Developers Club geek daily blog

Happy birthday, Donald Cnut

1 year, 1 month ago
image

Birthday, on January 10, 78 years


Read more »


Rising of a razrabotchikonomika (termination)

1 year, 1 month ago
(beginning of article here)

Risk management at investment into programmer talents


On the other hand — this effect has no name; perhaps, it should be named "desyatikradnichestvo"bad developers will cost to you not insignificant deterioration in labor productivity. No, for a number of the hardly perceptible reasons they are capable to sabotage complex program system catastrophically. The bad developer who constructed threateningly complete of errors or worse than ever the designed system in its basis planted the ticking time bomb and to rake ruins after it jerks, attachments will be required, it is thousandfold exceeding saved on start. Worse than that, work on removal of debris will demand attraction of efforts of much bigger number of good developers, and on more progressive tense.

In this moment software development is the complete antithesis to other industries — we will tell, space — in which incompetence and gross errors are much more obvious; it is easier to find and correct them at early stages until the cost of such correction grew to heaven yet. (Like construction of the airplane in which during real operation fatal defect was found) also much easier to hold the delayed crises from distribution, to isolate and correct.

Read more »


Sociology of algorithms: As the financial markets and high-frequency trade (Part 2) are connected

1 year, 1 month ago


Earlier we published in our blog first partresearches of sociology of financial algorithms executed by professor of the Higher school of social sciences of Edinburgh of Donald Mackenzie. Today we present to yours continuation of this interesting work — in the second part it is about different types of HFT requests, dark-pools and the connected ekologiya of the financial markets.

Read more »


Rising of a razrabotchikonomika

1 year, 1 month ago
From the translator
Reading now and then a few years ago the Forbes log, I came across article which I found extremely interesting. Well, you know as happens — you read, you read, and on each paragraph you vosklikat: "About! Qie about me!". Could not believe that I one such, and nobody will be honored if not to translate then to refer to it in the Russian-speaking press. However in four years of it did not occur. Well, "you want to make something correctly — make it", therefore I provide to attention of respectable public the first half of article. (I try to translate artly therefore work moves not quickly; the original size — more 30th kilobyte, and, "having passed mortal life to a half", I understood that to keep there are no more than forces.)

P.S. Could not understand how to put the transfer tag in heading.

Rising of a razrabotchikonomika


Venkatesh Rao's article is published in December, 2011 in the Forbes log.

In evolutionary biology there is a theory according to which mutual altruism and cooperation arose as a solution of the problem of storage of food. If to you, an early hominid, has luck to fill up a large mammoth, you had no slightest chance to skharchit it entirely before it becomes rotten. Then you shared food: attachment in a stomach of your friend was the best attachment for the excess capital. In this case you could demand return of a contribution that time when the mammoth is filled up already by this friend.

Recently I reflected over this paltry idea in the context of human wealth. If only you are not a professional investor (and even if you are), now to find places for storage of surplus of the capital where he would be in safety and was not amortized too quickly (not to mention bringing of the income) it becomes harder and harder. The stock market even more often casts thoughts of a bloody feast of "bears". Volatility and unexpected short-term rallies make game with short positions of unsafe. Even storage of assets in dollars, seemingly, conceals the dangers — thanks to threat of devaluation and any modern words like "quantitative mitigation" which we, average investors, hear for the first time. Euro now too does not look as optimistic alternative. The solution to invest in gold — and in general in any raw materials — seems, demands a little apocalyptic view of the world, and reflections how you are going to get access to actually subject of ownership if all and the truth will depart to depths of hell (there is a wish to note that at the moment I cannot call such view of the world so unjustified).

But there is one smooth water — if you know how to be enclosed in it: software developers.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 29. "One Plat and Six Classics"

1 year, 1 month ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

Chapter 29. One Plat and Six Classics

(for transfer thanks to Vyacheslav Slinkin)

Did not realize Kate Mularski that does when undertook DarkMarket.

Its days became true madness. Every day began at 8 in the morning with check of ICQ of the messages which fell down in a night regarding any work for MasterSplinter-and.

It went to DarkMarket — service functioned. To come across here on Iceman-and it was always extremely heavy.

Then queue of tiresome work on backup of a DB came. Iceman reset tables twice in vain attempts to expose Mularski so now fuss with backups was part of morning routine. It was impossible to forget about investigation: so far the base continued to be copied, the simple script which author was a NCFTA programmer scanned every line regarding 16-place numbers, beginning with digits 3 on 6. The stolen credit cards automatically were sorted by BIN and went to the relevant banks for immediate cancellation.

Then Mularski fluently browsed private messages, selected the most interesting chats and checked them in the FBI-ovsky central database of electronic surveillance under the name ELSUR. The following neskolk was spent hours for writing of the report. Under a nickname of Master Splinter, Mularski began to cash funds for the modest sums. Some banks agreed to promote and shared the available dump with fake names, but real transactions which processing was financed already from budget FBR.ON transferred them the list with numbers PIN of crankcases over all country, financial institutions in turn daily reported on that where and when withdrawal of funds was performed. Mularski transferred information to local agents depending on the city where operations were made that led to regular writing of detailed notes.

At three o'clock, when crankcases began to appear in a network, the "second" life of Mularski turned into a scorching heat.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 28. "Carder Court"

1 year, 1 month ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

Chapter 28. Court of crankcases

(for transfer thanks of drak0sha)

Kate Mularski it was emaciated.

At first he talked over with the agent in branch of the Secret service on other end of the city. "It seems to me you some troubles threaten". One of uncountable informants heard that Iceman found out incontestable proofs that the Master Splintr was or the informer, the spy of corporate safety, or the federal agent. Iceman temporarily integrated with the former enemy of Silo and prepared the detailed presentation for the manual Carders Market and Dark Market-á. Iceman and Silo obviously wanted to condemn the Master Splintr.

Everything began with the Silo code. Popularity of the Master Splintr as spammer and programmer made him the specialist in the field of reviews of a malicious code DarkMarket-and. It was one of benefits of its secret operation: Mularski will be able to evaluate the latests version of the confidential attacking code and to transfer them to CERT which, in turn, will send them to all anti-virus companies. The malicious code can be found still before it appears in the black market.

This time Mularski charged a code as a training task to one of students of CMU passing training in NCFTA. According to standard procedure the student started the program in the isolated mode on the virtual computer — some kind of program bowl of Petri which can be cleaned later. But he forgot about the USB stick in USB port. On it were loaded an empty form of account about a malicious application with the NCFTA logo and main objectives of research. Before the student realized that occurred, the document appeared in Silo hands.

Six administrators and moderators of DarkMarket received the copy of the Silo code. Now Canadians knew that one of them was a federal agent.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 26. "What’s in Your Wallet?"

1 year, 2 months ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

Chapter 26. What in your wallet?

(for transfer thanks of al_undefined)

Sale of 100% of the checked fresh dump (USA), discounts:

$11 of MasterCard
$8 of Visa Classic
$13 of Visa Gold/Premium
$19 of Visa Platinum
$24 of Visa Signature
$24 of Visa Business
$19 of Visa Corporate
$24 of Visa Purchasing
$19 of American Express = reduction of price (there was 24)
$24 of Discover = reduction of price (there were 29)
The minimum order — 10 pieces.

Sale on types of cards. Not on Bin'am (a lane comment — the identifier of issuing bank).


The aggressive capture turned by Max was made with the purpose to integrate community forces, but not for the purpose of personal enrichment. Nevertheless, its business selling stolen data from magnetic bands of plastic cards after consolidation of forums prospered more than ever — it received about one thousand dollars a day, selling dump to crankcases worldwide, in addition to five — to ten thousand that he received from partnership with Chris.

On public, during meetings FTC (Federal Trade Commission) or anywhere, the industry of credit cards very much tried to hide effects of the becoming frequent facts of theft of data from magnetic bands worldwide. Visa, the leader in the field of credit cards, supported the report of the Javelin Strategy and Research company financed by the industry (a lane comment — the agency which is engaged in an assessment of risks and opportunities in areas: mobile devices, payments, multichannel financial services, fraud and safety), who accused in the circumstances consumers (clients), but not the company — sources of draining of these credit cards and thefts of personal data: 63% of the occurred cases are caused by loss or theft of a purse with the subsequent theft of data by the entrusted partners, theft of e-mail and research of contents of garbage containers (Dumpster diving).

Read more »


As I wrote and published the book based on the posts from Habr

1 year, 2 months ago


Hi!
I have a small holiday today. My book "Business as Game" at last reached to shelves. Still warm.

The book grew from posts which I write years five here. Uporoty, with such things which usually about business do not write. Inside — 140 little heads on the page - two about different aspects of business, in fact — baizes. Everything began with habrapost — and it became gradually clear that they should be changed very strongly, plus to write much more about business and management.

Below I will tell that I learned while I was published. For example about the fact that it is impossible to earn from the book, about normal circulations, about process and in general.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 24. "Exposure"

1 year, 2 months ago
imageKevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

Chapter 24. "Exposure"

(for transfer thanks of satandyh)

Accusation

"The Tea, these little girls — white garbage. Be not on friendly terms with them better," — Chris told — "Brains at them others."

They sat in "Naan and Carry", 24-hour Indian-Pakistani small restaurant in the theatrical district of San Francisco. It occurred three months later since that moment when Tea got acquainted with Chris and was with it on one of its trips to the region of the Bay where he met the mysterious friend hacker of "Sam", just before dawn. They were in only four quarters from the safe house of Chris, but Tea still was not provided to the hacker — neither now, nor before. Nobody met Sam personally.

She was fascinated by that as all this worked: the non-cash nature of crimes and a method to which Chris organized the command. He told it everything when decided that it is ready, but he never asked it to make purchases in shops as the others. It was special. He did not even like to dangle with it and with the command of cashing in at the same time, for concern that they somehow can do much harm it.

The Tea was also the only worker to whom do not pay. After she refused 40 dollars left by Chris on a bedside table, he decided that Tea will not take from it any money, despite long hours which she spent on CardersMarket and on the Russian bulletin boards for crimes. Chris cared for lease of the house Tea, bought by it clothes and paid its travel, but it nevertheless found such existence a little strange: life online, travel by means of confirmations, but not tickets for airplanes. It became the ghost, her body was in the Orange country, and the reason was most often projected to Ukraine and Russia, giving support to leaders of organized cybercrime as the emissary of Iceman — i.e. the world of crankcases of the West.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 23. "Anglerphish"

1 year, 2 months ago
In the 23rd head it will be a question about hitrozho imperceptible (almost like in the movie "Catch Me if You Will Be Able") the criminal who drove FBI around a finger, at the same time managed to turn affairs while knocked to intelligence agencies, but eventually lost because of the woman, but managed to get out and run away. And still he in the best traditions of Chichikov used "dead souls" for cashing in of stolen credit cards.


Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

Chapter 23. Anglerphish

(for transfer thanks of Find_The_Truth)

Anglerfish

Max was engaged in collection of information on Brett Johnson. It began with check of logs of access and personal messages of the administrator of CardersMarket. To check itself, Max Johnson's account on the website of "The international association of development of criminal activity" hacked ("The International Association for the Advancement of Criminal Activity", IAACA) and looked for traces of its activity. However, the smoking guns, other proofs were.

Really he could bring the informant into a narrow circle of its new website? The problem is that there is no specific method to define whether Johnson, or someone else works for the government. Max wanted to use a hole in safety of law as buffer overflow in BIND which he could use again and again concerning any whom he suspected.

If (is_snitch(Go llumfun)) ban(Go llumfun);

It trusted in David Thomas, without representing that Thomas already entered Aysman in the kilometer list of enemies.

Read more »