"},{"title":"How Nathan Elly built a $2M/year agency in 6 years","description":"https://blog.usepastel.com/post/how-nathan-elly-built-a-2m-year-agency-in-6-years","link":"https://www.designernews.co/stories/110861-how-nathan-elly-built-a-2myear-agency-in-6-years","comments":"https://www.designernews.co/stories/110861-how-nathan-elly-built-a-2myear-agency-in-6-years","updated_at":"2020-09-14T18:19:45+00:00","link_to_comments":"https://www.designernews.co/stories/110861-how-nathan-elly-built-a-2myear-agency-in-6-years","link_host":"blog.usepastel.com","from":"designernews"},{"title":"From Zero to Hero, How Concept Art Shapes Masterpieces & A Reaally Long List of Concept Art","description":"https://www.noupe.com/inspiration/showcases/concept-art.html","link":"https://www.designernews.co/stories/110851-from-zero-to-hero-how-concept-art-shapes-masterpieces--a-reaally-long-list-of-concept-art","comments":"https://www.designernews.co/stories/110851-from-zero-to-hero-how-concept-art-shapes-masterpieces--a-reaally-long-list-of-concept-art","updated_at":"2020-09-14T12:31:24+00:00","link_to_comments":"https://www.designernews.co/stories/110851-from-zero-to-hero-how-concept-art-shapes-masterpieces--a-reaally-long-list-of-concept-art","link_host":"www.noupe.com","from":"designernews"},{"title":"New Linux Malware Steals Call Details from VoIP Softswitch Systems","description":"Cybersecurity researchers have discovered an entirely new kind of Linux malware dubbed "CDRThief" that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata.\n\n"The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR)," ESET researchers said in a Thursday analysis.\n\n"To steal this<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dvgU82ZFCeM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dvgU82ZFCeM/linux-voip-softswitch-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dvgU82ZFCeM/linux-voip-softswitch-malware.html","updated_at":"2020-09-11T12:05:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dvgU82ZFCeM/linux-voip-softswitch-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices","description":"Bluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide.\n\nDiscovered independently by two separate teams of academic researchers, the flaw resides in the Cross-Transport Key Derivation (CTKD) of devices<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/NkwAwbaPRGQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/NkwAwbaPRGQ/new-bluetooth-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NkwAwbaPRGQ/new-bluetooth-vulnerability.html","updated_at":"2020-09-10T21:37:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NkwAwbaPRGQ/new-bluetooth-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange","description":"Cybercriminals successfully plundered another digital cryptocurrency exchange.\n\nEuropean cryptocurrency exchange Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars.\n\nEterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier Digital Asset<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/AnPUYSC9ph0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/AnPUYSC9ph0/hackers-stole-cryptocurrencies.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/AnPUYSC9ph0/hackers-stole-cryptocurrencies.html","updated_at":"2020-09-10T19:01:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/AnPUYSC9ph0/hackers-stole-cryptocurrencies.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A Successful Self-Service Password Reset (SSPR) Project Requires User Adoption","description":"IT help desks everywhere are having to adjust to the 'new normal' of supporting mainly remote workers. This is a major shift away from visiting desks across the office and helping ones with traditional IT support processes.\n\nMany reasons end-users may contact the helpdesk. However, password related issues are arguably the most common.\n\nSince the onset of the global pandemic that began earlier<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/4qsejiEYaJc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/4qsejiEYaJc/self-service-password-reset.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4qsejiEYaJc/self-service-password-reset.html","updated_at":"2020-09-10T11:35:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4qsejiEYaJc/self-service-password-reset.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine","description":"We have all heard of the "cybersecurity skills gap" — firms' inability to hire and retain high-level cybersecurity talent.\n\nI see this gap manifesting in two ways. First, companies that want to hire cybersecurity talent simply cannot find candidates with sufficient skills. Second, companies that cannot afford specialized cybersecurity talent and therefore lack the necessary skills to<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/v8uM2jJwjjw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/v8uM2jJwjjw/cynet-cybersecurity-software.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/v8uM2jJwjjw/cynet-cybersecurity-software.html","updated_at":"2020-09-09T15:21:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/v8uM2jJwjjw/cynet-cybersecurity-software.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor","description":"A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research.\n\n"To our knowledge, this is the first time attackers have been caught using legitimate third party software to target cloud infrastructure," Israeli cybersecurity firm Intezer said<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dopZk9gliXA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dopZk9gliXA/cloud-monitoring.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dopZk9gliXA/cloud-monitoring.html","updated_at":"2020-09-09T08:23:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dopZk9gliXA/cloud-monitoring.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Releases September 2020 Security Patches For 129 Flaws","description":"As part of this month's Patch Tuesday, Microsoft today released a fresh batch of security updates to fix a total of 129 newly discovered security vulnerabilities affecting various versions of its Windows operating systems and related software.\n\nOf the 129 bugs spanning its various products — Microsoft Windows, Edge browser, Internet Explorer, ChakraCore, SQL Server, Exchange Server, Office,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dYbLrQu33aY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dYbLrQu33aY/patch-tuesday-september.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dYbLrQu33aY/patch-tuesday-september.html","updated_at":"2020-09-08T19:56:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dYbLrQu33aY/patch-tuesday-september.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Japan, France, New Zealand Warn of Sudden Uptick in Emotet Trojan Attacks","description":"Cybersecurity agencies across Asia and Europe have issued multiple security alerts regarding the resurgence of email-based Emotet malware attacks targeting businesses in France, Japan, and New Zealand.\n\n"The emails contain malicious attachments or links that the receiver is encouraged to download," New Zealand's Computer Emergency Response Team (CERT) said. "These links and attachments may<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/k4nUnZ3qx1o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/k4nUnZ3qx1o/emotet-malware-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k4nUnZ3qx1o/emotet-malware-attack.html","updated_at":"2020-09-08T12:31:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k4nUnZ3qx1o/emotet-malware-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New PIN Verification Bypass Flaw Affects Visa Contactless Payments","description":"Even as Visa issued a warning about a new JavaScript web skimmer known as Baka, cybersecurity researchers have uncovered an authentication flaw in the company's EMV enabled payment cards that permits cybercriminals to obtain funds and defraud cardholders as well as merchants illicitly.\n\nThe research, published by a group of academics from the ETH Zurich, is a PIN bypass attack that allows the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2FDGcEtP3Yg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2FDGcEtP3Yg/emv-payment-card-pin-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2FDGcEtP3Yg/emv-payment-card-pin-hacking.html","updated_at":"2020-09-08T06:50:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2FDGcEtP3Yg/emv-payment-card-pin-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"SMB Cybersecurity Catching Up to Enterprise… But the Human Element Still a Major Concern","description":"Cyberattacks on small to medium-sized businesses (SMBs) are continuing at a relentless pace, with the vast majority of data breaches coming from outside the organization.\n\nSome believe hackers are aggressively targeting these smaller firms because they believe SMBs lack adequate resources and enterprise-grade security tools, making them easier prey than larger businesses.\n\nA new report from<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/SUGhp8SVVek" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/SUGhp8SVVek/smb-cybersecurity.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SUGhp8SVVek/smb-cybersecurity.html","updated_at":"2020-09-07T14:07:34+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SUGhp8SVVek/smb-cybersecurity.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Evilnum hackers targeting financial firms with a new Python-based RAT","description":"An adversary known for targeting the fintech sector at least since 2018 has switched up its tactics to include a new Python-based remote access Trojan (RAT) that can steal passwords, documents, browser cookies, email credentials, and other sensitive information.\n\nIn an analysis published by Cybereason researchers yesterday, the Evilnum group has not only tweaked its infection chain but has<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xUbJtSiDEEw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xUbJtSiDEEw/evilnum-hackers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xUbJtSiDEEw/evilnum-hackers.html","updated_at":"2020-09-04T12:37:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xUbJtSiDEEw/evilnum-hackers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"(Live) Webinar – XDR and Beyond with Autonomous Breach Protection","description":"Anyone paying attention to the cybersecurity technology market has heard the term XDR - Extended Detection and Response.\n\nXDR is a new technology approach that combines multiple protection technologies into a single platform. All the analyst firms are writing about it, and many of the top cybersecurity companies are actively moving into this space.\n\nWhy is XDR receiving all the buzz? Combining<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/h_2pQB9fjXg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/h_2pQB9fjXg/xdr-cybersecurity-webinar.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/h_2pQB9fjXg/xdr-cybersecurity-webinar.html","updated_at":"2020-09-03T08:58:35+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/h_2pQB9fjXg/xdr-cybersecurity-webinar.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cisco Jabber Bug Could Let Hackers Target Windows Systems Remotely","description":"Networking equipment maker Cisco has released a new version of its Jabber video conferencing and messaging app for Windows that includes patches for multiple vulnerabilities—which, if exploited, could allow an authenticated, remote attacker to execute arbitrary code.\n\nThe flaws, which were uncovered by Norwegian cybersecurity firm Watchcom during a pentest, affect all currently supported<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/GLqt0bzpGLw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/GLqt0bzpGLw/cisco-jabber-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GLqt0bzpGLw/cisco-jabber-hacking.html","updated_at":"2020-09-03T08:36:33+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GLqt0bzpGLw/cisco-jabber-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data","description":"Cybercriminal groups are constantly evolving to find new ways to pilfer financial information, and the latest trick in their arsenal is to leverage the messaging app Telegram to their benefit.\n\nIn what's a new tactic adopted by Magecart groups, the encrypted messaging service is being used to send stolen payment details from compromised websites back to the attackers.\n\n"For threat actors, this<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vKVL7UrAGAY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vKVL7UrAGAY/credit-card-telegram-hackers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vKVL7UrAGAY/credit-card-telegram-hackers.html","updated_at":"2020-09-02T11:13:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vKVL7UrAGAY/credit-card-telegram-hackers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting Today","description":"Starting today, the lifespan of new TLS certificates will be limited to 398 days, a little over a year, from the previous maximum certificate lifetime of 27 months (825 days).\n\nIn a move that's meant to boost security, Apple, Google, and Mozilla are set to reject publicly rooted digital certificates in their respective web browsers that expire more than 13 months (or 398 days) from their<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/riYw1n_IMvE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/riYw1n_IMvE/ssl-tls-certificate-validity-398.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/riYw1n_IMvE/ssl-tls-certificate-validity-398.html","updated_at":"2020-09-01T12:25:29+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/riYw1n_IMvE/ssl-tls-certificate-validity-398.html","link_host":"thehackernews.com","from":"thehackernews"}]