TL;DR summary of stories on the internet
In this article, the author discusses using PDF files as an attack vector, showcasing various techniques such as PDF Injection, XSS, Stealing Credentials, Opening Malicious Links, and Remote Code Execution (RCE). The author dives deep into injecting JavaScript code in PDF files, stealing credentials through phishing attacks, embedding malicious links, and exploiting vulnerabilities in PDF […]
Read more »
Lidar point clouds are powerful for creating high-resolution, 3D views of environments. However, one drawback is that they lack color information, making object identification challenging. To tackle this, lidar points can be colored by mapping them onto synchronized camera images. By projecting points onto images using extrinsic and intrinsic matrices, lidar sensor fusion can create […]
The author delves into their newfound love for analog rhythm machines, exploring the Panasonic RD-9844, a lesser-known alternative to the iconic Roland TR-808. They highlight the simplicity of the RD-9844’s circuitry and its quirky design choices, like battery power and a “rock” preset heavy on noise drums. The breakdown of the machine’s bass drum, cymbal, […]
The blog post delves into Energy-Based Models (EBMs) for generative modeling, emphasizing their unique approach of framing the problem in terms of an energy function. EBMs assign low energy to likely data and high energy to unlikely data, guiding the generation of new samples. The post explains the training of EBMs through approaches like Contrastive […]
John Rawls, a profound political philosopher in the 20th century, led a quiet life at Harvard University, molding ideas on justice, democracy, and liberalism. While kind and decent, he harbored thought-provoking philosophies, like life needing to be redeemed beyond the mundane. He stood as a critical figure in liberalism, urging for a revitalization of its […]
The Apple IIGS, a legend in computer history, is shrouded in myths, misconceptions, and controversy. Many believe that Apple intentionally limited its CPU speed to 2.8MHz to avoid competition with the Macintosh, but the real story is far more complex. Designed by the brilliant mind of Steve Wozniak, the IIGS was supposed to revolutionize computing […]
Cerebrolysin is a product made from pig brain tissue, claimed to boost BDNF and treat neural diseases. It is popular in Russia and China, even among biohackers and transhumanists. However, research raises questions about its efficacy and composition. The drug allegedly contains neurotrophic peptides but is composed mainly of amino acids, salts, and protein fragments. […]
Team Atlanta, the masterminds behind Atlantis, an AI-driven cybersecurity solution competing in DARPA AIxCC, include six prestigious institutions led by Georgia Tech alumni. Despite challenges faced in past hacking competitions like DEF CON CTF and Pwn2Own, their focus remains on advancing cybersecurity through AI. While prepping for AIxCC, they honed in on static analysis and […]
On a warm summer evening in South Austin, biology chair Curtis Eckerman sets up for a mothing expedition in a secluded oak grove, eager to observe the diverse moth species attracted to the area’s vegetation. Eckerman, an ecologist with a passion for biodiversity, has dedicated himself to photographing and identifying moths, uncovering dozens of species […]
The 4th edition of Discrete Mathematics: an Open Introduction is now available and features a new organization of content with a focus on logic, proofs, graph theory, counting, and sequences. The book offers a stronger emphasis on discrete structures, making it ideal for students in computer science and math majors. There are more interactive exercises […]