AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version
CyberSecurity – What are some things that get a bad rap, but are actually quite secure?
Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.
There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.
1- PGP
PGP is a Form of Minimalism
As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:
- You get from them a PGP identity (public key). How you do that is entirely up to you.
- Your PGP program uses that identity to perform a single public key encryption of a message key.
- Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
- Your correspondent does the opposite operations to get the message.
If you want to sign your message then you:
- Hash the message.
- Do a public key signature operation on the hash and attach the result to the message.
- Your correspondent checks the signature from your PGP identity, which they have acquired somehow.
The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.
As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)
- Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
- A Signal session requires the storage and maintenance of a lot of state information.
- Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
- Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
- Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.
The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.
I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.
2- Very long passwords that are actually a sentence
It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”
3- Writing passwords down.
I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.
We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.
Did I say passwords? I meant encryption keys.
4- Changing default ports for certain services like dbs
Most of the gangs out there use tools that don’t do a full search, so they go through the default port list
5- MFA in general.
Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.
If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.
If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.
6- Oauth for 3rd party apps.
Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.
7- Two-step verification.
Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.
8-Biometric Authentication.
The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.
Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.
One example of this is https://passage.id/ which is about as secure as you can get.
9- Zoom.
Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.
10- Unplugging the ethernet cable.
11- Browser password managers?
Rant moment: reasons cybersecurity fails
<Rant>
People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.
No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.
This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.
</Rant>
Why do cyber attackers commonly use social engineering attacks?
Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.
Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.
To conclude:
Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.
source: r/cybersecurity
Source: r/cybersecurity
- Unlocking Bug Bounties: Your Comprehensive Guide to Getting Startedby Sachin Kumar (Cybersecurity on Medium) on May 8, 2024 at 3:38 pm
Getting into bug bounties can be an exciting journey! Here’s a general roadmap to get started:Continue reading on Medium »
- How To Opt Out Of Health Information Exchangesby Sofia Lee (Security on Medium) on May 8, 2024 at 3:31 pm
A guide on opting out of state databases and recanting previously shared medical recordsContinue reading on Read or Die! »
- Navigating SSE: Your Visual Powerhouse for Ultimate Cloud Securityby Rohan Naggi (Security on Medium) on May 8, 2024 at 3:23 pm
Welcome to the Visual Exploration of Secure Service Edge (SSE)Continue reading on Medium »
- Navigating SSE: Your Visual Powerhouse for Ultimate Cloud Securityby Rohan Naggi (Cybersecurity on Medium) on May 8, 2024 at 3:23 pm
Welcome to the Visual Exploration of Secure Service Edge (SSE)Continue reading on Medium »
- How To Securely Manage Your Assets with Sorted Walletby Sorted Wallet (Security on Medium) on May 8, 2024 at 3:22 pm
Follow these essential tips to securely manage your crypto assets with Sorted Wallet.Continue reading on Medium »
- Global Cybersecurity in May 2024: Emerging Threats and Tech Frontiers!by Pixel Precision Engineering (Cybersecurity on Medium) on May 8, 2024 at 3:16 pm
Explore 2024 trends in AI, IoT, blockchain for top-notch cyber defense.Continue reading on Medium »
- INTRODUCTION TO NETWORKING PART 1by RVERNX (Cybersecurity on Medium) on May 8, 2024 at 3:01 pm
Networking seriesContinue reading on Medium »
- Injective Bolsters Security with Powerful Multi-Signature Wallet Integration: DesigLabsby Manmohan Chaudhary (Security on Medium) on May 8, 2024 at 2:59 pm
Continue reading on Medium »
- Metasploitable 2 Walkthrough by TirexV2by TirexV2 (Cybersecurity on Medium) on May 8, 2024 at 2:52 pm
Metasploitable 2 is a test environment that provides a secure place to perform penetration testing and security research. For your test…Continue reading on Medium »
- One-Click ETH Staking on Ledger Live with Staderby Stader Labs (Security on Medium) on May 8, 2024 at 2:51 pm
Simplifying ETH StakingContinue reading on Medium »
- Cyber Briefing: 2024.05.08by CyberMaterial (Cybersecurity on Medium) on May 8, 2024 at 2:46 pm
👉 What’s trending in cybersecurity today?Continue reading on Medium »
- Understanding Ransomware: Definition, Impact, and an Emerging Solutionby Ron Horton (Security on Medium) on May 8, 2024 at 2:37 pm
What is Ransomware?Continue reading on Medium »
- InfoSecSherpa’s News Roundup for Wednesday, May 8, 2024by InfoSecSherpa (Cybersecurity on Medium) on May 8, 2024 at 2:35 pm
InfoSecSherpa: Your Guide Up a Mountain of Information!Continue reading on Medium »
- Lei Geral de proteção de Dados Lei 13.709/2018by KAWANNE DAYARA OLIVEIRA SILVA (Cybersecurity on Medium) on May 8, 2024 at 2:33 pm
TERMO DE ADEQUAÇÃO Á LGPDContinue reading on Medium »
- 10 Vital Steps to Secure Your Smart Contracts: A Coincheers Guideby Coincheers - Crypto Audits, KYC and SEO (Security on Medium) on May 8, 2024 at 2:31 pm
Learn the 10 vital steps to secure your smart contracts. Protect your assets in the cryptocurrency ecosystem with experts at Coincheers.Continue reading on Medium »
- Identity theft in Peruvian companies: How to avoid them?by Marta Reyes (Cybersecurity on Medium) on May 8, 2024 at 2:30 pm
Identity theft attempts in Peru represent 10% of transactions in companies, according to data from Sovos.Continue reading on Medium »
- Hidden Treasures: The Positive Aspects of the Deep Webby Uncoveris (Cybersecurity on Medium) on May 8, 2024 at 2:27 pm
Unveiling the Hidden: Exploring the Positive Facets of the Deep WebContinue reading on Medium »
- Our Mod Approval Processby Dror Haberman (Security on Medium) on May 8, 2024 at 2:15 pm
In this blog, we’ll walk you through a semi-detailed overview of the mod approval process. Our primary aim is to ensure the safety of our…Continue reading on Overwolf Blog »
- ESG Framework — Cybersecurity Maturity Modelby Hamsini S (Security on Medium) on May 8, 2024 at 2:10 pm
ESG is not just a buzzword but a deciding factor impacting investment strategies representing the three pillars Environmental, Social and…Continue reading on Medium »
- SBOMs Explainedby abdeldayemnour (Security on Medium) on May 8, 2024 at 2:02 pm
Here’s what you need to know about SBOMs, and how they can be a useful tool in your cybersecurity program toolkit.Continue reading on Medium »
- The state of ransomware in 2024 (Kaspersky)by /u/EspoJ (cybersecurity) on May 8, 2024 at 10:57 am
submitted by /u/EspoJ [link] [comments]
- large data sets in cyber securityby /u/Normal-Work-4326 (cybersecurity) on May 8, 2024 at 10:24 am
where to learn about, how to work with extremely large data sets in cyber security for being a security analyst? submitted by /u/Normal-Work-4326 [link] [comments]
- Crowdstrike today announced the launch of ‘Falcon for Defender’by /u/mushfambro (cybersecurity) on May 8, 2024 at 10:20 am
submitted by /u/mushfambro [link] [comments]
- How to protect your customers' secrets and the different levels of protection explainedby /u/Piiano_sec (cybersecurity) on May 8, 2024 at 7:41 am
https://www.piiano.com/blog/how-to-protect-customers-secrets-in-your-saas-offering submitted by /u/Piiano_sec [link] [comments]
- MITRE attributes the recent attack to China-linked UNC5221by /u/Vengeful-Peasant1847 (cybersecurity) on May 8, 2024 at 6:36 am
https://securityaffairs.com/162811/hacking/mitre-security-breach-china.html This is an update on the attack from Security Affairs, to supplement the initial one I posted at the time the attack was reported. Edit: To clarify I didn't write the article, I'm only posting it as a follow on. submitted by /u/Vengeful-Peasant1847 [link] [comments]
- Safest password managers on Win and Androidby /u/malvinorotty (cybersecurity) on May 8, 2024 at 6:30 am
Are there any good, maybe free pw managers that work on windows and android? My fear is even if they store passwords in a cloud db or offline db with all kinds of master passwords, 2FA or further measures, but if some app is hacked on an Android phone (or just a malicious one) it could just "take a screenshot" or similar without knowledge and consent. Once the pw db is unlocked by an enduser to look up a password, another program could hijack somehow? Is that paranoid? Would be great to have like a small pocket vault on keychain that could display my pws when I browse it.. such thing exists? Or anything else considered "most safe/safest"? submitted by /u/malvinorotty [link] [comments]
- What is the usual career pathway towards becoming a penetration tester?by /u/Unusual-Economics-62 (cybersecurity) on May 8, 2024 at 5:12 am
I understand there is formal education and certificates for this. But more looking towards previous employment and work experience! What are some consistent previous roles, jobs and positions do penetration tester employers look at and think “This will be a good candidate”. submitted by /u/Unusual-Economics-62 [link] [comments]
- What invention in cybersecurity would make a person rich today if they made it?by /u/Senior-Gear4688 (cybersecurity) on May 8, 2024 at 3:40 am
submitted by /u/Senior-Gear4688 [link] [comments]
- Have you heard about the Cyber Resilience Act?by /u/i46_sro (cybersecurity) on May 8, 2024 at 2:52 am
Hi all, The EU's proposed Cyber Resilience Act is a big deal for anyone involved in hardware and software with digital elements. T o sum it up, it aims to raise the bar on cybersecurity by setting mandatory standards for these products. Think automatic security updates, clear vulnerability reporting, and a focus on secure design throughout a product's lifecycle. This means better protection for consumers and businesses alike! But what are your thoughts? Is the CRA a step in the right direction? Are there any potential downsides? I'm also happy to dive deeper into how companies can get a head start on compliance. The CRA isn't here yet, but there are plenty of proactive changes you can make to future-proof your products. Looking forward for your reactions. PS: comply will be mandatory to maintain and/or start exporting to the EU! submitted by /u/i46_sro [link] [comments]
- Web/application attacks embedded deep in the payloadby /u/vmsanaaa6 (cybersecurity) on May 8, 2024 at 2:08 am
While evaluating AWS WAF I noticed that by default AWS WAF can only inspect first 8k bytes of the payload. Wondering if this AWS WAF limitation is a serious concern. Even if a WAF could inspect the entire payload I would assume it would add significant latency. Have there been any serious exploits that can be embedded deep in the payload ? submitted by /u/vmsanaaa6 [link] [comments]
- Cybercriminals Strike UnitedHealth Millions of Patient Records Compromised, Ripple Effects Felt Nationwideby /u/neverbeenbad007 (cybersecurity) on May 8, 2024 at 1:44 am
submitted by /u/neverbeenbad007 [link] [comments]
- Security Vulnerability - Microsoft XML Parser (MSXML) and XML Core Services Unsupported.. VTMby /u/xyzal1 (cybersecurity) on May 8, 2024 at 12:16 am
Anyone ever had to work on this vulnerability? A vendor is requesting a CVE and I don't have a specific one to give him. 4.0 is EOL and my employees are running 4.0 though all endpoints (version 1.24). It seems that it is reccomended to update to a more current and supported versions of MSXML which looks to be 6.0+ What kind of CVE can I send to the vendor because there isn't anything pertaining to just 4.0.. I'm so stressed and confused at this point, I'm not sure what to do. Microsoft XML Parser (MSXML) and XML Core Services Unsupported | Tenable® submitted by /u/xyzal1 [link] [comments]
- Meetings!!by /u/littleknucks (cybersecurity) on May 7, 2024 at 9:11 pm
How many meetings do you usually have in a day? How many times do meet with your manager/CISO? As you can tell, story of life!! submitted by /u/littleknucks [link] [comments]
- Why is Penetration Testing so hard to get into?by /u/KisstheCat90 (cybersecurity) on May 7, 2024 at 7:15 pm
I’ve seen a fair few comments on here (though I don’t check in regularly), about how pen testing is not for a newbie. Why is that? I’m a mid 30s looking for a change. If you go in at the bottom, complete junior, can it work? (UK) submitted by /u/KisstheCat90 [link] [comments]
- Source: Military intelligence carries out cyberattack on Russia's 1C Companyby /u/KI_official (cybersecurity) on May 7, 2024 at 7:03 pm
submitted by /u/KI_official [link] [comments]
- Is there any point in a Cyber Security degree anymore?by /u/asterlives (cybersecurity) on May 7, 2024 at 7:00 pm
I just started going back to college to get an associates degree in Cyber Security while working IT and planned on transfering to get a Bachelor's afterward. Now I am feeling discouraged after seeing posts of people struggling to get hired despite having a degree and experience and the recent press release from the National Cyber Director. Is there any hope for anyone just starting? submitted by /u/asterlives [link] [comments]
- How visible do you set your profile on LinkedIn?by /u/sonofagenius (cybersecurity) on May 7, 2024 at 6:54 pm
I'm considering switching to information security after being in my current software dev role for about 3-4 years now. My schooling is in computer science with a concentration in cyber security, and I'd like to finally be able to use what I learned in college. My question is, with all the targeted attacks and data gathering going on right now, how visible do you set your LinkedIn profile without giving too much away? Currently I have my profile picture set only to 3 connections away, but do I need to make it public? What about the About and Experience sections? I'm hoping to have both recruiters (which I have Open to Work set for those not in my company) and people from other roles notice me more easily. submitted by /u/sonofagenius [link] [comments]
- Is there currently a downturn in hiring?by /u/NerdlinGeeksly (cybersecurity) on May 7, 2024 at 5:55 pm
submitted by /u/NerdlinGeeksly [link] [comments]
- Over 50,000 Tinyproxy servers vulnerable to critical RCE flawby /u/CYRISMA_Buddy (cybersecurity) on May 7, 2024 at 5:40 pm
submitted by /u/CYRISMA_Buddy [link] [comments]
- SIEM install at homeby /u/Leather-Chef-6550 (cybersecurity) on May 7, 2024 at 5:09 pm
Hi, I'm hoping to familiarize myself with SIEM platforms by setting up a system on my home network. Can someone recommend an open source or trial based installation that I can fiddle around with? Preferably something commonly used in the real world. submitted by /u/Leather-Chef-6550 [link] [comments]
- LockBit leader unmasked and sanctionedby /u/ixiSlowbro (cybersecurity) on May 7, 2024 at 2:24 pm
submitted by /u/ixiSlowbro [link] [comments]
- SOC L3 feels like customer serviceby /u/Sarciteu (cybersecurity) on May 7, 2024 at 2:14 pm
I just landed a great paying job as a Senior Security Endpoint Analyst (L3). To my surprise 80% of the alerts are customer petitions. For example: "FW is dropping connections", "I want to install x program", etc. Almost no alert comes from EDR. I left a challenging job for this and I feel kind of bad... Are ther any other SOC Analyst that feel like this? submitted by /u/Sarciteu [link] [comments]
- Hey cybersecurity peeps, what have you automated?by /u/ThePorko (cybersecurity) on May 7, 2024 at 12:58 pm
I have always heard “automate everything” there are very few things I have been able to automate, with MS security products, things are even harder to automate. So what have you boys/girls automated and what do you wish we can automate? submitted by /u/ThePorko [link] [comments]
- Hackers discover how to reprogram NES Tetris from within the gameby /u/NISMO1968 (cybersecurity) on May 7, 2024 at 12:08 pm
submitted by /u/NISMO1968 [link] [comments]
- It's RSA week, so get ready for some of the dumbest cybersec shit to be posted on LinkedIn.by /u/inteller (cybersecurity) on May 7, 2024 at 1:08 am
Post your screenshots of your biggest whoppers desperate MSSPs and 10 ply CISO influencers trying to get your business. submitted by /u/inteller [link] [comments]
- Mentorship Monday - Post All Career, Education and Job questions here!by /u/AutoModerator (cybersecurity) on May 6, 2024 at 12:00 am
This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]
Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz
Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals
Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz
Skin Stem Cell Serum
Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel
Can AI Really Predict Lottery Results? We Asked an Expert.
Djamgatech
Read Photos and PDFs Aloud for me iOS
Read Photos and PDFs Aloud for me android
Read Photos and PDFs Aloud For me Windows 10/11
Read Photos and PDFs Aloud For Amazon
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more)
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6(Email us for more)
FREE 10000+ Quiz Trivia and and Brain Teasers for All Topics including Cloud Computing, General Knowledge, History, Television, Music, Art, Science, Movies, Films, US History, Soccer Football, World Cup, Data Science, Machine Learning, Geography, etc....
List of Freely available programming books - What is the single most influential book every Programmers should read
- Bjarne Stroustrup - The C++ Programming Language
- Brian W. Kernighan, Rob Pike - The Practice of Programming
- Donald Knuth - The Art of Computer Programming
- Ellen Ullman - Close to the Machine
- Ellis Horowitz - Fundamentals of Computer Algorithms
- Eric Raymond - The Art of Unix Programming
- Gerald M. Weinberg - The Psychology of Computer Programming
- James Gosling - The Java Programming Language
- Joel Spolsky - The Best Software Writing I
- Keith Curtis - After the Software Wars
- Richard M. Stallman - Free Software, Free Society
- Richard P. Gabriel - Patterns of Software
- Richard P. Gabriel - Innovation Happens Elsewhere
- Code Complete (2nd edition) by Steve McConnell
- The Pragmatic Programmer
- Structure and Interpretation of Computer Programs
- The C Programming Language by Kernighan and Ritchie
- Introduction to Algorithms by Cormen, Leiserson, Rivest & Stein
- Design Patterns by the Gang of Four
- Refactoring: Improving the Design of Existing Code
- The Mythical Man Month
- The Art of Computer Programming by Donald Knuth
- Compilers: Principles, Techniques and Tools by Alfred V. Aho, Ravi Sethi and Jeffrey D. Ullman
- Gödel, Escher, Bach by Douglas Hofstadter
- Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin
- Effective C++
- More Effective C++
- CODE by Charles Petzold
- Programming Pearls by Jon Bentley
- Working Effectively with Legacy Code by Michael C. Feathers
- Peopleware by Demarco and Lister
- Coders at Work by Peter Seibel
- Surely You're Joking, Mr. Feynman!
- Effective Java 2nd edition
- Patterns of Enterprise Application Architecture by Martin Fowler
- The Little Schemer
- The Seasoned Schemer
- Why's (Poignant) Guide to Ruby
- The Inmates Are Running The Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity
- The Art of Unix Programming
- Test-Driven Development: By Example by Kent Beck
- Practices of an Agile Developer
- Don't Make Me Think
- Agile Software Development, Principles, Patterns, and Practices by Robert C. Martin
- Domain Driven Designs by Eric Evans
- The Design of Everyday Things by Donald Norman
- Modern C++ Design by Andrei Alexandrescu
- Best Software Writing I by Joel Spolsky
- The Practice of Programming by Kernighan and Pike
- Pragmatic Thinking and Learning: Refactor Your Wetware by Andy Hunt
- Software Estimation: Demystifying the Black Art by Steve McConnel
- The Passionate Programmer (My Job Went To India) by Chad Fowler
- Hackers: Heroes of the Computer Revolution
- Algorithms + Data Structures = Programs
- Writing Solid Code
- JavaScript - The Good Parts
- Getting Real by 37 Signals
- Foundations of Programming by Karl Seguin
- Computer Graphics: Principles and Practice in C (2nd Edition)
- Thinking in Java by Bruce Eckel
- The Elements of Computing Systems
- Refactoring to Patterns by Joshua Kerievsky
- Modern Operating Systems by Andrew S. Tanenbaum
- The Annotated Turing
- Things That Make Us Smart by Donald Norman
- The Timeless Way of Building by Christopher Alexander
- The Deadline: A Novel About Project Management by Tom DeMarco
- The C++ Programming Language (3rd edition) by Stroustrup
- Patterns of Enterprise Application Architecture
- Computer Systems - A Programmer's Perspective
- Agile Principles, Patterns, and Practices in C# by Robert C. Martin
- Growing Object-Oriented Software, Guided by Tests
- Framework Design Guidelines by Brad Abrams
- Object Thinking by Dr. David West
- Advanced Programming in the UNIX Environment by W. Richard Stevens
- Hackers and Painters: Big Ideas from the Computer Age
- The Soul of a New Machine by Tracy Kidder
- CLR via C# by Jeffrey Richter
- The Timeless Way of Building by Christopher Alexander
- Design Patterns in C# by Steve Metsker
- Alice in Wonderland by Lewis Carol
- Zen and the Art of Motorcycle Maintenance by Robert M. Pirsig
- About Face - The Essentials of Interaction Design
- Here Comes Everybody: The Power of Organizing Without Organizations by Clay Shirky
- The Tao of Programming
- Computational Beauty of Nature
- Writing Solid Code by Steve Maguire
- Philip and Alex's Guide to Web Publishing
- Object-Oriented Analysis and Design with Applications by Grady Booch
- Effective Java by Joshua Bloch
- Computability by N. J. Cutland
- Masterminds of Programming
- The Tao Te Ching
- The Productive Programmer
- The Art of Deception by Kevin Mitnick
- The Career Programmer: Guerilla Tactics for an Imperfect World by Christopher Duncan
- Paradigms of Artificial Intelligence Programming: Case studies in Common Lisp
- Masters of Doom
- Pragmatic Unit Testing in C# with NUnit by Andy Hunt and Dave Thomas with Matt Hargett
- How To Solve It by George Polya
- The Alchemist by Paulo Coelho
- Smalltalk-80: The Language and its Implementation
- Writing Secure Code (2nd Edition) by Michael Howard
- Introduction to Functional Programming by Philip Wadler and Richard Bird
- No Bugs! by David Thielen
- Rework by Jason Freid and DHH
- JUnit in Action
#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks
Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic
- Chemicals in vapes could be highly toxic when heated, research finds | AI analysis of 180 vape flavours finds that products contain 127 ‘acutely toxic’ chemicals, 153 ‘health hazards’ and 225 ‘irritants’by /u/chrisdh79 on May 8, 2024 at 1:15 pm
submitted by /u/chrisdh79 [link] [comments]
- Highly Pathogenic Avian Influenza in Dairy Herdsby /u/Hiversitize on May 8, 2024 at 11:56 am
submitted by /u/Hiversitize [link] [comments]
- The FDA misses its own deadline to propose a ban on formaldehyde from hair productsby /u/Maxcactus on May 8, 2024 at 10:40 am
submitted by /u/Maxcactus [link] [comments]
- ANALYSIS | Florida has a beef with artificial meat. It's not aloneby /u/boppinmule on May 8, 2024 at 8:53 am
submitted by /u/boppinmule [link] [comments]
- FLiRT COVID variants symptoms explainedby /u/newsweek on May 8, 2024 at 8:35 am
submitted by /u/newsweek [link] [comments]
Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.
- TIL: Drowning is by far the most common cause of death for Hawaiian tourists, with the majority of those deaths happening while snorkeling.by /u/realrealityreally on May 8, 2024 at 3:41 pm
submitted by /u/realrealityreally [link] [comments]
- TIL Matt Groening named the main members of the Simpsons family (apart from Bart) after his own family (ex. Homer Groening is Matt's father)by /u/KeeperCP1 on May 8, 2024 at 1:32 pm
submitted by /u/KeeperCP1 [link] [comments]
- TIL Isaac Newton created the modern color wheelby /u/Capnzebra1 on May 8, 2024 at 12:49 pm
submitted by /u/Capnzebra1 [link] [comments]
- TIL the East River (east side of Manhattan, Brookly Bridge crosses it) isn't a fork of the Hudson, but instead a tidal strait.by /u/drangundsturm on May 8, 2024 at 12:36 pm
submitted by /u/drangundsturm [link] [comments]
- TIL Abulia, a neurological condition, results in a significant lack of willpower or initiative, often leading to severe difficulties in decision-making and diminished motivation to engage in daily activities.by /u/whstlngisnvrenf on May 8, 2024 at 10:56 am
submitted by /u/whstlngisnvrenf [link] [comments]
Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.
- Google DeepMind: AlphaFold 3 predicts the structure and interactions of all of life’s moleculesby /u/SharpCartographer831 on May 8, 2024 at 3:37 pm
submitted by /u/SharpCartographer831 [link] [comments]
- Study: Children who persistently sleep fewer hours more than twice as likely to develop a psychotic disorder in early adulthood, and nearly four times as likely to have a psychotic episode later in lifeby /u/FunnyGamer97 on May 8, 2024 at 3:19 pm
submitted by /u/FunnyGamer97 [link] [comments]
- After analyzing the health data of 92,383 healthcare professionals, researchers found that participants who regularly consumed olive oil were, on average, 28% less likely to die from dementia than their animal-fat-frying counterparts.by /u/chrisdh79 on May 8, 2024 at 3:02 pm
submitted by /u/chrisdh79 [link] [comments]
- Sheriffs reduce traffic enforcement during election years – "A county's per capita traffic fines revenue is 30% lower in the election than in nonelection years. The magnitude of the political cycle intensifies when an incumbent sheriff runs for reelection or an election is competitive."by /u/smurfyjenkins on May 8, 2024 at 2:25 pm
submitted by /u/smurfyjenkins [link] [comments]
- Deforestation can raise local temperatures by up to 4.5°C – and heat untouched areas 6km awayby /u/flemtone on May 8, 2024 at 2:14 pm
submitted by /u/flemtone [link] [comments]
Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.
- Boxing champion Jermall Charlo arrested and charged with DWI following collisionby /u/Oldtimer_2 on May 8, 2024 at 1:34 pm
submitted by /u/Oldtimer_2 [link] [comments]
- MLB warns teams against encouraging players to withdraw from high schools to avoid amateur draftby /u/Oldtimer_2 on May 8, 2024 at 1:01 pm
submitted by /u/Oldtimer_2 [link] [comments]
- A ship carrying the Olympic torch arrives in Marseille amid fanfare and high securityby /u/Oldtimer_2 on May 8, 2024 at 12:58 pm
submitted by /u/Oldtimer_2 [link] [comments]
- Troyes suspend 4 players for throwing flares back at fansby /u/PrincessBananas85 on May 8, 2024 at 12:36 pm
submitted by /u/PrincessBananas85 [link] [comments]
- Maradona's stolen World Cup Golden Ball trophy to be auctionedby /u/Majano57 on May 8, 2024 at 12:19 pm
submitted by /u/Majano57 [link] [comments]