More interesting articles I've come across recently.
Cryptography based on Algebraic Coding Theory
Article about post quantum cryptography algorithms. One of the contenders is code-based cryptography, which utilizes computationally hard problems in algebraic coding theory. The article describes how the McEliece algorithm works:
GitHub account takeover
Read this if you use GitHub. If you create a user/repository and subsequently delete it, then it's possible for someone else to take over the name for their own account/repository. This could be open to abuse if someone deletes a popular repository and it then gets replaced with something malicious. Someone cloning from a git URL without checking what they were pulling could lead to trouble.
RSA 230 has been factorized!
Launch an elevated cmd without UAC challenge
If you run Windows as an administrator user then you can launch an elevated command prompt without a UAC challenge by running the following:
msconfig -5 c c c Alt+L
Google Optimize now has a free tier
The word for how it smells after it rains is