python |
Pythonタグが付けられた新着投稿 - Qiita |
PyTorchでDogs vs. Catsやーる(画像分類、ResNet18、Python3.10) |
https://qiita.com/SatoshiGachiFujimoto/items/d3053375a005b10594a0
|
httpspytorc |
2023-06-12 01:34:51 |
Docker |
dockerタグが付けられた新着投稿 - Qiita |
dockerエラー。no space left on device |
https://qiita.com/masashiiwasaki/items/8d4b35a65e6c5c239792
|
unknown |
2023-06-12 01:29:21 |
海外TECH |
MakeUseOf |
How to Use ChatGPT to Create a Presentation |
https://www.makeuseof.com/use-chatgpt-to-create-presentation/
|
chatgpt |
2023-06-11 16:46:17 |
海外TECH |
MakeUseOf |
10 Common Amazon Alexa Issues and How to Fix Them |
https://www.makeuseof.com/common-amazon-alexa-issues-fix/
|
assistant |
2023-06-11 16:46:17 |
海外TECH |
MakeUseOf |
Learn About Human Anatomy in 3D With These 10 Apps |
https://www.makeuseof.com/learn-about-human-anatomy-3d-apps/
|
mobile |
2023-06-11 16:30:18 |
海外TECH |
MakeUseOf |
How to Add or Remove the “Run as Different User” Option to Start on Windows 11 |
https://www.makeuseof.com/run-as-different-user-start-windows-11/
|
How to Add or Remove the “Run as Different User Option to Start on Windows If the quot run as different user quot option has gone missing or you prefer people didn t use it here s how to turn it on or off on Windows |
2023-06-11 16:15:17 |
海外TECH |
DEV Community |
Don't tell me how, tell me why! |
https://dev.to/noriller/dont-tell-me-how-tell-me-why-5a4i
|
Don x t tell me how tell me why Is it clear this is about comments If not wouldn t it be better if the title were “Comments Don t tell me how tell me why This is a problem we see everywhere There are comments that without any context mean nothing Others you would need to read the whole code or article to figure out the meaning and even then it might be misleading or just outdated This should probably apply to most cases but you really want a clear clean code that anyone can read and figure out what s happening That is unless you really need some less readable more complex code for any reason usually because of performance In this case then please do comment on what is happening and how But also do… Comment the WHY Why are you using less readable code Why shouldn t I change the order of something Why is this here Why was this used instead of XYZ Depending on what you re doing your level and that of your colleagues something commonplace for one would be rocket science to another This is not what this is about If you have to revisit the code the next month you should know what the code is doing by reading it The thing is why is that here Some pieces can be self explaining like transformXtoY but why and where should I do that I m also not saying to put a “why everywhere but if you revisit the code and spend time figuring out something or if even after refactoring it someone is always confused about something…then yes add a “why Not only that Pull Requests are a great source to find some of those places that need commenting on the “why On the PR someone asked why you did something Don t just tell them Not only that don t do it outside the PR and call it a day Refactor the code add the comment of why it s there and then every time someone revisits that piece of code it will be there the why |
2023-06-11 16:38:03 |
海外TECH |
DEV Community |
Forcing a device to disconnect from WiFi using a deauthentication attack |
https://dev.to/brandonskerritt/forcing-a-device-to-disconnect-from-wifi-using-a-deauthentication-attack-4h11
|
Forcing a device to disconnect from WiFi using a deauthentication attackThis post will show you how to disable a devices connection to WiFi using a detauthentication attack A deauthentication attack is a type of attack which targets the communication between router and the device Effectively disabling the WiFi on the device The deauthentication attack isn t some special exploit of a bug It s a created protocol and is being used in real world applications Deauthencation attack s use a deauthenication frame This frame sent from a router to a device forces the device to disconnect In technical terms it s called “sanctioned technique to inform a rogue station that they have been disconnected from the network This means that a device is on the network that shouldn t be on the network The router sends a deauthentication frame to the device telling it that it has been disconnected I like to imagine the interaction goes something like this Laptop asking a router if it can go to Google com this is the last bad comic you ll see here I promise Router denying the request and forcing the laptop to disconnect from the networkIn a report showed that some AirBNB s have hidden cameras which spy on their occupants In response a programmer created a simple shell script This script auto detected the cameras and kicked them from the network using the techniques you will learn Detect and disconnect WiFi cameras in the AirBB You re staying inThe same author wrote a script to auto kick off Google GlassFind a Google Glass and kick it from the networkDisclaimer You know the drill Don t do this to anyone else that isn t you unless you have their permission I am not advocating illegal hacking How do you perform a deauthentication attack The important things we need to know are The device we want to kick off of the networkThe router that the device is connected toI will go over how to get both in this tutorial This attack is done using Kali Linux but can be done on Mac OS Linux or Bash on Windows For best results use Kali Linux Firstly we need to install the aircrack ng suite Open up a Linux like terminal and run sudo apt install aircrack ngNow runiwconfigThis will show you what your wireless card is called Image shows the command being run with network cards eth lo and wlan wlan is the only one with information In this instance my wireless card is called wlan iwconfig only shows you the wireless interfaces lo and eth don t come up since they are not wireless This means we know for sure wlan is the wireless interface Next run this command airmon ng start wlanwhere wlan is your network card This will put your card into monitor mode which allows the card to monitor all traffic on the network Now that the wireless card is in monitor mode we want to see every router around us You will need to run iwconfig again as this command will change your network card name In most cases it changes it to mon but in mine it s changed to wlanmon Run this command with your new network card name airdump ng wlanmonAnd you should see something like this This is every single router in range We need to know what router the device is on You can tell how close a router is by the PWR column PWR is the signal strength how close it is to you The closer it is the larger the signal strength In this instance our victim my laptop is on TP LINK F We want to take note of things here The BSSID mac address of the routerThe Channel of the routerA wireless router broadcasts the WiFi signal on channels ranging from to In this case our router is on channel The BSSID also called a mac media access control address is an address which specifies the router s network card The MAC address is made up of parts xx xx xx yy yy yyThe first part is xx xx xx In this case it s C E These groupings specify the maker of the network card The last three groupings yy yy yy In this case it s F These groupings specify the exact network card Not the make or model but the exact network card much like a license plate specifies the exact car Each manufacture has a set of MAC addresses they re allowed to use These are the xx xx xx groupings Within these mac addresses are the exact cards You need both parts to find out the exact network card but you only need the first grouping to find out the manufacturer So far we have found out what the router is Now we want to find out what the device is To do this run this command airodump ng wlanmon bssid routers BSSID here channel routers channel here Running the command with the previous output above itNow you should see something like this We need to know what specific device we want to boot off the network We can see the router there Luckily on this network there is only device If you wanted to find out what that device is you can run the first groupings of the MAC address called STATION here into Google I got back this which is the correct device So now we know the MAC address of the router and the MAC address of the device Let s initiate our attack Run this command aireplay ng deauth c DEVICES MAC ADDRESS a ROUTERS MAC ADDRESS wlanmonThe represents an infinite amount of deauth attacks If you wanted to only run deauth attacks you ll change this to c is the client what you re attacking This is the devices MAC address a is the router what is the router the victim is connected to wlanmon is the name of the network card still in monitor mode The device is now disconnected from the network On the clients end it looks like this The ping timed out and Windows disconnected from the router These commands are simple but yet they are the cornerstone of most cyber security toolkits Phishing attacksA simple deauthentication attack will force a victim to reauthenticate The attacker can than sniff the WPA way handshake and perform a WPA bruteforce attack on the password Another attack that relies heavily on this deauthentication attack is forcing the user to connect to an access point you made You ll clone the users router onto your device then you ll deauthenticate the user and make sure your router has a higher signal than the original router The users device will automatically connect to your router since it is “closer Once the users device is connected to your fake AP you can easily sniff all of their outgoing and incoming connections In the next tutorial we ll go over how to force a device to connect to a spoofed access point Be sure to follow me to keep up to date with this |
2023-06-11 16:11:39 |
Apple |
AppleInsider - Frontpage News |
Apple's visionOS keyboard is extremely thoughtfully designed |
https://appleinsider.com/articles/23/06/11/apples-visionos-keyboard-is-extremely-thoughtfully-designed?utm_medium=rss
|
Apple x s visionOS keyboard is extremely thoughtfully designedApple s virtual keyboard in visionOS has a high level of attention to detail with many small elements combining to make a great UI interaction for a non physical peripheral Keyboard in visionOSOne of the problems with new platforms is a need to come up with ways for users to directly interact with them One of these problem areas has been the keyboard with device producers needing to come up with a way to enable keyboard like interfaces while working within the limitations of the platform Read more |
2023-06-11 16:59:15 |
海外TECH |
Engadget |
Twitter has reportedly refused to pay its Google Cloud contract |
https://www.engadget.com/twitter-has-reportedly-refused-to-pay-its-google-cloud-contract-161936042.html?src=rss
|
Twitter has reportedly refused to pay its Google Cloud contractMore platform instability could be in Twitter s near future In Twitter signed a billion contract with Google to host some of its services on the company s Google Cloud servers Platformer reports Twitter recently refused to pay the search giant ahead of the contract s June th renewal date Twitter is reportedly rushing to move as many services off of Google s infrastructure before the contract expires but the effort is “running behind schedule putting some tools including Smyte a platform the company acquired in to bolster its moderation capabilities in danger of going offline If Twitter can t migrate the system to its own servers before the end of the month Platformer suggests a shutdown would greatly impact the company s ability to combat spam and child sexual abuse material CSAM Before Saturday Smyte had been already showing signs of strain following Elon Musk s deep cuts to Twitter s workforce In December Musk reportedly asked Twitter s trust and safety team why the automated system hadn t caught a Twitter Blue user who had been impersonating him to pump a crypto scam The team told Musk the system had been unstable for a week crashing “at least once a day Platform instability has been a hallmark of Twitter In February many of the platform s core features went down on more than one occasion More recently Florida Governor Ron DeSantis had trouble announcing his bid for the Republican presidential nomination after Twitter Spaces could not handle the influx of people who wanted to listen to the broadcast If Twitter is in fact planning to stiff Google it wouldn t be the first time the company has ghosted on a contract At the end of last year California Property Trust the owner of the building that houses Twitter headquarters sued the company for failing to pay rent This article originally appeared on Engadget at |
2023-06-11 16:19:36 |
ニュース |
BBC News - Home |
Michael Travis Leake, US musician, detained in Russia |
https://www.bbc.co.uk/news/world-europe-65873014?at_medium=RSS&at_campaign=KARANGA
|
leake |
2023-06-11 16:21:07 |
ニュース |
BBC News - Home |
French Open 2023 results: Novak Djokovic beats Casper Ruud to win Roland Garros title and claim 23rd major |
https://www.bbc.co.uk/sport/tennis/65873164?at_medium=RSS&at_campaign=KARANGA
|
French Open results Novak Djokovic beats Casper Ruud to win Roland Garros title and claim rd majorNovak Djokovic shows his greatness once again by beating Casper Ruud to win the French Open and claim a men s record rd Grand Slam title |
2023-06-11 16:44:28 |
コメント
コメントを投稿