Pink News: Queer athlete Sha’Carri Richardson just became the fastest woman in the world https://www.thepinknews.com/2023/08/23/shacarri-richardson-fastest-woman-world/ #LGBT #LGBTQ #Trans #Lesbian #2SLGBTQ #Sha’CarriRichardson #Sport #News #US
#lgbt #LGBTQ #trans #lesbian #2SLGBTQ #sha #sport #news #us
#Sha’CarriRichardson has outrun the absurdity of the #USA #OlympicGames Committee prior to the #TokyoGames in 2020 and has proven that she is the fastest woman in the world 🌎!
https://www.nbcnews.com/news/sports/american-sprinter-shacarri-richardson-world-100-meter-rcna101061
#sha #usa #olympicgames #tokyogames
Chilli and Sha at the beach!!
(There's an original version I never posted but I am NOT ready to get cancelled over a flag bikini LOL)
#Sha #TheWaltenFiles #Chilli #Bluey #Beach #MILFs #Suggestive #Bikinis #Furry
#sha #thewaltenfiles #chilli #bluey #beach #milfs #suggestive #bikinis #furry
今日は相模原の米軍住宅に行ってきました
朝からちょっと調子悪かったので、アメリカ人に起きてる?大丈夫?って言われてしまいました
家のクーラー壊れたから熱中症ぽい感じになっていたよいです
相模原は米軍基地としては小さい施設ですがいろんなものが入っています
タコベルもあるんですよ
#米軍基地
#英会話スクール
#SHA
http://goover.co.jp
I just ran #sha256sum on a #Synology DS1821+ and on a #Mac Studio M1 Max on a bunch of ~7gb files.
The files are on HDDs Raid 6 on the Synology and on the internal SSD on the Mac.
The Synology took 7m 15s the Mac took 11m 5s.
I would have expected the Mac to be much faster.
What the heck is going on here?
#sha256sum #synology #mac #benchmark #sha #checksum
Could you give me some advice (and sources!) towards #openLDAP? Is #SSHA (seeded #SHA) in any way still a valid scheme in 2023? I see only "SHA-1" and then I'm quitting.
Is there any way to somehow see SSHA as acceptable nowadays or should I enforce use of crypt/sha-512 "$6$%.16s"?
Jezebel: Sex. Celebrity. Politics. With Teeth: Vroom Vroom: Are Shakira and Lewis Hamilton Off to the Races? https://jezebel.com/shakira-lewis-hamilton-1850506139 #Jezebel #the2021saudiarabiangrandprix #lewishamiltonoff #spanishgrandprix #openwheelracing #gerardpiquc3a9 #lewishamilton #georgerussell #barbarapalvin #autoracing #formulaone #faikhadra #shakira #lewkira #mustafa #shewolf #shakir #sha
#jezebel #the2021saudiarabiangrandprix #lewishamiltonoff #spanishgrandprix #openwheelracing #gerardpiquc3a9 #lewishamilton #GeorgeRussell #barbarapalvin #autoracing #formulaone #faikhadra #shakira #lewkira #mustafa #shewolf #shakir #sha
Molti publisher di software #FOSS offrono la possibilità di verificare l'integrità dei pacchetti software scaricati dai loro siti web. Questa è anche una comune pratica di #DataIntegrity adottata nell'Industria per garantire che un file non sia stato alterato dopo la sua emissione.
#Windows non offre nativamente il controllo degli #hash #SHA-256 per i file scaricati. Vediamo dunque come implementarlo automatizzando l'interazione il più possibile.
https://77nn.it/2023/05/01/Verifica-hash-file-scaricati.html
#foss #dataintegrity #windows #hash #sha
The new season of #LouderThanARiot is live! Just heard the episode about #Sha-Rock and I can't believe it's taken 50 years to hear these conversations about gender in #HipHop. But then again this feels right on time. Looking forward to listening the rest of the season.
Wozu dienen eigentlich die #Prüfsumme/n beim Download von #iso Dateien? Wenn ich die Prüfdatei von der selben Quelle beziehe wie die Datei kann ist das doch nicht zielführend, kann ja genau so kompromitiert sein. Richtet sich das nur an über Mirrors oder Torrent bezogene Dateien? #sha #linux
#infosec #vulnerability
#Buffer_overflow in #SHA-3 #SHAKE #Keccak and #XKCP #hash functions. Some versions of #EdDSA are impacted too 😟
#infosec #vulnerability #buffer_overflow #sha #shake #keccak #xkcp #hash #eddsa
#infosec
#Buffer_overflow in #SHA-3 #SHAKE #Keccak and #XKCP, as well as some versions of #EdDSA 😟
(on 64 bits systems only if I understood correctly)
https://eprint.iacr.org/2023/331
#infosec #buffer_overflow #sha #shake #keccak #xkcp #eddsa
#infosec
#Buffer_overflow in #SHA-3 #Keccak and #XKCP, as well as some versions of #EdDSA 😟
(on 64 bits systems only if I understood correctly)
https://eprint.iacr.org/2023/331
#infosec #buffer_overflow #sha #keccak #xkcp #eddsa
Paper 2023/331 A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm
Abstract
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been present since the final-round update of Keccak was submitted to the National Institute of Standards and Technology (NIST) SHA-3 hash function competition in January 2011, and is present in the eXtended Keccak Code Package (XKCP) of the Keccak team. It affects all software projects that have integrated this code, such as the scripting languages Python and PHP Hypertext Preprocessor (PHP). The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (without any restrictions on values to be XORed and even far beyond the location of the original buffer), thereby making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective. First, we provide Python and PHP scripts that cause segmentation faults when vulnerable versions of the interpreters are used. Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. The vulnerability applies to all hash value sizes, and all 64-bit Windows, Linux, and macOS operating systems, and may also impact cryptographic algorithms that require SHA-3 or its variants, such as the Edwards-curve Digital Signature Algorithm (EdDSA) when the Edwards448 curve is used. We introduce the Init-Update-Final Test (IUFT) to detect this vulnerability in implementations. #cryptography #encryption #sha #sha3 #cybersecurity #hash #hashing #algorithm #algorithms #nist #nistcybersecurityframework
#cryptography #encryption #sha #sha3 #cybersecurity #hash #hashing #algorithm #algorithms #nist #nistcybersecurityframework
Sichere Ahnen Prüfung mit Cryptographic Hashes
Bei der Erstellung eigner Stammbäume gibt es immer wieder den Wunsch in anderen Datenbeständen nach Familienangehörigen zu suchen. Dabei ergibt sich jedoch das Problem, dann personenbezogene Daten an andere versendet werden müssen.
https://schegge.de/2023/03/sichere-ahnen-pruefung-mit-cryptographic-hashes/
#Algorithmen #BestPractices #Design-Pattern #Java #Web #SHA #SHA3-256
#algorithmen #bestpractices #Design #java #web #sha #sha3
Sichere Ahnen Prüfung mit Cryptographic Hashes
Bei der Erstellung eigner Stammbäume gibt es immer wieder den Wunsch in anderen Datenbeständen nach Familienangehörigen zu suchen. Dabei ergibt sich jedoch das Problem, dann personenbezogene Daten an andere versendet werden müssen.
https://schegge.de/2023/03/sichere-ahnen-pruefung-mit-cryptographic-hashes/
#Algorithmen #BestPractices #Design-Pattern #Java #Web #SHA #SHA3-256
#algorithmen #bestpractices #Design #java #web #sha #sha3
https://conservancy.umn.edu/handle/11299/217469
Just Released: 2nd edition of our free textbook: Species-Habitat Associations: Spatial data, predictive models, and ecological insights.
#SHA #SDM #niche #SpatialEcology #PointProcesses #rstats #ecology #spatial #SpeciesDistributionModels
#sha #SDM #niche #spatialecology #pointprocesses #rstats #ecology #spatial #SpeciesDistributionModels