If you’ve got an Apple TV, check out our newest Puzzling Plans release: TV Time Warp.
TV Time Warp is a simulated television museum from yesteryear. Flip through the years as if they were channels and experience TV as it used to be! You’ll see shows from the 1950s and 1960s — complete with commercials. We generate hypothetical TV schedules 24/7 to show you what would have been on at that time — for example, soap operas during the day, variety shows at night, and cartoons on Saturday morning.
For real.
Feldspar is an abstract board game, sort of a combination between Chess and Go. You and the computer opponent take turns moving pieces and placing blocks, attempting to trap the other player. There are nine piece types, each with different movement rules and special abilities. Each game is meant to last a few minutes, and the touch-and-drag controls are simple.
History We developed Feldspar over the course of several months while perfecting our AI engine and our cross-platform toolset, which compiles Java into JavaScript/WebGL and iOS binaries (using libGDX and RoboVM).
Our team recently implemented a proprietary security component for a web app we maintain. When it performs an action of note, the component writes the action to a log. As a system admin and tester babysitting a new component, I want to know about these actions when they happen, and this sounded like a perfect use case for OSSEC, an Open Source host-based intrusion detection system.
OSSEC monitors system logs, checks for rootkits and system configuration changes, and does a pretty good job of letting us know what’s happening on our systems.
My partner’s doing some speech analysis stuff, and introduced me to sox, a self-described “Swiss Army Knife of sound processing.” I was goofing with it today to convert spectrograms of mp3s to animated GIFs. This is quick and very dirty, but should work.
Requirements On Ubuntu, install sox, the mp3 plug-in for sox, and imagemagick:
sudo apt-get install sox libsox-fmt-mp3 imagemagick Running Copy the text of this script into a file:
We’re going to go a little off-book today for a segment I’d like to call, “Who’s attacking my server today?”
I administer a few servers and they, like most anything connected to the Internet, are constantly under attack. Searching through my logs, I’ve seen a large number of pretty basic attacks trying to exploit a vulnerability in Parallels Plesk - a hosting control panel. If you’re using hosting “in the cloud1,” you’re bound to see a lot of this sort of thing.
Put yourself in a bad guy’s shoes:
You have a piece of software that logs usernames and passwords to banking sites. It can do a number of other things, like propagate itself to other computers that share drives with the victims and open address books and email itself to every email address it finds - so that it can log usernames and passwords from even more sites!
It just needs to hit one system, really, to propagate.
With the number of systems and web sites you log into every day, generating and remembering unique, memorable, and unguessable passwords can be a real chore. However, a disciplined approach to password security is pivotal to thwarting password-based attacks. Who would use password attacks to break into your accounts? Thieves (your bank account and credit card sites), foreign governments and competitors (your bank and work accounts), ex-boyfriends (your Facebook account), ex-husbands (your personal email account)!