Playdate: Entwickler programmiert Spiel extra für Heiratsantrag

In einem neuen Spiel für das Playdate-Handheld müssen Spieler Liebesbriefe zustellen. Am Ende gibt es einen Heiratsantrag – den der Entwickler eigennützig eingebaut hat. (Playdate, Softwareentwicklung)

In einem neuen Spiel für das Playdate-Handheld müssen Spieler Liebesbriefe zustellen. Am Ende gibt es einen Heiratsantrag - den der Entwickler eigennützig eingebaut hat. (Playdate, Softwareentwicklung)

Cisco warnt: Hacker attackieren massenhaft VPN-Dienste und mehr

Seit Mitte März finden den Angaben zufolge weltweit vermehrt Brute-Force-Angriffe auf Onlinedienste statt. Quelle sind vor allem Tor-Exit-Nodes und Proxy-Dienste. (Cybercrime, Web Service)

Seit Mitte März finden den Angaben zufolge weltweit vermehrt Brute-Force-Angriffe auf Onlinedienste statt. Quelle sind vor allem Tor-Exit-Nodes und Proxy-Dienste. (Cybercrime, Web Service)

Anzeige: Effektives Datenbankmanagement mit PostgreSQL

PostgreSQL hat sich als eine der führenden Open-Source-Datenbanken etabliert, die durch ihre Leistungsfähigkeit, Stabilität und Erweiterbarkeit in technisch anspruchsvollen Umgebungen überzeugt. Dieser Workshop hilft beim Einstieg. (Golem Karrierewelt,…

PostgreSQL hat sich als eine der führenden Open-Source-Datenbanken etabliert, die durch ihre Leistungsfähigkeit, Stabilität und Erweiterbarkeit in technisch anspruchsvollen Umgebungen überzeugt. Dieser Workshop hilft beim Einstieg. (Golem Karrierewelt, SQL)

Lilbits: Limitless AI Pendant, Pixel Buds pro 2 leaked, and Motorola’s Edge 50 smartphone series launches (in Europe and Latin America)

The first major wearable built around AI hit the streets last week… and the Humane AI Pin was widely panned by reviewers as a buggy, overpriced mess that fails miserably to deliver on its promise. But a startup called Limitless is hoping to do b…

The first major wearable built around AI hit the streets last week… and the Humane AI Pin was widely panned by reviewers as a buggy, overpriced mess that fails miserably to deliver on its promise. But a startup called Limitless is hoping to do better… by doing less. The upcoming Limitless Pendant is a $99 […]

The post Lilbits: Limitless AI Pendant, Pixel Buds pro 2 leaked, and Motorola’s Edge 50 smartphone series launches (in Europe and Latin America) appeared first on Liliputing.

Linus Torvalds reiterates his tabs-versus-spaces stance with a kernel trap

One does not simply suggest changing a kernel line to help out a parsing tool.

Tab soda displayed on a grocery shelf

Enlarge / Cans of Tab diet soda on display in 2011. Tab was discontinued in 2020. There has never been a soda named "Spaces" that had a cult following. (credit: Getty Images)

Anybody can contribute to the Linux kernel, but any person's commit suggestion can become the subject of the kernel's master and namesake, Linus Torvalds. Torvalds is famously not overly committed to niceness, though he has been working on it since 2018. You can see glimpses of this newer, less curse-laden approach in how Torvalds recently addressed a commit with which he vehemently disagreed. It involves tabs.

The commit last week changed exactly one thing on one line, replacing a tab character with a space: "It helps Kconfig parsers to read file without error." Torvalds responded with a commit of his own, as spotted by The Register, which would "add some hidden tabs on purpose." Trying to smooth over a tabs-versus-spaces matter seemed to awaken Torvalds to the need to have tab-detecting failures be "more obvious." Torvalds would have added more, he wrote, but didn't "want to make things uglier than necessary. But it *might* be necessary if it turns out we see more of this kind of silly tooling."

If you've read this far and don't understand what's happening, please allow me, a failed CS minor, to offer a quick explanation: Tabs Versus Spaces will never be truly resolved, codified, or set right by standards, and the energy spent on the issue over time could, if harnessed, likely power one or more small nations. Still, the Linux kernel has its own coding style, and it directly cites "K&R," or Kernighan & Ritchie, the authors of the coding bible The C Programming Language, which is a tabs book. If you are submitting kernel code, it had better use tabs (eight-character tabs, ideally, though that is tied in part to teletype and line-printer history).

Read 3 remaining paragraphs | Comments

Attackers are pummeling networks around the world with millions of login attempts

Attacks coming from nearly 4,000 IP addresses take aim at VPNs, SSH and web apps.

Attackers are pummeling networks around the world with millions of login attempts

Enlarge (credit: Matejmo | Getty Images)

Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s indiscriminately assailing networks with login attempts aimed at gaining unauthorized access to VPN, SSH, and web application accounts.

The login attempts use both generic usernames and valid usernames targeted at specific organizations. Cisco included a list of more than 2,000 usernames and almost 100 passwords used in the attacks, along with nearly 4,000 IP addresses sending the login traffic. The IP addresses appear to originate from TOR exit nodes and other anonymizing tunnels and proxies. The attacks appear to be indiscriminate and opportunistic rather than aimed at a particular region or industry.

“Depending on the target environment, successful attacks of this type may lead to unauthorized network access, account lockouts, or denial-of-service conditions,” Talos researchers wrote Tuesday. “The traffic related to these attacks has increased with time and is likely to continue to rise.”

Read 9 remaining paragraphs | Comments