Developers Club geek daily blog

40 books and educational resources for studying of stock market and algorithmic trade

2 years, 7 months ago


Stock market — large-scale and difficult knowledge domain. Different technologies of exchange trade actively develop in the last a couple of decades. To understand the structure of stock market, the laws and the principles working at it and also used by different players technologies — it is absolutely difficult.

In our today's material — a selection from 40 books and educational which will help to be prepared better for the beginning of work in stock market and to writing of mechanical trade systems.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 22. "Enemies"

2 years, 7 months ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

MagisterLudi: "I apologize, under the end of the year confusion with ready heads began again, we spread that is, not one after another."

Chapter 22. Enemies

(for transfer thanks of GrizliK)

Johnathan Dzhiannone learned that loss of private life is the price for work with Iceman'om.

It worked with the mysterious hacker within a year, generally purchasing servers which Iceman used for scanning of vulnerabilities, but all the same was under the permanent electronic king from Iceman'a. Once, the hacker sent to Dzhiannona the link to news allegedly on the website CNN about a computer problem to JetBlue, airline which fought back Dzhiannone's racketings very long time ago. Dzhiannone without thinking clicked the link and then Iceman got to its computer again. Attack like Client-side worked.

Dzhannone began to check regularly the computer for existence of malicious applications, but all the same could not monitor all invasions of Iceman'a. Max received Dzhannone's password from the bonus United Airlines system and began to monitor its movements on the world. Dzhannone was a fan of aviatravel who could go easily to flight, only to earn bonus miles. When it landed at the international airport San Francisco, in its mobile there was already a text message from Iceman'a. "Why you in San Francisco?"

It could seem amusing if not frightening differences of mood of Iceman'a. It could change in a second — in one day you will be for it the best friend, it will be confident in another that you are an informer, the traitor or is even worse. He wrote Dzhiannone long spontaneous letters, with complaints to Chris or other associates of crankcases.

Read more »


Book "Way of the Programmer"

2 years, 7 months ago
image Any programmer — first of all, the person with the merits and demerits. But at the same time the programmer is an intellectual, the person who is constantly occupied with a solution of tasks, requirement analysis, correction of errors, interaction with colleagues and customers. At last, the programmer is the person who regularly have the serious stress forced to meet the tough deadline and simply obliged to self-improve constantly.

This book contains exhaustive information on what is required for building of successful career of the programmer, helps IT specialists to understand better the profession and colleagues, always to remain demanded in labor market, purposefully and to develop productively, and also to receive this devotion and original pleasure from favourite work.

Read more »


Stephen's book of Elementary Introduction to the Wolfram Language Language Tungsten

2 years, 7 months ago

Transfer of a post of Stephen Wolfram "I Wrote a Book — To Teach the Wolfram Language".
I express huge gratitude to Kirill Guzenko of KirillGuzenko for the help in transfer and preparation of the publication

The book "Elementary Introduction to the Wolfram Language Language" is available to you in printed form, is free on the Internet, and also in other forms.



I was not sure that I will sometime write one more book. My latest book — the New type of science — took me more than ten years of the hard concentrated work and is my largest project from all that I ever did.

But some time ago I understood that I should write one more book — such which would acquaint the people not familiar with programming, with the Wolfram Language language and methods of thinking in the computing sphere which are presented by this language.

Result — the book Elementary introduction to the Wolfram Language language which was published today. It is also freely available on the Internet, and in other forms.


Read more »


Programming of multiplayer games

2 years, 7 months ago
Good afternoon, Habr!

We just published the book across Unity, and it became interesting to us as far as in general a hot topic of programming of games. The huge set, but it not so would have to seemed books on this subject to be let out.

Just there was a book "Multiplayer Game Programming: Architecting Networked Games (Game Design)".
image
Its transfer into Russian is how actual?
Details under a cat. We wait for your comments

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 21. "Master Splyntr"

2 years, 7 months ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

(I apologize, transfer of the 20th chapter was lost, to wait there are no forces and I will spread the others.)

Chapter 21. Master Splyntr

(for transfer thanks of ungswar)

Occupying the whole floor of green office structure on the river bank of Monongakhil, the National Alliance Kiber-Kriminalistiki and Training (HAKKO) was very far from privacy of the Washington prospecting community where Mularski took the first steps. Here dozens of experts in safety from banks and technology companies worked along with students from nearby Carnegie Mellon University in closely the placed accurate cabins surrounded with a ring of offices and, then, building walls from tinted glass. With chairs Aeron * and vaytbordam, office created feeling of one of the technology companies which supplied HAKKO with the main part of means. FBI made several changes before driving, remade one of offices to the room with electronic communications, filled it with the computers approved by the government and the cryptographic equipment safely to communicate with Washington.

In the office Mularski studied the scheme of communications of Krebba — the mail inspector who sent it by e-mail — the large scale circuit showing different communications between 125 purposes from an underground. Mularski realized that he did everything wrong: expected a crime, and then tried to find responsible. Criminals did not hide at all. They advertized the services at forums. It did them vulnerable, the same as rituals and strict hierarchy of the New York and Chicago mafia which gave FBI the instruction to break gangs a decade ago.

Everything that he should have made now is to join crankcases.

Read more »


Transfer subtleties: as volunteers, to ABBYY LS and IBS translate into Russian kurserovsky specialization of Data Science

2 years, 7 months ago


Vladimir Podolsky (part 1 and part 2).

And again hi, habr!

Coursera and other MOOS'I – very entertaining and tightening piece. Thanks to them it is possible to learn much, to learn a lot of things. It is important to have only access to a network and not to be lazy. In all Moos'ovskoy of history the same rule works, as when writing the master's thesis: "If it is not ready to do every day on slightly, better be not accepted at all". Following it, it is possible to cope both with a data science, and with introduction to artificial intelligence, and even with quantum physics …

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 18. "Briefing"

2 years, 7 months ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in Itshny camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera and even a few edition.

"the quest on transfer of the book" received a second wind thanks to the Edison company.

Chapter 16. Briefing

(for transfer thanks of paxapy)

In a conference room near Washington the wall monitor showed two tens man's faces. Some of them frowned for a picture in the camera, others smiled for a passport photo. Couple of children looked as the teenagers who hardly reached puberty, others were more senior, looked slovenly and is repellent.

Several FBI agents, in suits and ties, having gathered around a table, looked at persons of the international computer underground. For one of them many things were suddenly filled with sense.

image In thirty five, Kate Mularski's (J. Keith Mularski) J within seven years worked as the FBI agent. But in department of computer crimes it was only four months and it should learn much. Friendly and with good sense of humour, wanted to become Mularski the FBI agent from the first course of Westminster college in Pennsylvania when to them to a class the recruit came from bureau for conversation. It remained in a qualification leaf even when it had to work at more prosy positions, from the seller of furniture in Pittsburgh to the operational manager of a national network of furniture stores, with fifty employees in subordination in four shops.

In 1997, after eight years of waiting, he at last decided that he is ready for FBI. After year of checks and sixteen weeks of training in FBI academy in Quantico, he was sworn in as the agent in July, 1998.

By one of traditions of bureau, after release newly made agents had to number all local offices of FBI as preference for employment. He delivered to the native Pittsburgh the first number — it was the place where Mularski grew up, went to school and met the wife. Its chances to get disappeared there next month when terrorists bombed Embassies of the USA in Kenya and Tanzania. Experienced FBI agents were sent from Washington for carrying out investigations and Mularski was one of fifteen recruits sent to vacant positions in the capital — the city which was in its list at number thirty two.

Quickly enough Mularski passed from management of furniture stores to work on some of the most important and significant investigations of FBI. When in 1999 the sending device was found in office on the upper floor of headquarters of State Department, it was in command which found the Russian diplomat accepting a signal outside. In 2001 he helped to track down Robert Hansen, the agent of counterintelligence who within twenty years was engaged in espionage for KGB and FSB.

Read more »


Stories of accidents on the UPS

2 years, 7 months ago
Continuing and supplementing a feature story "Failures and accidents in DPC", we will share several supervision without claim for the serious analysis of causes and effects. Perhaps, some moments will seem to the reader funny and amusing though everything that occurred, was very serious. We hope, these rather instructive stories will allow the reader most to draw conclusions.

Axiomatic scenario

On a twist of fate accident about which the speech will go below happened only three months after the customer and the general designer received from our company the warning letter with the recommendation to set an external service bypass on uninterruptible power supply unit later. But no reaction to warning followed.

In the process of construction of a data-center our company put and mounted the Trinergy UPS flagman block system with a power of 1 MW. Though this UPS is also equipped with the built-in service bypass, all of us recommended to parent organization to make an external general service bypass on system ― in case of accident that at adverse succession of events it would be possible to service this source completely, without interrupting power supply of loading. But specialists of the general contractor objected that the UPS is already equipped with a service bypass which will allow to service internal components of system in any situation. Nothing foretold bad, and cases that the new system was entirely put out of action, was expected.

Read more »


Underground market of crankcases. Transfer of the book "KingPIN". Chapter 17. "Pizza and Plastic"

2 years, 8 months ago
Kevin Poulsen, the editor of the WIRED log, and in blackhat childhood the hacker of Dark Dante, wrote the book about "one acquaintance".

In the book the way from the teenage geek (but at the same time rolling), to the experienced cyberkingpin, and also some methods of work of intelligence agencies on capture of hackers and crankcases is shown.

The quest on transfer of the book began in the summer in an IT shnom camp for seniors — "The Pin: school students translate the book about hackers", then were connected to transfer also Habrayuzera, and even edition is a little.

"the quest on transfer of the book" received a second wind thanks to the company In the previous chapter it was talked of how trustful crankcases opened, using controlled VPN, and the Edison developers told that they created VPNKU from the anonymous customer. And literally couple of days ago to them the person from Habr made an inquiry to help to construct an anonymous chat. So the development subject in the field of anonymous VPN services is live and actual.

Chapter 17. "Pizza and Plastic"


(for transfer thanks of Ashot Ogoltsov)
On the upper floor of a skyscraper on Post Street, on a floor from a laminate, there was Max's computer — silent and cold. It was the small apartment, the size there is slightly more prison cell. This apartment was found to it by Chris, and it corresponded to all its requests: small area, huge number of neighbour's Wi-fi of networks. The apartment was decorated under a light tree, in it there was a big refrigerator and there was a folding bed which cleaned up in a wall.

It was the clean apartment of 27 square meters without any excesses where Max disappeared after left the penthouse. He received a quite good gain from operation with Citibank and was not engaged in cracking several months. Chris needed only to prepare counterfeit documents for semi-annual lease of the apartment and to pay the deposit in the amount of $500.

Behind a window shops and apartments which, without knowing that were seen, were already ready to provide to Max's computer the channel for communication. As soon as its computers were switched on, and the antenna caught the channel of some ninny, Max spent a little time to return to the affairs.

As usual he aimed at froder and for this purpose he developed several new methods of theft of data. He was aware of the last phishing attacks as he monitored notifications from the organization under APWG (Anti-phishing Group www.antiphishing.org). Notifications included addresses of phishing sites and the connected imeyla. It was enough for Max to get on servers of fisher and to perepokhishchat the stolen data. Then it deleted information on servers, than extremely disappointed fisher.

Other attacks were less aimed, Max still entered ranks of white-hat of hackers, and was present at addressees private imeyl mailings where often revealed 0-day vulnerabilities. In the days and at the nights Max's computers scanned servers in search of vulnerabilities. Once, Max scanned Windows the server regarding buffer overflow and found what brought it into the world of crankcases.

Read more »