<?xml version="1.0" encoding="utf-8" standalone="no"?><feed xmlns="http://www.w3.org/2005/Atom"><subtitle>Sélection d'actualités concernant les nouvelles technologies et les logiciels libres réalisé par la société Biapy</subtitle>
<title>Revue de Web Biapy</title>
<generator uri="http://tt-rss.org/">Tiny Tiny RSS/UNKNOWN (Unsupported, Git error)</generator>
<updated>2023-10-02T14:32:45+00:00</updated>
<id>https://rss.biapy.fr/public.php?op=rss&amp;id=-2&amp;key=8591775ae449eceb369a512cd4a29af5623f3b66</id>
<link href="https://rss.biapy.fr/public.php?op=rss&amp;id=-2&amp;key=8591775ae449eceb369a512cd4a29af5623f3b66" rel="self"/>

<link href="https://rss.biapy.fr" rel="alternate"/>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599217</id>
	<link href="https://blog.octo.com/un-ide-flutter-sur-mesure-avec-custom_lint/" rel="alternate" type="text/html"/>
	<title type="html">Un IDE Flutter sur mesure avec custom_lint</title>
	<summary type="html"><![CDATA[<p>Dans un soucis de maintenabilit&eacute;, de performance et de lisibilit&eacute; du code, on d&eacute;finit sur nos proje...</p>]]></summary>
	<content type="html"><![CDATA[<p>Dans un soucis de maintenabilit&eacute;, de performance et de lisibilit&eacute; du code, on d&eacute;finit sur nos projets tout un nombre de bonnes pratiques, de r&egrave;gles de vie, ou de standards que l&rsquo;on essaie d&rsquo;appliquer &ldquo;au mieux&rdquo; que ce soit dans la phase de d&eacute;veloppement ou dans la phase de code review.<br>Pour tous ceux &agrave; qui le respect de toutes ces r&egrave;gles tient &agrave; c&oelig;ur, la charge mentale, ainsi que le temps accord&eacute; &agrave; v&eacute;rifier leur bonne application sont cons&eacute;quents. Sans compter le temps passer &agrave; transmettre ces r&egrave;gles, et &agrave; convaincre de leur utilit&eacute;.<br>Dans cette optique, Flutter nous propose un outil aussi complet que rapide dans sa boucle de feedback : le linter. Sans rentrer plus dans les d&eacute;tails du fonctionnement de ce Linter, nous allons simplement dire que c&rsquo;est un serveur qui tourne sur notre machine, pour analyser en continu notre code, et remonter des erreurs ou des avertissements.</p>



<h2><strong>Structure d&rsquo;une r&egrave;gle dans l&rsquo;analyser de base</strong></h2>



<p>En analysant nos fichiers les uns apr&egrave;s les autres, le linter Flutter va appliquer <a href="https://dart.dev/tools/linter-rules" rel="noopener noreferrer" target="_blank">un set de r&egrave;gles</a> cons&eacute;quent, et surtout, pour chacune de ces r&egrave;gles, nous fournir l&rsquo;explication associ&eacute;e &agrave; la r&egrave;gle, un exemple de bonne et de mauvaise utilisation, et parfois une correction automatique.<br><br>Pour expliciter chaque composant d&rsquo;une r&egrave;gle de lint nous allons regarder plus pr&eacute;cis&eacute;ment l&rsquo;exemple de la r&egrave;gle &ldquo;<a href="https://dart.dev/tools/linter-rules/use_decorated_box" rel="noopener noreferrer" target="_blank">use_decorated_box</a>&rdquo; :</p>



<p>Cette r&egrave;gle comporte :<br>&nbsp; &ndash; <strong>un code unique &ldquo;use_decorated_box&rdquo;</strong> : c&rsquo;est son identifiant, on peut l&rsquo;utiliser notamment si on souhaite ignorer cette r&egrave;gle en &eacute;crivant :</p>



<pre><code>
// ignore: use_decorated_box
</code></pre>



<p>&nbsp;&ndash; <strong>une description</strong> : un texte clair et concis expliquant rapidement en quoi consiste cette r&egrave;gle. Ce texte sera affich&eacute; &agrave; l&rsquo;utilisateur quand il passera son curseur au-dessus d&rsquo;un bout de code ne respectant pas cette r&egrave;gle.</p>



<figure><img decoding="async" fetchpriority="high" src="https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-1024x199.png" alt="" srcset="https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-1024x199.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-300x58.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-160x31.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box.png 1530w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-1024x199.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-300x58.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box-160x31.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/warning-lint-decorated-box.png 1530w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>&nbsp;&ndash; <strong>une documentation</strong> : cette partie ne sera pas directement visible dans notre IDE. C&rsquo;est la documentation de l&rsquo;analyser disponible sur internet qui nous permet&nbsp; de comprendre comment appliquer la r&egrave;gle ainsi que le pourquoi de son existence.<br>G&eacute;n&eacute;ralement, on y trouve des exemples de code respectant la r&egrave;gle et des exemples ne la respectant pas.<br></p>



<figure><img decoding="async" src="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-1024x919.png" alt="" srcset="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-1024x919.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-300x269.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-1536x1379.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-160x144.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141.png 1644w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-1024x919.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-300x269.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-1536x1379.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141-160x144.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104141.png 1644w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>&nbsp;&ndash; <strong>une correction automatique (facultative)</strong> : certaines r&egrave;gles ont en bonus la possibilit&eacute; d&rsquo;&ecirc;tre corrig&eacute;es automatiquement. En tant que d&eacute;veloppeur, il ne nous reste plus qu&rsquo;&agrave; faire ALT+Entr&eacute;e et Android Studio nous propose le fix.<br></p>



<figure><img decoding="async" src="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-1024x238.png" alt="" srcset="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-1024x238.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-300x70.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-1536x357.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-160x37.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348.png 1868w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-1024x238.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-300x70.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-1536x357.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348-160x37.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-104348.png 1868w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>Par la suite, quand nous essaierons de cr&eacute;er nos propres r&egrave;gles, nous essaierons de garder la m&ecirc;me structure, avec code, description, documentation et quick-fix.</p>



<h2><br><strong>Cr&eacute;er ses propres r&egrave;gles avec <a href="https://pub.dev/packages/custom_lint" rel="noopener noreferrer" target="_blank">custom_lint</a></strong></h2>



<p>Disclaimer : les d&eacute;veloppeurs du plugin ont &eacute;crit <a href="https://invertase.io/blog/announcing-dart-custom-lint" rel="noopener noreferrer" target="_blank">un article</a> (en anglais) le d&eacute;crivant et dans lequel vous pourrez retrouver la majorit&eacute; du contenu dont je vais vous parler, avec des exemples diff&eacute;rents mais qui reprennent le m&ecirc;me fonctionnement. Nous allons donc passer certains &eacute;l&eacute;ments assez rapidement.<br>Nous allons &eacute;galement prendre comme exemple des r&egrave;gles que nous avons impl&eacute;ment&eacute;es sur notre projet &ldquo;ens&rdquo; et il y aura donc un certain nombre de variables suffix&eacute;es avec &ldquo;ens&rdquo;.<br>Avant de rentrer plus en d&eacute;tails dans le &ldquo;comment&rdquo; utiliser custom_lint, quelques explications sur le &ldquo;pourquoi&rdquo; de son utilisation.</p>



<p>Le Linter de base de Flutter est d&eacute;j&agrave; un tr&egrave;s bon outil, mais ses r&egrave;gles sont &ldquo;g&eacute;n&eacute;riques&rdquo; dans le sens o&ugrave; elles peuvent th&eacute;oriquement s&rsquo;appliquer &agrave; n&rsquo;importe quel projet et elles ne couvrent pas des standards d&eacute;cid&eacute;s par l&rsquo;&eacute;quipe de d&eacute;veloppement voire par l&rsquo;&eacute;quipe produit.<br>Elles s&rsquo;appliquent &eacute;galement seulement au framework Flutter de base et donc pas sur des librairies externes que votre &eacute;quipe ait pu rajouter. L&rsquo;exemple fourni par la team de custom_lint (<a href="https://invertase.io/" rel="noopener noreferrer" target="_blank">invertase</a>) porte d&rsquo;ailleurs sur une r&egrave;gle applicable aux librairies <a href="https://pub.dev/packages/provider" rel="noopener noreferrer" target="_blank">provider</a> ou <a href="https://pub.dev/packages/riverpod" rel="noopener noreferrer" target="_blank">riverpod</a>.</p>



<p>Custom_lint, puisque c&rsquo;est le sujet de cette deuxi&egrave;me partie, est un plugin que l&rsquo;on peut rajouter &agrave; l&rsquo;analyser de base de Flutter. Pour le d&eacute;crire de mani&egrave;re rapide, il nous permet de nous relier &agrave; un package flutter dans lequel on va pouvoir &eacute;crire des classes permettant de d&eacute;clencher des warnings et/ou des erreurs quand l&rsquo;analyser va parcourir chacun de nos fichiers.</p>



<h2><br><strong><em>Installation de base</em></strong></h2>



<p></p>



<p>Comme vu plus haut, custom_lint va nous demander de tirer une d&eacute;pendance vers un autre package Dart dans notre projet. Et en dehors de l&rsquo;import de la lib en elle-m&ecirc;me, ce sera le seul import &agrave; rajouter, les deux &eacute;videment dans les <strong>dev_dependencies</strong>. On n&rsquo;a donc, comme on peut le pr&eacute;voir, pas d&rsquo;import &agrave; rajouter dans notre appplication &ldquo;en production&rdquo;.<br>Puis dans ce package Dart &agrave; cr&eacute;er, il faut ensuite d&eacute;clarer la liste des r&egrave;gles &agrave; ajouter &agrave; notre plugin. R&egrave;gles que l&rsquo;on &eacute;crira par la suite. Nous allons &eacute;galement, dans ce package, tirer les d&eacute;pendances au plugin qui nous fourniront les outils pour impl&eacute;menter les diff&eacute;rentes r&egrave;gles. Ce qui donne :<br><br>pubspec.yaml</p>



<pre><code>dev_dependencies:
  custom_lint: ^0.5.3
  ens_custom_lint_rules:
    path: ./ens_custom_lint_rules/</code></pre>



<p>ens_custom_lint_rules/pubspec.yaml</p>



<pre><code>dependencies:
  analyzer: ^5.11.0
  analyzer_plugin: ^0.11.2
  custom_lint: ^0.5.3
  custom_lint_builder: ^0.5.3
  custom_lint_core: ^0.5.3</code></pre>



<p>ens_custom_lint_rules/lib/src/ens_custom_lint_rules.dart</p>



<pre><code>library;

export 'src/ens_custom_lint_rules_base.dart';</code></pre>



<p>ens_custom_lint_rules/lib/src/ens_custom_lint_rules_base.dart</p>



<pre><code>PluginBase createPlugin() =&gt; _EnsLintPlugin();
class _EnsLintPlugin extends PluginBase {
  @override
  List</code></pre>



<p>Et voil&agrave; ! La configuration est faite, il ne reste plus qu&rsquo;&agrave; impl&eacute;menter notre premi&egrave;re r&egrave;gle, nomm&eacute;e arbitrairement <strong>_DontUseSingleChildScrollView,</strong> qui, comme son nom l&rsquo;indique, indiquera un warning au d&eacute;veloppeur s&rsquo;il essaie d&rsquo;utiliser le Widget Flutter <strong>SingleChildScrollView</strong> (Nous avons mis cette r&egrave;gle en place sur le projet pour nous forcer &agrave; utiliser un Widget custom ayant les m&ecirc;mes propri&eacute;t&eacute;s mais int&eacute;grant une scrollbar).</p>



<h2><br><strong><em>Cr&eacute;ation de la r&egrave;gle et de sa documentation</em></strong></h2>



<p><br>Comme votre IDE vous l&rsquo;indique, si vous avez &eacute;crit le code vu plus haut, il va nous falloir impl&eacute;menter une classe &eacute;tendant <strong>DartLintRule</strong>.</p>



<pre><code>class _DontUseSingleChildScrollView extends DartLintRule {
  @override
  void run(
    CustomLintResolver resolver,
    ErrorReporter reporter,
    CustomLintContext context,
  ) {
    // TODO
  }
  @override
  List</code></pre>



<p>Ici nous avons rajout&eacute; dans le constructeur de notre classe le code de notre warning ainsi que le message de description qui sera affich&eacute; au d&eacute;veloppeur s&rsquo;il passe sa souris dessus. C&rsquo;est aussi &agrave; cet endroit l&agrave; que nous pouvons choisir la s&eacute;v&eacute;rit&eacute;, mais &eacute;galement un URL permettant de rediriger vers la documentation de cette r&egrave;gle.<br>C&rsquo;est aussi, malheureusement la derni&egrave;re &eacute;tape simple de notre parcours ! Courage !</p>



<h1><br><strong><em>D&eacute;tection d&rsquo;une infraction &agrave; notre r&egrave;gle</em></strong></h1>



<p></p>



<p>Pour cette partie, nous allons regarder la m&eacute;thode run de la classe du dessus. Cette m&eacute;thode sera appel&eacute;e &agrave; chaque fois qu&rsquo;un fichier sera analys&eacute;. Elle nous met &eacute;galement &agrave; disposition trois param&egrave;tres :<br><br>&ndash; <strong>le</strong> <strong>resolver</strong> : il recueille toutes les informations dont on peut avoir besoin sur le fichier en cours. Il peut par exemple nous retourner le chemin (&ldquo;path&rdquo;) du fichier. Sur le projet nous l&rsquo;avons par exemple utilis&eacute; pour impl&eacute;menter une r&egrave;gle relevant une erreur si le nom du fichier en cours d&rsquo;analyse ne finit pas par &ldquo;_test.dart&rdquo;.</p>



<pre><code>void run(
  CustomLintResolver resolver,
  ErrorReporter reporter,
  CustomLintContext context,
) {
  var path = resolver.path;
  if (path.contains('/test/') &amp;&amp; !(path.endsWith('_test.dart'))) {
    // TODO remonter une erreur
  }
}</code></pre>



<p>&ndash; <strong>le</strong> <strong>reporter</strong> : comme son nom l&rsquo;indique, il va nous servir &agrave; remonter les erreurs. Il va nous mettre &agrave; disposition plusieurs m&eacute;thodes permettant de reporter une erreur en la liant &agrave; diff&eacute;rents &eacute;l&eacute;ments.&nbsp; Le choix de la m&eacute;thode utilis&eacute;e est relativement important dans le sens o&ugrave; il va d&eacute;finir le code soulign&eacute; par l&rsquo;erreur. Il permet &eacute;galement de pouvoir rendre dynamique le code d&rsquo;erreur si l&rsquo;on veut par exemple afficher des informations sp&eacute;cifiques &agrave; l&rsquo;erreur en cours. Ci dessous nous avons impl&eacute;ment&eacute; une erreur remontant les param&egrave;tres oubli&eacute;s dans la m&eacute;thode &ldquo;props&rdquo; d&rsquo;une classe &eacute;tendant Equatable :</p>



<pre><code>if (nomManquants.isNotEmpty) {
  reporter.reportErrorForElement(
      LintCode(
        name: 'add_all_props_in_equatable',
        problemMessage: 'Il manque les params ${nomManquants.join(', ')} dans les props',
        correctionMessage: 'Ajouter toutes les variables dans les props',
      ),
      element);
}</code></pre>



<p>&ndash; <strong>le context</strong> : le param&egrave;tre selon moi le plus complexe des trois. Il contient les informations relatives &agrave; l&rsquo;analyse en cours. Nous allons par la suite &eacute;tudier seulement un aspect de ce param&egrave;tre : le registry. Ce registry permet de pouvoir enregistrer des callback lorsque l&rsquo;analyser rencontre certains &eacute;v&eacute;nements en parcourant le fichier, comme la d&eacute;claration d&rsquo;une classe, d&rsquo;une variable ou d&rsquo;une m&eacute;thode. Nous allons regarder plus pr&eacute;cis&eacute;ment en dessous l&rsquo;exemple de la r&egrave;gle cit&eacute;e tout en haut qui signale l&rsquo;utilisation du Widget <strong>SingleChildScrollView</strong> :</p>



<pre><code>@override
void run(
  CustomLintResolver resolver,
  ErrorReporter reporter,
  CustomLintContext context,
) {
  context.registry.addConstructorName((node) {
    var className = node.staticElement?.enclosingElement.name;
    var classDisplayName = node.staticElement?.enclosingElement.displayName;
    if ((className == 'SingleChildScrollView' || classDisplayName == 'SingleChildScrollView') &amp;&amp;
        node.staticElement != null) {
      reporter.reportErrorForNode(code, node);
    }
  });
}</code></pre>



<p>&Agrave; ce moment-l&agrave;, si vous &ecirc;tes comme moi, et que vous n&rsquo;avez pas l&rsquo;habitude de parcourir les entrailles du langage Dart, tout commence &agrave; se compliquer, et on sort de l&rsquo;exp&eacute;rience de dev habituelle. R&eacute;capitulons un peu ce qui se passe dans la m&eacute;thode ci- dessus.</p>



<pre><code>context.registry.addConstructorName((node) {
    ...
});</code></pre>



<p>Ici nous allons enregistrer une callback appel&eacute;e lorsque le constructeur d&rsquo;une classe sera appel&eacute;e. En l&rsquo;occurrence, le constructeur appel&eacute; qui nous int&eacute;resse sera celui de <strong>SingleChildScrollView</strong>. On voit &eacute;galement que dans cette callback nous allons avoir acc&egrave;s &agrave; un param&egrave;tre <strong>node</strong> de type <strong>ConstructorName. </strong>Si vous vous lancez dans l&rsquo;aventure d&rsquo;&eacute;crire votre propre r&egrave;gle par la suite, je vous conseille de prendre l&rsquo;habitude de naviguer dans le code de ces diff&eacute;rents objets, dans lequel vous trouverez une description bienvenue de ce qu&rsquo;ils repr&eacute;sentent et &agrave; quoi ils ressemblent.<br>Toujours l&agrave; ? Continuons.</p>



<pre><code>context.registry.addConstructorName((node) {
  var classDisplayName = node.staticElement?.enclosingElement.displayName;
  if (classDisplayName == 'SingleChildScrollView') {
    reporter.reportErrorForNode(code, node);
  }
});</code></pre>



<p>A l&rsquo;aide de notre param&egrave;tre node, nous allons pouvoir creuser quelles sont les informations contenues dans notre appel de constructeur. En l&rsquo;occurrence, son type statique, qui est en fait la classe associ&eacute;e &agrave; ce constructeur. Puis &agrave; l&rsquo;int&eacute;rieur de ce type statique, le nom d&rsquo;affichage de ce type, qui dans le cas concernant notre r&egrave;gle serait &lsquo;SingleChildScrollView&rsquo;. Dans ce cas, comme vu pr&eacute;c&eacute;demment, il nous suffira de reporter une erreur et le tour est jou&eacute; !<br>Le code de cette r&egrave;gle n&rsquo;est pas parfait, puisqu&rsquo;il ne checke que le nom du type, et il remontera donc une erreur &eacute;galement si vous utilisez une classe appel&eacute;e <strong>SingleChildScrollView</strong>, m&ecirc;me si elle n&rsquo;est pas celle venant de material. Je vous laisse libre de d&eacute;cider si cela serait un faux positif ou un vrai warning.<br></p>



<h2><strong><em>La correction automatique (quick-fix)</em></strong></h2>



<p>Votre warning de lint &eacute;tant maintenant pr&ecirc;t &agrave; &ecirc;tre affich&eacute; au d&eacute;veloppeur, il vous reste encore la possibilit&eacute; de l&rsquo;aider dans sa correction en lui sugg&eacute;rant un quick-fix tel que vu dans la premi&egrave;re partie de cet article. Nous resterons sur l&rsquo;exemple du dessus et de notre bannissement de la <strong>SingleChildScrollView</strong> pour comprendre comment rajouter un quick-fix. Si nous revenons dans notre classe <strong>_DontUseSingleChildScrollView</strong> nous pouvons y trouver une m&eacute;thode que nous avons laiss&eacute;e de c&ocirc;t&eacute; :&nbsp; <strong>getFixes</strong>. Dans le cas ou nous n&rsquo;avons pas de quick-fix &agrave; proposer &agrave; notre d&eacute;veloppeur, nous pouvons simplement renvoyer une liste vide, ici nous allons faire cr&eacute;er une nouvelle classe et la retourner :</p>



<pre><code>@override
  List</code></pre>



<p>Nous allons d&eacute;couvrir un nouveau type de classe : <strong>DartFix</strong>. Comme avec la classe <strong>DartLintRule</strong> nous allons nous occuper de la m&eacute;thode run, qui reprend les m&ecirc;mes param&egrave;tres et en ajoute deux nouveaux :<br>&ndash; <strong>analysisError</strong> : qui contient les informations li&eacute;es &agrave; l&rsquo;erreur (ou le warning) remont&eacute;es par la r&egrave;gle &eacute;crite dans la classe pr&eacute;c&eacute;dente.<br>&ndash; <strong>others</strong> : contenant les autres erreurs du m&ecirc;me type remont&eacute;es dans le m&ecirc;me fichier.<br>Nous allons notamment nous servir ici de l&rsquo;analysisError pour trouver o&ugrave; appliquer notre correctif :&nbsp;</p>



<pre><code>@override
void run(
  CustomLintResolver resolver,
  ChangeReporter reporter,
  CustomLintContext context,
  AnalysisError analysisError,
  List&lt;AnalysisError&gt; others,
) {
  final changeBuilder = reporter.createChangeBuilder(
    message: 'Remplacer par ScrollviewWithScrollbar',
    priority: 1,
  );
  changeBuilder.addDartFileEdit((builder) {
    builder.addSimpleReplacement(
      SourceRange(analysisError.offset, analysisError.length),
      'ScrollviewWithScrollbar',
    );
    builder.importLibraryElement(Uri.parse('package:my_project/ui/widgets/scrollview_with_scrollbar.dart'));
  });
}</code></pre>



<p>Nous r&eacute;utilisons ici le reporter vu pr&eacute;c&eacute;demment, &agrave; qui on va rajouter cette fois un <strong>changeBuilder</strong> au lieu d&rsquo;une erreur, et ensuite attacher &agrave; ce change builder deux changements :</p>



<pre><code>builder.addSimpleReplacement(
      SourceRange(analysisError.offset, analysisError.length),
      'ScrollviewWithScrollbar',
    );</code></pre>



<p>On commence tout d&rsquo;abord par remplacer le constructeur de <strong>SingleChildScrollView</strong>, qui doit normalement correspondre aux positions d&eacute;limit&eacute;es par l&rsquo;<strong>analysisError</strong>, par la classe que l&rsquo;on veut utiliser soit <strong>ScrollviewWithScrollbar</strong>.</p>



<pre><code>builder.importLibraryElement(Uri.parse('package:fr_cnamts_ens/ui/widgets/scrollview_with_scrollbar.dart');</code></pre>



<p>Puis, pour pouvoir l&rsquo;utiliser, on rajoute un import vers cette librairie. &Agrave; savoir que si cet import existe d&eacute;j&agrave;, il ne sera pas fait en double. Et si il n&rsquo;existe pas, il sera ajout&eacute;, au bon endroit, tri&eacute; de mani&egrave;re alphab&eacute;tique.<br><br>Et voil&agrave; !&nbsp; On a fait le tour de tout ce qu&rsquo;il y a &agrave; &eacute;crire pour avoir nos nouveaux sets de r&egrave;gles pr&ecirc;ts &agrave; analyser notre projet !</p>



<h2>Petit outil pratique si vous voulez vous lancer dans l&rsquo;&eacute;criture de votre r&egrave;gle : le d&eacute;bugueur !</h2>



<p>En th&eacute;orie, vous avez maintenant tout ce qu&rsquo;il vous faut pour vous lancer dans l&rsquo;&eacute;criture de votre premi&egrave;re r&egrave;gle. En pratique, naviguer dans les diff&eacute;rents objets qui vous seront propos&eacute;s notamment dans les nodes qui appara&icirc;tront quand l&rsquo;analyser parcourera vos fichiers est loin d&rsquo;&ecirc;tre instinctif au d&eacute;but, et il est souvent tr&egrave;s pratique de pouvoir jeter un &oelig;il aux donn&eacute;es &agrave; votre disposition au moment de l&rsquo;analyse du fichier.<br>Heureusement, il est possible de rapidement et facilement attacher un d&eacute;bugueur &agrave; votre process de lint, d&rsquo;y poser des points d&rsquo;arr&ecirc;ts, etc&hellip; bref tout ce que vous avez d&eacute;j&agrave; l&rsquo;habitude de trouver dans votre d&eacute;bugueur flutter classique !<br>Pour &ccedil;a, il suffit de lancer la commande suivante :</p>



<font color="#FFFFFF"><pre><code>
dart run custom_lint --watch

</code></pre></font>



<p>Apr&egrave;s que votre projet ait compil&eacute;, vous verrez appara&icirc;tre des informations similaires &agrave;</p>



<font color="#FFFFFF"><pre><code>
The Dart VM service is listening on http://127.0.0.1:62818/Z0UAb7PkQ5U=/
The Dart DevTools debugger and profiler is available at: http://127.0.0.1:62818/Z0UAb7PkQ5U=/devtools?uri=ws://127.0.0.1:62818/Z0UAb7PkQ5U=/ws

</code></pre></font>



<p>Si vous cliquez sur le deuxi&egrave;me lien, vous serez redirig&eacute; sur une console, avec plusieurs onglets (que je n&rsquo;ai pas encore eu le temps de tous creuser, d&eacute;sol&eacute;), dont celui du d&eacute;bugueur. Une fois dedans, vous pouvez naviguer jusqu&rsquo;au fichier o&ugrave; vous voulez poser un breakpoint.</p>



<p></p>



<figure><img decoding="async" loading="lazy" src="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-1024x581.png" alt="" srcset="https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-1024x581.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-300x170.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-1536x872.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-2048x1163.png 2048w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-160x91.png 160w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-1024x581.png 1024w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-300x170.png 300w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-1536x872.png 1536w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-2048x1163.png 2048w,https://blog.octo.com/wp-content/uploads/2023/10/capture-decran-2023-10-03-a-111144-160x91.png 160w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer"></figure>



<p>Vous aurez &eacute;galement acc&egrave;s &agrave; une console, avec m&ecirc;me un peu d&rsquo;autocompl&eacute;tion, pour y tester toutes les op&eacute;rations que vous voulez. Personnellement c&rsquo;est comme &ccedil;a que j&rsquo;ai r&eacute;ussi &agrave; avancer, petit pas par petit pas, pour comprendre les diff&eacute;rents objets &agrave; manipuler, et enfin &agrave; r&eacute;ussir &agrave; &eacute;crire mes diff&eacute;rentes r&egrave;gles, puis &agrave; les am&eacute;liorer.</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://blog.octo.com/un-ide-flutter-sur-mesure-avec-custom_lint/" target="_blank">Un IDE Flutter sur mesure avec custom_lint</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://blog.octo.com" target="_blank">OCTO Talks !</a>.</p>]]></content>
	<updated>2023-10-03T10:09:20+00:00</updated>
	<author><name>Rémi DORMOY</name></author>
	<source>
		<id>https://blog.octo.com/</id>
		<link href="https://blog.octo.com/" rel="self"/>
		<updated>2023-10-03T10:09:20+00:00</updated>
		<title>OCTO Talks !</title></source>

	<category term="flutter"/>

	<category term="mobile"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599208</id>
	<link href="https://www.automobile-magazine.fr/insolite/article/40310-citroen-5-bides-qui-ont-marque-lhistoire-du-double-chevron" rel="alternate" type="text/html"/>
	<title type="html">Citroën : 5 bides qui ont marqué l’histoire du double chevron</title>
	<summary type="html"><![CDATA[<p>Il n&rsquo;y a pas que la trilogie 2CV, Traction et DS dans la longue histoire de la marque du quai de Jav...</p>]]></summary>
	<content type="html"><![CDATA[<p>Il n&rsquo;y a pas que la trilogie 2CV, Traction et DS dans la longue histoire de la marque du quai de Javel. Quelques couacs r&eacute;pondent aussi &agrave; l&rsquo;appel. En voici 5.</p>]]></content>
	<updated>2023-10-03T10:00:00+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://www.automobile-magazine.fr/rss.xml</id>
		<link href="https://www.automobile-magazine.fr/rss.xml" rel="self"/>
		<updated>2023-10-03T10:00:00+00:00</updated>
		<title>L'Automobile Magazine</title></source>


	<link href="https://www.automobile-magazine.fr/asset/cms/218876/config/166165/citroen-visa-decouvrable-c3-pluriel-nemo-dyane-ou-encore-e-mehari-voici-5-modeles-qui-ont-rate-leur-cible.jpg" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599209</id>
	<link href="https://news.itsfoss.com/linux-mint-21-2-edge/" rel="alternate" type="text/html"/>
	<title type="html">Linux Mint 21.2 Edge ISO Empowers Newer Hardware with Kernel 6.2!</title>
	<summary type="html"><![CDATA[<p>The folks behind Linux Mint have been on a roll, pushing out major releases such as the Linux Mint 2...</p>]]></summary>
	<content type="html"><![CDATA[<img src="https://news.itsfoss.com/content/images/2023/10/linux-mint-edge-21-2-release.png" alt="Linux Mint 21.2 Edge ISO Empowers Newer Hardware with Kernel 6.2!" referrerpolicy="no-referrer" loading="lazy"><p>The folks behind Linux Mint have been on a roll, pushing out major releases such as the <a href="https://news.itsfoss.com/linux-mint-21-2/" rel="noopener noreferrer" target="_blank">Linux Mint 21.2 release</a>, and <a href="https://news.itsfoss.com/lmde-6/" rel="noopener noreferrer" target="_blank">LMDE 6</a>.</p><p>And the flurry of releases doesn't seem to be stopping, as we now have another release from them in the form of '<strong>Linux Mint 21.2 Edge'</strong>.</p><p>Allow me to tell you more about it.</p><h2>Linux Mint 21.2 Edge: What to Expect?</h2><figure><img src="https://news.itsfoss.com/content/images/2023/10/LinuxMint_21.2_Edge.png" alt="Linux Mint 21.2 Edge ISO Empowers Newer Hardware with Kernel 6.2!" loading="lazy" srcset="https://news.itsfoss.com/content/images/size/w600/2023/10/LinuxMint_21.2_Edge.png 600w,https://news.itsfoss.com/content/images/size/w1000/2023/10/LinuxMint_21.2_Edge.png 1000w,https://news.itsfoss.com/content/images/size/w1600/2023/10/LinuxMint_21.2_Edge.png 1600w,https://news.itsfoss.com/content/images/2023/10/LinuxMint_21.2_Edge.png 1920w,https://news.itsfoss.com/content/images/size/w600/2023/10/LinuxMint_21.2_Edge.png 600w,https://news.itsfoss.com/content/images/size/w1000/2023/10/LinuxMint_21.2_Edge.png 1000w,https://news.itsfoss.com/content/images/size/w1600/2023/10/LinuxMint_21.2_Edge.png 1600w,https://news.itsfoss.com/content/images/2023/10/LinuxMint_21.2_Edge.png 1920w" sizes="(min-width: 720px) 720px" referrerpolicy="no-referrer"></figure><p>Powered by <a href="https://news.itsfoss.com/linux-kernel-6-2-release/" rel="noopener noreferrer" target="_blank">Linux kernel 6.2</a> release, Linux Mint 21.2 Edge is <strong>tailored for users who want to run newer hardware</strong> not acting nice with <a href="https://news.itsfoss.com/linux-kernel-5-15-release/" rel="noopener noreferrer" target="_blank">Linux kernel 5.15</a> LTS, which is what the regular 21.2 release of Linux Mint features.</p><p>Definitely a good Linux distro option for Intel Arc graphics users now!</p><p>If you are curious about the "<em>Edge</em>" ISO, here's what the <a href="https://linuxmint-user-guide.readthedocs.io/en/latest/edge.html?ref=news.itsfoss.com" rel="noopener noreferrer" target="_blank">documentation</a> says:</p><blockquote>In addition to its regular ISO images, Linux Mint sometimes provides an &ldquo;edge&rdquo; ISO image for its latest release. This image ships with newer components to be able to support the most modern hardware chipsets and devices.</blockquote><p>Additionally, this ISO also <strong>brings back support for secure boot</strong>. This should come in as a useful add-on for those who want it.</p><p>Not to forget, the Linux Mint 21.2 Edge release is <strong>solely being offered in the 'Cinnamon' desktop flavor</strong>, without any XFCE or MATE flavors.</p><p>Though, you won't find any differences when using the Edge variant compared to the regular one, apart from the newer hardware support.</p><p><strong>Want to give it a try?</strong></p><p>Head over to the <a href="https://www.linuxmint.com/edition.php?id=310&amp;ref=news.itsfoss.com" rel="noopener noreferrer" target="_blank">official website</a> to grab the ISO from one of the many available download mirrors.</p><div><a href="https://www.linuxmint.com/edition.php?id=310&amp;ref=news.itsfoss.com" rel="noopener noreferrer" target="_blank">Linux Mint 21.2 Edge</a></div><p>Do note that this release is <strong>only available as a 64-bit release</strong>, with no 32-bit options.</p><p><em>&#128172; Will you be trying out the edge ISO? Let us know below!</em></p>]]></content>
	<updated>2023-10-03T09:58:59+00:00</updated>
	<author><name>Sourav Rudra</name></author>
	<source>
		<id>https://news.itsfoss.com/</id>
		<link href="https://news.itsfoss.com/" rel="self"/>
		<updated>2023-10-03T09:58:59+00:00</updated>
		<title>It's FOSS News</title></source>

	<category term="distribution releases"/>


	<link href="https://news.itsfoss.com/content/images/2023/10/linux-mint-edge-21-2-release.png" length="1" rel="enclosure" type="image/generic"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599219</id>
	<link href="https://www.securityweek.com/motel-one-discloses-ransomware-attack-impacting-customer-data/" rel="alternate" type="text/html"/>
	<title type="html">Motel One Discloses Ransomware Attack Impacting Customer Data</title>
	<summary type="html"><![CDATA[<p>Motel One says customer addresses and credit card information were compromised in a recent ransomwar...</p>]]></summary>
	<content type="html"><![CDATA[<p>Motel One says customer addresses and credit card information were compromised in a recent ransomware attack.</p>
<p>The post <a rel="noopener noreferrer" href="https://www.securityweek.com/motel-one-discloses-ransomware-attack-impacting-customer-data/" target="_blank">Motel One Discloses Ransomware Attack Impacting Customer Data</a> appeared first on <a rel="noopener noreferrer" href="https://www.securityweek.com" target="_blank">SecurityWeek</a>.</p>]]></content>
	<updated>2023-10-03T09:56:30+00:00</updated>
	<author><name>Ionut Arghire</name></author>
	<source>
		<id>https://www.securityweek.com/</id>
		<link href="https://www.securityweek.com/" rel="self"/>
		<updated>2023-10-03T09:56:30+00:00</updated>
		<title>SecurityWeek</title></source>

	<category term="data breach"/>

	<category term="ransomware"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599202</id>
	<link href="https://www.itpro.com/security/new-eu-vulnerability-disclosure-rules-deemed-an-unnecessary-risk" rel="alternate" type="text/html"/>
	<title type="html">New EU vulnerability disclosure rules deemed an "unnecessary risk"</title>
	<summary type="html"><![CDATA[<p>The vulnerability disclosure rules in the Cyber Resilience Act could a...</p>]]></summary>
	<content type="html"><![CDATA[<p>The vulnerability disclosure rules in the Cyber Resilience Act could also cause a &ldquo;chilling effect&rdquo; on security researchers</p>]]></content>
	<updated>2023-10-03T09:45:00+00:00</updated>
	<author><name>ross.kelly@futurenet.com (Ross Kelly)</name></author>
	<source>
		<id>https://www.itpro.com/feeds/articletype/news</id>
		<link href="https://www.itpro.com/feeds/articletype/news" rel="self"/>
		<updated>2023-10-03T09:45:00+00:00</updated>
		<title>ITPro</title></source>

	<category term="security"/>


	<link href="https://cdn.mos.cms.futurecdn.net/nqVGsNQ7iiMUyLf5u8sgFW.jpg" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599192</id>
	<link href="https://www.clubic.com/actualite-486814-la-cnil-dit-non-aux-micros-de-surveillance.html" rel="alternate" type="text/html"/>
	<title type="html">La CNIL dit "non" aux micros de surveillance</title>
	<summary type="html"><![CDATA[<p>Install&eacute;s en octobre 2021 dans la ville d'Orl&eacute;ans, des capteurs sonores coupl&eacute;s aux cam&eacute;ras de surve...</p>]]></summary>
	<content type="html"><![CDATA[<p>Install&eacute;s en octobre 2021 dans la ville d'Orl&eacute;ans, des capteurs sonores coupl&eacute;s aux cam&eacute;ras de surveillance ne devraient plus &ecirc;tre utilis&eacute;s, faute de cadre l&eacute;gal.</p>]]></content>
	<updated>2023-10-03T09:30:00+00:00</updated>
	<author><name>/auteur/435084-maxence-glineur.html</name></author>
	<source>
		<id>http://clubic.com/</id>
		<link href="http://clubic.com/" rel="self"/>
		<updated>2023-10-03T09:30:00+00:00</updated>
		<title>Clubic.com</title></source>

	<category term="technologies et politique"/>


	<link href="https://pic.clubic.com/v1/images/2078469/raw" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599197</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2023/10/03/mongodb_cto_interview_on_applications/" rel="alternate" type="text/html"/>
	<title type="html">MongoDB promises to keep its hands off application building</title>
	<summary type="html"><![CDATA[<p>Yet history tells us it's an ever present temptation to grab greater chunks of the stack Rather t...</p>]]></summary>
	<content type="html"><![CDATA[<h4>Yet history tells us it's an ever present temptation to grab greater chunks of the stack</h4> <p>Rather than MongoDB's AI-powered SQL converter, natural language queries, or ML visualization releases, it's the document database company's strategy for vertical markets that is catching one analyst's eye.&hellip;</p>]]></content>
	<updated>2023-10-03T09:15:09+00:00</updated>
	<author><name>Lindsay Clark</name></author>
	<source>
		<id>https://www.theregister.com/</id>
		<link href="https://www.theregister.com/" rel="self"/>
		<updated>2023-10-03T09:15:09+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599172</id>
	<link href="https://linuxfr.org/news/revue-de-presse-de-l-april-pour-la-semaine-39-de-l-annee-2023" rel="alternate" type="text/html"/>
	<title type="html">Revue de presse de l’April pour la semaine 39 de l’année 2023</title>
	<summary type="html"><![CDATA[<p>Cette revue de presse sur Internet fait partie du travail de veille men&eacute; par l&rsquo;April dans le cadre d...</p>]]></summary>
	<content type="html"><![CDATA[<div><p>Cette revue de presse sur Internet fait partie du travail de veille men&eacute; par l&rsquo;April dans le cadre de son action de d&eacute;fense et de promotion du logiciel libre. Les positions expos&eacute;es dans les articles sont celles de leurs auteurs et ne rejoignent pas forc&eacute;ment celles de l&rsquo;April.</p>

<ul>
<li><a href="https://www.zdnet.fr/blogs/l-esprit-libre/libre-express-responsabilite-sociale-richard-stallman-temoignages-libristes-39961578.htm" rel="noopener noreferrer" target="_blank">[ZDNet France] Libre express: responsabilit&eacute; sociale, Richard Stallman, t&eacute;moignages libristes</a></li>
<li><a href="https://www.zdnet.fr/blogs/l-esprit-libre/souverainete-numerique-des-attaques-recurrentes-contre-les-logiciels-libres-europeens-39961570.htm" rel="noopener noreferrer" target="_blank">[ZDNet France] Souverainet&eacute; num&eacute;rique: des attaques r&eacute;currentes contre les logiciels libres europ&eacute;ens</a></li>
<li><a href="https://www.journaldunet.com/web-tech/developpeur/1524325-le-developpement-logiciel-concepts-cles-processus-et-ressources-incontournables" rel="noopener noreferrer" target="_blank">[Journal du Net] Le d&eacute;veloppement logiciel: concepts cl&eacute;s, processus et ressources incontournables</a></li>
<li><a href="https://basta.media/faire-quelque-chose-le-partager-sans-visee-commerciale-le-combat-du-logiciel-libre" rel="noopener noreferrer" target="_blank">[Basta!] &laquo;Faire quelque chose, le partager&raquo;, sans vis&eacute;e commerciale: le combat du logiciel libre n'est pas mort</a></li>
</ul>
</div><ul><li>lien n&#7506;&nbsp;1 : <a title="https://www.april.org" hreflang="fr" href="https://linuxfr.org/redirect/112771" rel="noopener noreferrer" target="_blank">April</a></li><li>lien n&#7506;&nbsp;2 : <a title="https://www.april.org/revue-de-presse" hreflang="fr" href="https://linuxfr.org/redirect/112772" rel="noopener noreferrer" target="_blank">Revue de presse de l'April</a></li><li>lien n&#7506;&nbsp;3 : <a title="https://linuxfr.org/news/revue-de-presse-de-l-april-pour-la-semaine-38-de-l-annee-2023" hreflang="fr" href="https://linuxfr.org/redirect/112773" rel="noopener noreferrer" target="_blank">Revue de presse de la semaine pr&eacute;c&eacute;dente</a></li><li>lien n&#7506;&nbsp;4 : <a title="https://filsdu.net" hreflang="fr" href="https://linuxfr.org/redirect/112774" rel="noopener noreferrer" target="_blank">&#65533; Fils du Net</a></li></ul><div><h2><a href="https://www.zdnet.fr/blogs/l-esprit-libre/libre-express-responsabilite-sociale-richard-stallman-temoignages-libristes-39961578.htm" rel="noopener noreferrer" target="_blank">[ZDNet France] Libre express: responsabilit&eacute; sociale, Richard Stallman, t&eacute;moignages libristes</a></h2>

<p>&#9997; Thierry Noisette, le samedi 30 septembre 2023.</p>

<blockquote>
<p>En bref : des exemples de bonnes pratiques RSE. Richard Stallman a un cancer. Des militants, &agrave; Framasoft et LFI, racontent leur engagement.</p>
</blockquote>

<p>Et aussi: </p>

<ul>
<li><a href="https://www.nextinpact.com/article/72538/gnu-fete-ses-40-ans" rel="noopener noreferrer" target="_blank">[Next INpact] GNU f&ecirc;te ses 40 ans</a></li>
</ul>
<h2><a href="https://www.zdnet.fr/blogs/l-esprit-libre/souverainete-numerique-des-attaques-recurrentes-contre-les-logiciels-libres-europeens-39961570.htm" rel="noopener noreferrer" target="_blank">[ZDNet France] Souverainet&eacute; num&eacute;rique: des attaques r&eacute;currentes contre les logiciels libres europ&eacute;ens</a></h2>

<p>&#9997; Thierry Noisette, le vendredi 29 septembre 2023.</p>

<blockquote>
<p>Dans la revue des &laquo;Annales des Mines&raquo;, qui consacre un num&eacute;ro &agrave; la souverainet&eacute; num&eacute;rique, Jean-Paul Smets, entrepreneur et libriste, dresse un r&eacute;quisitoire contre le syst&egrave;me fran&ccedil;ais du &laquo;cloud de confiance&raquo; et pointe d&rsquo;autres discriminations contre les solutions libres.</p>
</blockquote>
<h2><a href="https://www.journaldunet.com/web-tech/developpeur/1524325-le-developpement-logiciel-concepts-cles-processus-et-ressources-incontournables" rel="noopener noreferrer" target="_blank">[Journal du Net] Le d&eacute;veloppement logiciel: concepts cl&eacute;s, processus et ressources incontournables</a></h2>

<p>&#9997; Maxime champigneux, le jeudi 28 septembre 2023.</p>

<blockquote>
<p>D&eacute;couvrez le d&eacute;veloppement logiciel : phases cl&eacute;s, outils, conseils pour apprendre et contribuer. Une aventure d&rsquo;innovation et de croissance.</p>
</blockquote>
<h2><a href="https://basta.media/faire-quelque-chose-le-partager-sans-visee-commerciale-le-combat-du-logiciel-libre" rel="noopener noreferrer" target="_blank">[Basta!] &laquo;Faire quelque chose, le partager&raquo;, sans vis&eacute;e commerciale: le combat du logiciel libre n'est pas mort</a></h2>

<p>&#9997; Nils Hollenstein, le lundi 25 septembre 2023.</p>

<blockquote>
<p>Souvent b&eacute;n&eacute;voles, les d&eacute;veloppeuses et d&eacute;veloppeurs de logiciels libres contribuent largement au monde num&eacute;rique actuel. Deux libristes trentenaires t&eacute;moignent d&rsquo;un secteur en recomposition face au poids &eacute;crasants des g&eacute;ants du num&eacute;rique, de Google et Microsoft &agrave; Twitter et Facebook.</p>
</blockquote>
</div><div><a href="https://linuxfr.org/news/revue-de-presse-de-l-april-pour-la-semaine-39-de-l-annee-2023.epub" rel="noopener noreferrer" target="_blank">T&eacute;l&eacute;charger ce contenu au format EPUB</a></div>    <p>
      <strong>Commentaires&nbsp;:</strong>
      <a href="https://linuxfr.org/nodes/133510/comments.atom" rel="noopener noreferrer" target="_blank">voir le flux Atom</a>
      <a href="https://linuxfr.org/news/revue-de-presse-de-l-april-pour-la-semaine-39-de-l-annee-2023#comments" rel="noopener noreferrer" target="_blank">ouvrir dans le navigateur</a>
    </p>]]></content>
	<updated>2023-10-03T09:05:23+00:00</updated>
	<author><name>echarp</name></author>
	<source>
		<id>http://linuxfr.org/</id>
		<link href="http://linuxfr.org/" rel="self"/>
		<updated>2023-10-03T09:05:23+00:00</updated>
		<title>Da Linux French Page</title></source>

	<category term="internet"/>

	<category term="revue_de_presse"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599183</id>
	<link href="https://www.frenchweb.fr/coup-denvoi-du-vaste-chantier-des-etats-generaux-de-linformation/445479" rel="alternate" type="text/html"/>
	<title type="html">Coup d’envoi du vaste chantier des Etats généraux de l’information</title>
	<summary type="html"><![CDATA[<p>Fausses infos, mainmise des milliardaires, r&eacute;volutions technologiques, secret des sources: les Etats...</p>]]></summary>
	<content type="html"><![CDATA[<p>Fausses infos, mainmise des milliardaires, r&eacute;volutions technologiques, secret des sources: les Etats g&eacute;n&eacute;raux de l&rsquo;information sont lanc&eacute;s mardi matin, pour tenter de fixer des &laquo;&nbsp;r&egrave;gles du jeu&nbsp;&raquo; dans un univers m&eacute;diatique en plein bouleversement. L&rsquo;organisation de ce vaste chantier sera pr&eacute;cis&eacute;e par le comit&eacute; de pilotage ind&eacute;pendant des Etats g&eacute;n&eacute;raux, lors d&rsquo;une conf&eacute;rence de presse &hellip;</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://www.frenchweb.fr/coup-denvoi-du-vaste-chantier-des-etats-generaux-de-linformation/445479" target="_blank">Coup d&rsquo;envoi du vaste chantier des Etats g&eacute;n&eacute;raux de l&rsquo;information</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://www.frenchweb.fr" target="_blank">FRENCHWEB.FR</a>.</p>]]></content>
	<updated>2023-10-03T09:04:01+00:00</updated>
	<author><name>LA REDACTION DE FRENCHWEB.FR</name></author>
	<source>
		<id>https://www.frenchweb.fr/</id>
		<link href="https://www.frenchweb.fr/" rel="self"/>
		<updated>2023-10-03T09:04:01+00:00</updated>
		<title>FRENCHWEB.FR</title></source>

	<category term="les dernières actualités de la tech"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599181</id>
	<link href="https://gbhackers.com/zip-slip-vulnerability/" rel="alternate" type="text/html"/>
	<title type="html">Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code</title>
	<summary type="html"><![CDATA[<p>A critical&nbsp;Zip Slip vulnerability was discovered in the open-source data cleaning and transform...</p>]]></summary>
	<content type="html"><![CDATA[<p>A critical&nbsp;Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool&nbsp;&lsquo;OpenRefine&rsquo;, which allowed attackers to import malicious code and execute arbitrary code. OpenRefine is a strong Java-based, free,&nbsp;open-source tool&nbsp;for handling messy&nbsp;data. This includes cleaning it, converting it into a different format, and expanding it with web&nbsp;services and external data. According to SonarCloud, [&hellip;]</p>
<p>The post <a rel="noopener noreferrer" href="https://gbhackers.com/zip-slip-vulnerability/" target="_blank">Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code</a> appeared first on <a rel="noopener noreferrer" href="https://gbhackers.com" target="_blank">GBHackers - Latest Cyber Security News | Hacker News</a>.</p>]]></content>
	<updated>2023-10-03T09:03:14+00:00</updated>
	<author><name>Guru Baran</name></author>
	<source>
		<id>https://gbhackers.com/</id>
		<link href="https://gbhackers.com/" rel="self"/>
		<updated>2023-10-03T09:03:14+00:00</updated>
		<title>GBHackers – Latest Cyber Security News | Hacker News</title></source>

	<category term="cyber attack"/>

	<category term="cyber security news"/>

	<category term="malware"/>

	<category term="vulnerability"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599178</id>
	<link href="https://www.clubic.com/actualite-486886-un-simple-montage-photoshop-prouve-que-les-captcha-ne-servent-plus-a-rien.html" rel="alternate" type="text/html"/>
	<title type="html">Un simple montage Photoshop prouve que les CAPTCHA ne servent plus à rien</title>
	<summary type="html"><![CDATA[<p>Si vous en doutiez encore, un internaute vient de prouver tr&egrave;s simplement qu&rsquo;&agrave; l&rsquo;&egrave;re de l&rsquo;intelligen...</p>]]></summary>
	<content type="html"><![CDATA[<p>Si vous en doutiez encore, un internaute vient de prouver tr&egrave;s simplement qu&rsquo;&agrave; l&rsquo;&egrave;re de l&rsquo;intelligence artificielle et de ChatGPT, les CAPTCHA ne servent d&eacute;cid&eacute;ment plus &agrave; grand-chose.</p>]]></content>
	<updated>2023-10-03T09:00:00+00:00</updated>
	<author><name>/auteur/486607-corentin-bechade.html</name></author>
	<source>
		<id>http://clubic.com/</id>
		<link href="http://clubic.com/" rel="self"/>
		<updated>2023-10-03T09:00:00+00:00</updated>
		<title>Clubic.com</title></source>

	<category term="intelligence artificielle"/>

	<category term="microsoft"/>

	<category term="nouvelles technologies"/>


	<link href="https://pic.clubic.com/v1/images/2147554/raw" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599186</id>
	<link href="https://www.aukfood.fr/comment-superviser-nextcloud-avec-grafana/" rel="alternate" type="text/html"/>
	<title type="html">Comment superviser Nextcloud avec Grafana ?</title>
	<summary type="html"><![CDATA[<p>Chez Aukfood, nous utilisons deux outils pour superviser nos infrastructures : Centreon (pour le c&ocirc;t...</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://rss.biapy.fr/aukfood.fr/nos-prestations/infogerance/" title="Chez Aukfood, nous utilisons deux outils pour superviser nos infrastructures : Centreon (pour le c&ocirc;t&eacute; alerting), et Grafana (pour avoir tout un tas de donn&eacute;es &agrave; un instant T). Ce sont deux outils tr&egrave;s int&eacute;ressants, et avec lesquels on peut aller tr&egrave;s loin dans le processus de supervision. " rel="noopener noreferrer" target="_blank">Chez Aukfood, nous utilisons deux outils pour superviser nos infrastructures : Centreon (pour le c&ocirc;t&eacute; alerting), et Grafana (pour avoir tout un tas de donn&eacute;es &agrave; un instant T). Ce sont deux outils tr&egrave;s int&eacute;ressants, et avec lesquels on peut aller tr&egrave;s loin dans le processus de supervision. </a><br>
C'est pour cela que nous avons r&eacute;ussi &agrave; superviser une instance Nextcloud de fa&ccedil;on plus pouss&eacute;e, avec Grafana, avec un syst&egrave;me de m&eacute;triques. </p>
<h4>1. Le concept</h4>
<p>Nous avons mis en place un exporteur de m&eacute;triques, dont le projet (bien s&ucirc;r open-source) est disponible sur GitHub (<a href="https://github.com/xperimental/nextcloud-exporter" rel="noopener noreferrer" target="_blank">https://github.com/xperimental/nextcloud-exporter</a>). On va le connecter &agrave; l'API de Nextcloud, et l'exporteur va remonter des informations de fa&ccedil;on p&eacute;riodique, gr&acirc;ce &agrave; Prometheus, qui seront ensuite exploit&eacute;es par Grafana. </p>
<p><img decoding="async" src="https://www.aukfood.fr/wp-content/uploads/2023/09/image-20230929172710652.png" alt="" referrerpolicy="no-referrer" loading="lazy"></p>
<p>Les valeurs remont&eacute;es par l'exporteur sont les suivantes, et on ne peut qu'esp&eacute;rer qu'elles seront plus nombreuses au fur et &agrave; mesure des mises &agrave; jour :</p>
<table>
<thead>
<tr>
<th>name</th>
<th>description</th>
</tr>
</thead>
<tbody>
<tr>
<td>nextcloud_active_users_daily_total</td>
<td>Number of active users in the last 24 hours</td>
</tr>
<tr>
<td>nextcloud_active_users_hourly_total</td>
<td>Number of active users in the last hour</td>
</tr>
<tr>
<td>nextcloud_active_users_total</td>
<td>Number of active users for the last five minutes</td>
</tr>
<tr>
<td>nextcloud_apps_installed_total</td>
<td>Number of currently installed apps</td>
</tr>
<tr>
<td>nextcloud_apps_updates_available_total</td>
<td>Number of apps that have available updates</td>
</tr>
<tr>
<td>nextcloud_database_info</td>
<td>Contains meta information about the database as labels. Value is always 1.</td>
</tr>
<tr>
<td>nextcloud_database_size_bytes</td>
<td>Size of database in bytes as reported from engine</td>
</tr>
<tr>
<td>nextcloud_exporter_info</td>
<td>Contains meta information of the exporter. Value is always 1.</td>
</tr>
<tr>
<td>nextcloud_files_total</td>
<td>Number of files served by the instance</td>
</tr>
<tr>
<td>nextcloud_free_space_bytes</td>
<td>Free disk space in data directory in bytes</td>
</tr>
<tr>
<td>nextcloud_php_info</td>
<td>Contains meta information about PHP as labels. Value is always 1.</td>
</tr>
<tr>
<td>nextcloud_php_memory_limit_bytes</td>
<td>Configured PHP memory limit in bytes</td>
</tr>
<tr>
<td>nextcloud_php_upload_max_size_bytes</td>
<td>Configured maximum upload size in bytes</td>
</tr>
<tr>
<td>nextcloud_scrape_errors_total</td>
<td>Counts the number of scrape errors by this collector</td>
</tr>
<tr>
<td>nextcloud_shares_federated_total</td>
<td>Number of federated shares by direction <code>sent</code> / <code>received</code></td>
</tr>
<tr>
<td>nextcloud_shares_total</td>
<td>Number of shares by type: <code>authlink</code>: shared password protected links <code>group</code>: shared groups <code>link</code>: all shared links <code>user</code>: shared users <code>mail</code>: shared by mail <code>room</code>: shared with room</td>
</tr>
<tr>
<td>nextcloud_system_info</td>
<td>Contains meta information about Nextcloud as labels. Value is always 1.</td>
</tr>
<tr>
<td>nextcloud_up</td>
<td>Indicates if the metrics could be scraped by the exporter: <code>1</code>: successful <code>0</code>: unsuccessful (server down, server/endpoint not reachable, invalid credentials, ...)</td>
</tr>
<tr>
<td>nextcloud_users_total</td>
<td>Number of users of the instance</td>
</tr>
</tbody>
</table>
<h4>2. Installation de Nextcloud Exporter</h4>
<p>Supposons que vous avez d&eacute;j&agrave; une architecture Nextcloud, et Grafana (avec Prometheus install&eacute;) op&eacute;rationnelle. Nous allons installer l'exporteur en conteneur Docker. </p>
<blockquote>
<p>Vous pouvez l'installer sur n'importe quelle machine, le seul pr&eacute;requis est qu'il faut qu'elle puisse effectuer des requ&ecirc;tes sur le serveur Nextcloud, et qu'elle puisse &ecirc;tre atteinte par Prometheus.</p>
</blockquote>
<p>Cr&eacute;ons un r&eacute;pertoire <code>nextcloud-exporter</code> : </p>
<pre><code>mkdir nextcloud-exporter</code></pre>
<p>Puis utilisons le <code>docker-compose.yml</code> suivant :</p>
<pre><code>---
version: "3.3"
services:
  nextcloud-exporter:
    container_name: nextcloud-exporter
    image: "xperimental/nextcloud-exporter"
    security_opt:
      - no-new-privileges:true
    command: nextcloud-exporter -c /conf/config.yml 
    ports:
      - 127.0.0.1:9205:9205
    cap_add:
      - MKNOD
    volumes:
      - /var/nextcloud-exporter/nextcloud_exporter_conf:/conf:ro
    restart: always

volumes:
  nextcloud_exporter_conf:
    driver: local
</code></pre>
<p>Notons &eacute;galement que le conteneur sera expos&eacute; en local sur le port 9205. Nous configurerons un Vhost Apache pour qu'il soit accessible (&agrave; travers une restriction IP et un <code>.htpasswd</code>) depuis le serveur de supervision.</p>
<p>&Agrave; l'int&eacute;rieur de ce r&eacute;pertoire, cr&eacute;er <code>nextcloud_exporter_conf</code>, qui abritera le fichier de configuration <code>config.yml</code> : </p>
<pre><code># required
server: "https://URL_NEXTCLOUD"
# required for token authentication
authToken: "A_Generer"
# optional
listenAddress: ":9205"
timeout: "5s"
tlsSkipVerify: false</code></pre>
<p>Il faudra &eacute;galement g&eacute;n&eacute;rer un token pour la valeur de <code>authToken</code>. Ceci se fait depuis Nextcloud.</p>
<p>Lorsque tout est fait, lan&ccedil;ons le conteneur : </p>
<pre><code>docker-compose up -d</code></pre>
<p>Le conteneur est op&eacute;rationnel, libre &agrave; vous de faire la configuration du proxy. </p>
<h4>3. Configuration de Prometheus</h4>
<p>Pour la suite de l'article, nous allons param&eacute;trer la partie Prometheus. Le fichier de configuration est le suivant : <code>/etc/prometheus/prometheus.yml</code>.</p>
<p>Ajoutons le job suivant (attention &agrave; l'intendation qui est indispensable <img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f609.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy">) : </p>
<pre><code>- job_name: 'nextcloud-test'
  metrics_path: '/'
  scrape_interval: 5s
  scheme: https
  basic_auth:
    username: "usernameDefini"
    password: "passwordHtAccess"
  static_configs:
  - targets: 
    - 'URL_Nextcloud_Exporter'</code></pre>
<p>Puis red&eacute;marrons Prometheus :</p>
<pre><code>systemctl restart prometheus</code></pre>
<h4>4. Configuration du dashboard Grafana</h4>
<p>Maintenant, libre &agrave; vous d'ajouter les panels de votre choix, suivant les valeurs remont&eacute;es par l'exporter, et d&eacute;finis en introduction.</p>
<p>Ci-joint un exemple de dashboard :</p>
<p><img decoding="async" src="https://www.aukfood.fr/wp-content/uploads/2023/09/CleanShot-2023-10-02-at-19.02.55@2x.png" alt="" referrerpolicy="no-referrer" loading="lazy"></p>
<p><a href="https://rss.biapy.fr/aukfood.fr/nos-prestations/infogerance/" title="N'h&eacute;sitez pas &agrave; nous consulter pour toute expertise sur Nextcloud, Grafana/Prometheus, ou l'interconnexion entre les deux !" rel="noopener noreferrer" target="_blank">N'h&eacute;sitez pas &agrave; nous consulter pour toute expertise sur Nextcloud, Grafana/Prometheus, ou l'interconnexion entre les deux !</a></p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://www.aukfood.fr/comment-superviser-nextcloud-avec-grafana/" target="_blank">Comment superviser Nextcloud avec Grafana ?</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://www.aukfood.fr" target="_blank">Aukfood</a>.</p>]]></content>
	<updated>2023-10-03T07:30:54+00:00</updated>
	<author><name>Clément Bourseguin</name></author>
	<source>
		<id>https://www.aukfood.fr/</id>
		<link href="https://www.aukfood.fr/" rel="self"/>
		<updated>2023-10-03T07:30:54+00:00</updated>
		<title>Aukfood</title></source>

	<category term="docker"/>

	<category term="exporter"/>

	<category term="grafana"/>

	<category term="metrics"/>

	<category term="métriques"/>

	<category term="nextcloud"/>

	<category term="non classé"/>

	<category term="prometheus"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599146</id>
	<link href="https://korben.info/decouvrez-cli-chess-jeu-echecs-terminal-personnalisable-linux-windows-macos.html" rel="alternate" type="text/html"/>
	<title type="html">CLI-Chess – Jouez aux échecs dans votre terminal</title>
	<summary type="html"><![CDATA[<p>Voici un logiciel qui va plaire aux gens qui sont &agrave; l&rsquo;a fois amateurs d&rsquo;&eacute;checs et amour...</p>]]></summary>
	<content type="html"><![CDATA[<p><img src="https://korben.info/app/uploads/2023/06/SCR-20230611-ihau.webp" alt="" decoding="async" srcset="https://korben.info/app/uploads/2023/06/SCR-20230611-ihau.webp 1000w,https://korben.info/app/uploads/2023/06/SCR-20230611-ihau-300x83.webp 300w,https://korben.info/app/uploads/2023/06/SCR-20230611-ihau-768x214.webp 768w,https://korben.info/app/uploads/2023/06/SCR-20230611-ihau.webp 1000w,https://korben.info/app/uploads/2023/06/SCR-20230611-ihau-300x83.webp 300w,https://korben.info/app/uploads/2023/06/SCR-20230611-ihau-768x214.webp 768w" sizes="(max-width: 1000px) 100vw, 1000px" referrerpolicy="no-referrer" loading="lazy"></p>
<p>Voici un logiciel qui va plaire aux gens qui sont &agrave; l&rsquo;a fois amateurs d&rsquo;&eacute;checs et amoureux de la ligne de commande. On connait tous ces moments o&ugrave; on est coinc&eacute; au boulot, pas grand chose &agrave; faire, et on a tr&egrave;s envie de se d&eacute;tendre avec une partie d&rsquo;&eacute;checs sans quitter son terminal pour ne pas se faire griller par le coll&egrave;gue Thierry. Et bien, j&rsquo;ai trouv&eacute; exactement ce qu&rsquo;il vous faut : <strong>CLI-Chess</strong> !</p>



<div><div></div>
<div></div></div><p>CLI-Chess c&rsquo;est tellement une exp&eacute;rience que vous allez vous prendre pour Anya Taylor-Joy au bout de 5 min. Vous pouvez jouer en ligne avec votre compte <strong>Lichess.org</strong> ou hors ligne contre l&rsquo;IA baptis&eacute;e <strong>Fairy-Stockfish</strong>. </p>


<div>
<figure><img decoding="async" fetchpriority="high" src="https://korben.info/app/uploads/2023/06/229156062-309d5ae9-bcc2-43bc-ab4c-714e2a9c9c83.gif" alt="" referrerpolicy="no-referrer" loading="lazy"></figure></div>


<p>Et pour l&rsquo;installer, il vous suffit d&rsquo;ex&eacute;cuter la commande suivante : </p>



<p><code>pip install cli-chess</code></p>



<p>Ce qui est g&eacute;nial avec CLI-Chess, c&rsquo;est que vous pouvez personnaliser l&rsquo;apparence de votre &eacute;chiquier et de vos pi&egrave;ces en choisissant parmi les th&egrave;mes disponibles. De plus, CLI-Chess est compatible avec <strong>Linux</strong>, <strong>Windows</strong> et <strong>macOS</strong>, ce qui fait que vous pouvez profiter de cette exp&eacute;rience d&rsquo;&eacute;checs, peu importe votre ordinateur.</p>



<div><div></div>
<div></div></div><p>Si vous &ecirc;tes d&eacute;butant aux &eacute;checs, ne vous inqui&eacute;tez pas, CLI-Chess est tr&egrave;s accessible et facile &agrave; prendre en main.</p>



<p>Pour lancer une partie en ligne avec votre compte Lichess.org, utilisez la commande :</p>



<p><code>cli-chess lichess PSEUDO MOTDEPASSE</code></p>



<p>Pour jouer hors ligne contre l&rsquo;IA Fairy-Stockfish, utilisez simplement la commande :</p>



<p><code>cli-chess</code></p>



<p>En plus de personnaliser l&rsquo;apparence de votre &eacute;chiquier, vous pouvez &eacute;galement configurer les param&egrave;tres de l&rsquo;IA, tels que la difficult&eacute; et le temps de r&eacute;flexion. Cela vous permettra de l&rsquo;adapter &agrave; votre niveau et de vous am&eacute;liorer progressivement. CLI-Chess permet &eacute;galement de vous faire des replays de partie via Lichess TV ou encore de jouer &agrave; l&rsquo;aveugle pour les plus &eacute;nerv&eacute;s d&rsquo;entre vous.</p>


<div>
<figure><img decoding="async" src="https://korben.info/app/uploads/2023/06/Mad-The-Odd-Couple-l3q2XnJo1OVj2pgmQ.gif" alt="" referrerpolicy="no-referrer" loading="lazy"></figure></div>


<div><div></div>
<div></div></div><p>CLI-Chess c&rsquo;est donc un excellent moyen de pratiquer votre jeu dans un environnement qui vous rassure &#65533; ou en tout discr&eacute;tion.</p>



<p>Si &ccedil;a vous branche, c&rsquo;est &agrave; <strong><a href="https://github.com/trevorbayless/cli-chess" target="_blank" rel="noopener noreferrer">d&eacute;couvrir ici</a></strong></p>]]></content>
	<updated>2023-10-03T07:00:00+00:00</updated>
	<author><name>Korben</name></author>
	<source>
		<id>http://korben.info</id>
		<link href="http://korben.info" rel="self"/>
		<updated>2023-10-03T07:00:00+00:00</updated>
		<title>Korben</title></source>

	<category term="cli-chess"/>

	<category term="fairy-stockfish"/>

	<category term="jeu vidéo"/>

	<category term="lichess.org"/>

	<category term="terminal échiquier"/>

	<category term="échecs en ligne"/>


	<link href="https://korben.info/app/uploads/2023/06/SCR-20230611-ihau-150x150.webp" length="1" rel="enclosure" type=""/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599118</id>
	<link href="https://www.redacteur.com/blog/desavouer-lien-google/" rel="alternate" type="text/html"/>
	<title type="html">Comment désavouer des liens auprès de Google ?</title>
	<summary type="html"><![CDATA[<p>Les backlinks sont des liens pointant vers votre site web depuis d&rsquo;autres sites. Ils jouent un r&ocirc;le...</p>]]></summary>
	<content type="html"><![CDATA[<p>Les backlinks sont des liens pointant vers votre site web depuis d&rsquo;autres sites. Ils jouent un r&ocirc;le crucial dans le classement de votre site sur les moteurs de recherche. Cependant, g&eacute;rer ces backlinks peut parfois &ecirc;tre complexe et incertain.</p>



<p>Pour optimiser vos efforts de r&eacute;f&eacute;rencement, il est judicieux de faire appel &agrave; un r&eacute;dacteur professionnel. Vous pouvez trouver des <a href="https://www.redacteur.com/redacteur-seo" rel="noopener noreferrer" target="_blank">r&eacute;dacteurs web SEO</a> comp&eacute;tents sur la plateforme Redacteur.com, qui propose des services de r&eacute;daction d&rsquo;articles et de contenus de qualit&eacute;.</p>



<p>Dans cet article, nous explorerons pourquoi et quand d&eacute;savouer des liens et les m&eacute;thodes pour identifier des backlinks toxiques. Nous d&eacute;couvrirons &eacute;galement comment d&eacute;savouer ces liens via la Google Search Console et discuterons des risques potentiels li&eacute;s &agrave; cette pratique.</p>



<h2><strong>Qu&rsquo;est-ce que le d&eacute;saveu de liens ?</strong></h2>



<p>Le d&eacute;saveu de liens est une proc&eacute;dure qui consiste &agrave; demander &agrave; Google d&rsquo;ignorer certains liens entrants pointant vers votre site web. Si cette d&eacute;marche est utilis&eacute;e, c&rsquo;est principalement pour se d&eacute;barrasser des backlinks toxiques ou ind&eacute;sirables qui pourraient nuire &agrave; votre strat&eacute;gie de r&eacute;f&eacute;rencement et impacter n&eacute;gativement le classement de votre site dans les r&eacute;sultats de recherche.</p>



<p>Le d&eacute;saveu de liens devient donc n&eacute;cessaire lorsque vous identifiez des liens toxiques susceptibles de nuire &agrave; votre site. Cela peut se produire dans diff&eacute;rentes situations :</p>



<h3><strong>R&eacute;ception d&rsquo;une p&eacute;nalit&eacute; Google</strong></h3>



<p>Si vous recevez un avertissement de Google dans votre Google Search Console concernant des &ldquo;liens non naturels&rdquo;, cela signifie que vous &ecirc;tes p&eacute;nalis&eacute; pour des pratiques de liens manipulatrices. Dans ce cas, il est imp&eacute;ratif de d&eacute;savouer les liens toxiques pour corriger ces pratiques et restaurer votre positionnement.</p>



<h3><strong>Attaque de Negative SEO</strong></h3>



<p>Il est possible que des concurrents peu scrupuleux essaient de vous nuire en cr&eacute;ant d&eacute;lib&eacute;r&eacute;ment des backlinks de mauvaise qualit&eacute; pointant vers votre site. </p>



<p>Si vous remarquez une soudaine augmentation de backlinks suspects et que votre trafic et vos classements chutent, vous pourriez &ecirc;tre victime d&rsquo;une attaque de Negative SEO. D&eacute;savouer les liens ind&eacute;sirables est alors une mesure &agrave; prendre pour contrer cette strat&eacute;gie malveillante.</p>



<h3><strong>Nettoyage de votre profil de backlinks</strong></h3>



<figure><img decoding="async" src="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1.png" alt="" srcset="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1.png 1024w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-300x181.png 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-768x464.png 768w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-60x36.png 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-370x223.png 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-270x163.png 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-570x344.png 570w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-740x447.png 740w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1.png 1024w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-300x181.png 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-768x464.png 768w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-60x36.png 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-370x223.png 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-270x163.png 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-570x344.png 570w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-1-740x447.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>M&ecirc;me si votre site n&rsquo;est pas p&eacute;nalis&eacute;, il est essentiel de maintenir un profil de backlinks propre et de qualit&eacute; pour am&eacute;liorer votre r&eacute;f&eacute;rencement sur le long terme. </p>



<p>Le d&eacute;saveu de liens vous permet de prendre le contr&ocirc;le sur les liens pointant vers votre site et de supprimer ceux qui pourraient potentiellement nuire &agrave; votre r&eacute;putation aupr&egrave;s des moteurs de recherche.</p>



<h3><strong>Identification de liens artificiels</strong></h3>



<p>Lors de l&rsquo;analyse de votre profil de backlinks &agrave; l&rsquo;aide d&rsquo;outils SEO tels que SEMrush ou Majestic, vous pouvez rep&eacute;rer des liens artificiels ou suspects qui ne respectent pas les directives de qualit&eacute; de Google. Dans ce cas, d&eacute;savouer ces liens est une action pr&eacute;ventive pour maintenir la sant&eacute; de votre site en mati&egrave;re de r&eacute;f&eacute;rencement.</p>



<p>Il faut souligner que le d&eacute;saveu de liens est une mesure s&eacute;rieuse et qu&rsquo;il ne doit &ecirc;tre entreprise qu&rsquo;apr&egrave;s &eacute;valuation minutieuse des liens &agrave; d&eacute;savouer. Google consid&egrave;re le d&eacute;saveu comme une option de dernier recours, et il est important de ne d&eacute;savouer que les liens qui nuisent &agrave; votre classement de mani&egrave;re certaine.</p>



<h2>Pourquoi d&eacute;savouer des liens aupr&egrave;s de Google ?&nbsp;</h2>



<p>Lorsque votre site web est associ&eacute; &agrave; des backlinks qui proviennent de sources de mauvaise qualit&eacute;, comme des sites de spam, des r&eacute;seaux de liens artificiels ou des domaines p&eacute;nalis&eacute;s, cela peut entra&icirc;ner des cons&eacute;quences n&eacute;gatives sur votre propre r&eacute;f&eacute;rencement. </p>



<p>Google fait tr&egrave;s attention &agrave; la qualit&eacute; des liens pointant vers votre site. Dans certains cas, il peut interpr&eacute;ter ces liens de mauvaise qualit&eacute; comme une tentative de manipulation de son algorithme.</p>



<p>&nbsp;D&eacute;savouer des liens aupr&egrave;s de Google&nbsp; est donc une action cruciale pour pr&eacute;server la r&eacute;putation de votre site web et maintenir un bon classement dans les r&eacute;sultats de recherche. Cette d&eacute;marche vise &agrave; signaler &agrave; Google les liens ind&eacute;sirables, toxiques ou de mauvaise qualit&eacute; pointant vers votre site afin qu&rsquo;ils ne soient pas pris en compte dans l&rsquo;&eacute;valuation de votre r&eacute;f&eacute;rencement.</p>



<p>En d&eacute;savouant des liens ind&eacute;sirables, vous nettoyez votre profil de backlinks en &eacute;liminant les liens de mauvaise qualit&eacute; ou consid&eacute;r&eacute;s comme manipulatifs par Google. Ainsi, vous am&eacute;liorez la r&eacute;putation de votre site et &eacute;vitez les &eacute;ventuelles p&eacute;nalit&eacute;s que pourrait provoquer la pr&eacute;sence de liens suspects.</p>



<p>Si votre site a &eacute;t&eacute; p&eacute;nalis&eacute; par Google en raison de pratiques de liens non conformes aux directives, le d&eacute;saveu de liens peut &ecirc;tre une &eacute;tape cruciale pour rectifier la situation. En supprimant les liens probl&eacute;matiques, vous montrez &agrave; Google que vous prenez des mesures pour corriger vos erreurs et respecter les r&egrave;gles &eacute;tablies.</p>



<h2>Comment identifier les backlinks toxiques ?&nbsp;</h2>



<p>L&rsquo;identification de backlinks toxiques est une &eacute;tape cruciale pour maintenir la sant&eacute; de votre profil de liens. Deux m&eacute;thodes populaires peuvent d&rsquo;ailleurs vous aider &agrave; rep&eacute;rer les liens ind&eacute;sirables : l&rsquo;utilisation de Semrush et l&rsquo;&eacute;valuation du Trust Flow de Majestic.</p>



<h3><strong>Trouver les liens toxiques avec <a href="https://fr.semrush.com/?source=redacteur-com-blog&amp;utm_source=redacteur-com-blog" target="_blank" rel="noopener noreferrer">Semrush</a></strong></h3>



<figure><img decoding="async" src="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush.webp" alt="" srcset="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-300x162.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-60x32.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-370x200.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-270x146.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-570x309.webp 570w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-300x162.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-60x32.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-370x200.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-270x146.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/semrush-570x309.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>Semrush est un outil SEO polyvalent qui peut vous aider &agrave; d&eacute;tecter les backlinks potentiellement toxiques pointant vers votre site. Voici comment proc&eacute;der :</p>



<h4><strong>1. Analysez votre profil de backlinks</strong></h4>



<p>Commencez par utiliser Semrush pour obtenir une liste compl&egrave;te de tous les liens pointant vers votre site.</p>



<h4><strong>2. Examinez les m&eacute;triques de qualit&eacute;&nbsp;</strong></h4>



<p>Semrush attribue des m&eacute;triques telles que l&rsquo;Autorit&eacute; des domaines et le Score de toxicit&eacute; aux liens. Concentrez-vous sur les liens avec un score de toxicit&eacute; &eacute;lev&eacute;, car ce sont ceux qui pourraient nuire &agrave; votre r&eacute;f&eacute;rencement.</p>



<h4><strong>3. V&eacute;rifiez la pertinence des sites r&eacute;f&eacute;rents</strong></h4>



<p>Assurez-vous que les sites qui vous font des liens sont pertinents par rapport &agrave; votre th&eacute;matique. Les liens en provenance de sites non pertinents peuvent &ecirc;tre consid&eacute;r&eacute;s comme toxiques par les moteurs de recherche.</p>



<h4><strong>4. Identifiez les liens artificiels</strong></h4>



<p>Recherchez les sch&eacute;mas de liens artificiels, tels que les liens provenant de r&eacute;seaux de sites ou de pages cr&eacute;&eacute;es uniquement dans le but de g&eacute;n&eacute;rer des liens.&nbsp;</p>



<h3><strong>Mesurer la pertinence des liens avec le Trust Flow de <a href="https://fr.majestic.com/?source=redacteur-com-blog&amp;utm_source=redacteur-com-blog" target="_blank" rel="noopener noreferrer">Majestic</a></strong></h3>



<figure><img decoding="async" src="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic.webp" alt="" srcset="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-300x175.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-60x35.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-370x216.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-270x158.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-570x333.webp 570w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-300x175.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-60x35.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-370x216.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-270x158.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/majestic-570x333.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>Sur Majestic, vous retrouverez une m&eacute;trique appel&eacute;e Trust Flow, qui &eacute;value la qualit&eacute; et la pertinence des liens. En suivant certaines &eacute;tapes, vous pouvez l&rsquo;utiliser pour identifier les backlinks toxiques.</p>



<h4><strong>1. V&eacute;rifiez le Trust Flow</strong></h4>



<p>Apr&egrave;s avoir obtenu le rapport complet de votre profil de backlinks sur Majestic, int&eacute;ressez-vous &agrave; votre Trust Flow. Plus le Trust Flow d&rsquo;un site r&eacute;f&eacute;rent est &eacute;lev&eacute;, plus il est fiable. Concentrez-vous sur les liens provenant de sites avec un Trust Flow &eacute;lev&eacute; pour assurer la qualit&eacute; de vos backlinks.</p>



<h4><strong>2. &Eacute;valuez la diversit&eacute; des liens</strong></h4>



<p>Des liens provenant d&rsquo;un large &eacute;ventail de sites pertinents sont g&eacute;n&eacute;ralement b&eacute;n&eacute;fiques. Les liens provenant d&rsquo;un petit nombre de sites peuvent &ecirc;tre consid&eacute;r&eacute;s comme suspects.</p>



<h2>Comment d&eacute;savouer les liens avec la <a href="https://search.google.com/search-console/about?hl=fr/?source=redacteur-com-blog&amp;utm_source=redacteur-com-blog" target="_blank" rel="noopener noreferrer">Google Search Console</a> ?&nbsp;</h2>



<p>La Google Search Console est un ensemble d&rsquo;outils tr&egrave;s pratiques offert par Google aux propri&eacute;taires de sites web. Il leur permet de comprendre comment leur site est index&eacute; par le moteur de recherche et de r&eacute;soudre d&rsquo;&eacute;ventuels probl&egrave;mes d&rsquo;indexation.</p>



<p>Pour <strong>d&eacute;savouer des liens ind&eacute;sirables</strong>, voici comment proc&eacute;der :&nbsp;</p>



<h3><strong>1. Acc&eacute;dez &agrave; la Google Search Console</strong></h3>



<figure><img decoding="async" src="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console.webp" alt="" srcset="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-300x175.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-60x35.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-370x216.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-270x158.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-570x333.webp 570w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console.webp 700w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-300x175.webp 300w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-60x35.webp 60w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-370x216.webp 370w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-270x158.webp 270w,https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/search-console-570x333.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<p>Connectez-vous &agrave; votre compte Google Search Console et s&eacute;lectionnez le site web pour lequel vous souhaitez <strong>d&eacute;savouer des liens</strong>.</p>



<h3><strong>2. Identifiez les liens &agrave; d&eacute;savouer</strong></h3>



<p>En vous servant d&rsquo;outils tels que Semrush ou Majestic, rep&eacute;rez les liens potentiellement toxiques pointant vers votre site. Notez les URL de ces liens.</p>



<h3><strong>3. Cr&eacute;ez un fichier de d&eacute;saveu</strong></h3>



<p>Cr&eacute;ez un fichier texte contenant les URL des liens que vous voulez d&eacute;savouer. Chaque URL doit &ecirc;tre sur une ligne distincte.</p>



<h3><strong>4. Soumettez le fichier de d&eacute;saveu</strong></h3>



<p>Acc&eacute;dez &agrave; l&rsquo;outil de d&eacute;saveu de liens dans la Google Search Console, s&eacute;lectionnez votre site web et soumettez le fichier de d&eacute;saveu que vous avez cr&eacute;&eacute;.</p>



<h3><strong>5. Surveillez les r&eacute;sultats</strong></h3>



<p>Google va ensuite examiner le fichier et prendra en compte vos demandes de d&eacute;saveu. </p>



<p>Vous devez n&eacute;anmoins savoir que le d&eacute;saveu n&rsquo;est pas une garantie absolue que les liens seront supprim&eacute;s des classements, mais c&rsquo;est une &eacute;tape importante pour indiquer &agrave; Google ceux que vous souhaitez ignorer.</p>



<h2>Quels sont les risques lorsqu&rsquo;on d&eacute;savoue des liens ?&nbsp;</h2>



<p><strong>D&eacute;savouer des liens</strong> peut &ecirc;tre une &eacute;tape n&eacute;cessaire &agrave; l&rsquo;am&eacute;lioration du r&eacute;f&eacute;rencement de votre site web, cependant, cela comporte &eacute;galement certains risques. Dans un premier temps, lorsque vous d&eacute;savouez des liens, certains d&rsquo;entre eux pourraient &ecirc;tre des liens de qualit&eacute; qui contribuent r&eacute;ellement &agrave; votre trafic et &agrave; votre classement dans les moteurs de recherche. En les d&eacute;savouant, vous pourriez perdre cette source de trafic. Votre positionnement dans les r&eacute;sultats de recherche pourrait en &ecirc;tre affect&eacute;.</p>



<p>De plus, les effets &agrave; long terme du d&eacute;savouement restent inconnus. Google ne divulgue pas pleinement le fonctionnement de son algorithme de classement. Il est donc difficile de pr&eacute;voir les cons&eacute;quences &agrave; long terme du d&eacute;saveu de certains liens.&nbsp;</p>



<p>Une fois que vous avez soumis un fichier de d&eacute;saveu &agrave; Google, il peut aussi &ecirc;tre difficile de revenir en arri&egrave;re et de r&eacute;tablir les liens d&eacute;savou&eacute;s. De plus, si votre fichier de d&eacute;saveu est mal format&eacute; ou ne contient pas les informations n&eacute;cessaires, Google pourrait mal interpr&eacute;ter vos intentions, ce qui peut entra&icirc;ner des probl&egrave;mes suppl&eacute;mentaires.</p>



<h2><strong>Notre astuce pour d&eacute;savouer des liens toxiques</strong></h2>



<p>Le d&eacute;saveu de liens est une pratique essentielle pour maintenir un profil de backlinks sain et am&eacute;liorer votre visibilit&eacute; en ligne. Cependant, il est crucial de ne pas se pr&eacute;cipiter dans cette d&eacute;marche et de bien &eacute;valuer les liens &agrave; d&eacute;savouer pour ne pas <strong>d&eacute;savouer des liens</strong> qui seraient utiles au SEO.</p>



<p>Si vous avez le moindre doute, n&rsquo;h&eacute;sitez pas &agrave; faire appel &agrave; un r&eacute;dacteur professionnel sur la <a href="https://www.redacteur.com/" rel="noopener noreferrer" target="_blank">plateforme de r&eacute;daction</a> de Redacteur.com. Nos r&eacute;dacteurs vous garantissent des contenus de qualit&eacute; qui renforceront votre strat&eacute;gie SEO et am&eacute;lioreront la visibilit&eacute; de votre site sur les moteurs de recherche.</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://www.redacteur.com/blog/desavouer-lien-google/" target="_blank">Comment d&eacute;savouer des liens aupr&egrave;s de Google&nbsp;?</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://www.redacteur.com/blog" target="_blank">Redacteur.com</a>.</p>]]></content>
	<updated>2023-10-03T06:30:00+00:00</updated>
	<author><name>Laura</name></author>
	<source>
		<id>https://www.redacteur.com/blog</id>
		<link href="https://www.redacteur.com/blog" rel="self"/>
		<updated>2023-10-03T06:30:00+00:00</updated>
		<title>Content&amp;Marketing</title></source>

	<category term="google"/>


	<link href="https://www.redacteur.com/blog/wp-content/uploads/sites/6/2023/08/desavouer-lien-google-150x150.png" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599253</id>
	<link href="https://hackernoon.com/learn-deep-learning-in-an-hour-day-season-or-decade?source=rss" rel="alternate" type="text/html"/>
	<title type="html">Learn Deep Learning in an Hour, Day, Season, or Decade</title>
	<summary type="html"><![CDATA[<p>Whether we like it or not, deep learning is eating the world. Several weeks ago, I decided to learn ...</p>]]></summary>
	<content type="html"><![CDATA[<p>Whether we like it or not, <a href="https://en.wikipedia.org/wiki/Deep_learning#Definition" rel="noopener noreferrer" target="_blank">deep learning</a> is eating the world. Several weeks ago, I decided to learn how it works. It&rsquo;s the Wild West out here. Everyone recommends different resources and makes different assumptions about how much time you have.</p>
<p>\
I looked at a bunch and removed some guesswork on both fronts: These resources are simply the best, better than all the rest, and maybe more importantly, they give you reliable options whether you want your journey to be 60 minutes or 6 years.</p>
<p>\
I&rsquo;ve included some details on prerequisites at the end. Regardless of background, everyone should check out the first link. 3Blue1Brown is a legend.</p>
<h2>1. Hour</h2>
<ul>
<li><a href="https://www.youtube.com/playlist?list=PLZHQObOWTQDNU6R1_67000Dx_ZCJB-3pi" rel="noopener noreferrer" target="_blank">Neural networks playlist</a>, 3Blue1Brown</li>
</ul>
<p>\</p>
<ul>
<li><a href="https://pytorch.org/tutorials/beginner/deep_learning_60min_blitz.html" rel="noopener noreferrer" target="_blank">Deep Learning with PyTorch: A 60 Minute Blitz</a>, Soumith Chintala (PyTorch documentation)</li>
</ul>
<h2>2. Day</h2>
<ul>
<li><a href="https://pytorch.org/tutorials/beginner/deep_learning_60min_blitz.html" rel="noopener noreferrer" target="_blank">Learn PyTorch for deep learning in a day</a>, Daniel Bourke</li>
</ul>
<p>\</p>
<ul>
<li><a href="https://www.lesswrong.com/posts/uFGDrhzjGdELLajrK/i-tried-to-learn-as-much-deep-learning-math-as-i-could-in-24" rel="noopener noreferrer" target="_blank">I tried to learn as much deep learning math as I could in 24 hours</a>, Phosphorus (Less Wrong blog)</li>
</ul>
<h2>3. Season</h2>
<ul>
<li><p>Books</p></li>
<li><p><a href="https://www.deeplearningbook.org/" rel="noopener noreferrer" target="_blank">Deep Learning</a>, Ian Goodfellow, Yoshua Bengio, and Aaron Courville</p></li>
<li><p><a href="https://www.manning.com/books/deep-learning-with-python-second-edition" rel="noopener noreferrer" target="_blank">Deep Learning with Python</a>, Fran&ccedil;ois Chollet</p></li>
<li><p><a href="http://neuralnetworksanddeeplearning.com/index.html" rel="noopener noreferrer" target="_blank">Neural Networks and Deep Learning</a>, Michael Nielsen</p></li>
<li><p><a href="https://github.com/rasbt/machine-learning-book#machine-learning-with-pytorch-and-scikit-learn-book" rel="noopener noreferrer" target="_blank">Machine Learning with PyTorch and Scikit-Learn</a>, Sebastian Raschka</p>
<p>\</p></li>
<li><p>Courses</p></li>
<li><p><a href="https://course.fast.ai/" rel="noopener noreferrer" target="_blank">course.fast.ai</a>, Jeremy Howard</p></li>
<li><p><a href="https://www.deeplearning.ai/" rel="noopener noreferrer" target="_blank">deeplearning.ai</a>, Andrew Ng &amp; others</p></li>
<li><p><a href="https://www.elementsofai.com/" rel="noopener noreferrer" target="_blank">Elements of AI</a>, University of Helsinki</p></li>
<li><p><a href="https://d2l.ai/index.html" rel="noopener noreferrer" target="_blank">Dive Into Deep Learning</a>, Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola</p></li>
<li><p><a href="https://karpathy.ai/zero-to-hero.html" rel="noopener noreferrer" target="_blank">Neural Networks: Zero to Hero</a>, Andrej Karpathy</p></li>
<li><p><a href="https://github.com/llSourcell/LearnML#learn-machine-learning-in-3-months-pytorch--curriculum" rel="noopener noreferrer" target="_blank">Learn Machine Learning in 3 Months</a>, Siraj Raval</p></li>
</ul>
<h2>4. Decade</h2>
<ul>
<li>Go to grad school</li>
</ul>
<p>\</p>
<ul>
<li><p>Roadmaps</p></li>
<li><p><a href="https://github.com/mrdbourke/machine-learning-roadmap" rel="noopener noreferrer" target="_blank">Machine Learning Roadmap</a>, Daniel Bourke</p></li>
<li><p><a href="https://medium.com/@letthedataconfess/complete-roadmap-to-be-a-deep-learning-engineer-e9a4be0a5517" rel="noopener noreferrer" target="_blank">Complete Roadmap to be a Deep Learning Engineer</a>, Let the Data Confess</p>
<p>\</p></li>
<li><p>Resource lists</p></li>
<li><p><a href="https://github.com/ChristosChristofidis/awesome-deep-learning" rel="noopener noreferrer" target="_blank">Awesome Deep Learning</a>, ChristosChristofidis</p></li>
<li><p><a href="https://github.com/SkalskiP/courses#cr%C3%A8me-de-la-cr%C3%A8me-of-ai-courses" rel="noopener noreferrer" target="_blank">Cr&egrave;me de la cr&egrave;me of AI courses</a>, SkalskiP</p></li>
<li><p><a href="https://github.com/brylevkirill/notes/blob/master/Deep%20Learning.md" rel="noopener noreferrer" target="_blank">Deep Learning.md</a>, brylevkirill</p>
<p>\</p></li>
<li><p>Miscellaneous</p></li>
<li><p><a href="https://paperswithcode.com/" rel="noopener noreferrer" target="_blank">Papers With Code</a>, Meta AI Research</p></li>
<li><p><a href="https://www.youtube.com/user/keeroyz" rel="noopener noreferrer" target="_blank">Two Minute Papers</a> (Youtube Channel), K&aacute;roly Zsolnai-Feh&eacute;r</p></li>
<li><p><a href="https://www.youtube.com/channel/UCfzlCWGWYyIQ0aLC5w48gBQ" rel="noopener noreferrer" target="_blank">Sentdex</a> (Youtube Channel), Harrison Kinsley</p></li>
</ul>
<hr>
<h2>A Note on Prerequisites</h2>
<p>It&rsquo;s a free country. Learn what you want along the way. All the resources above are fairly clear about what&rsquo;s needed.</p>
<p>\
That said, if you want to embark on a serious course of study, here are a few central building blocks they all share that you&rsquo;ll need to be comfortable with.</p>
<p>\</p>
<ul>
<li>Manipulating <a href="https://www.3blue1brown.com/topics/linear-algebra" rel="noopener noreferrer" target="_blank">vectors and matrices</a></li>
<li>Finding <a href="https://www.khanacademy.org/math/calculus-1" rel="noopener noreferrer" target="_blank">derivatives</a></li>
<li><a href="https://www.youtube.com/watch?v=IHZwWFHWa-w" rel="noopener noreferrer" target="_blank">Gradient descent</a></li>
<li>Basic <a href="https://pyflo.net/" rel="noopener noreferrer" target="_blank">Python programming</a></li>
</ul>
<p>\
It&rsquo;ll also help to know:</p>
<ul>
<li>How to <a href="https://www.coursera.org/learn/learning-how-to-learn" rel="noopener noreferrer" target="_blank">learn</a></li>
</ul>
<p>\</p>
<ul>
<li>How to <a href="https://learnprompting.org/" rel="noopener noreferrer" target="_blank">prompt tools like ChatGPT effectively</a>, for broad explanations.</li>
</ul>
<p>\</p>
<ul>
<li>How <a href="https://www.inference.vc/deep-learning-is-easy/" rel="noopener noreferrer" target="_blank">other kinds of advanced machine learning</a> besides deep learning work, if you want to become a domain expert one day.</li>
</ul>
<p>\
Happy learning &#65533;</p>]]></content>
	<updated>2023-10-03T01:39:25+00:00</updated>
	<author><name>Tyler Berbert</name></author>
	<source>
		<id>https://hackernoon.com</id>
		<link href="https://hackernoon.com" rel="self"/>
		<updated>2023-10-03T01:39:25+00:00</updated>
		<title>Hacker Noon</title></source>

	<category term="ai"/>

	<category term="deep-learning"/>

	<category term="deep-learning-resources"/>

	<category term="education"/>

	<category term="learning"/>

	<category term="machine-learning"/>

	<category term="training"/>

	<category term="what-is-deep-learning"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599150</id>
	<link href="https://interestingengineering.com/science/plastic-rain-clouds-microplastics-cloud-water" rel="alternate" type="text/html"/>
	<title type="html">Plastic rain: Scientists find microplastics in cloud water</title>
	<summary type="html"><![CDATA[<p>...</p>]]></summary>
	<content type="html"><![CDATA[<figure>
                            <img src="https://images.interestingengineering.com/1200x800/2023/10/02/image/jpeg/SyIyrNew2ZFgUtr0V8d7h2Eziqj81XHQBlVOQLmC.jpg" referrerpolicy="no-referrer" loading="lazy">
                        </figure>
                                                <p>Microplastic pollution has become a global concern due to its presence in various ecosystems. These particles (&lt; 5mm in size) are generated from the degradation of plastic items and can be found in oceans, rivers, soil, and even in the <a href="https://interestingengineering.com/science/blue-whales-10-million-microplastics" title="bodies of animals" rel="noopener noreferrer" target="_blank">bodies of animals</a> and humans.&nbsp;</p><p>Despite extensive research on microplastics in terrestrial and aquatic environments, their presence in high-altitude clouds and their potential influence on cloud formation and climate change remained poorly understood.</p><p>Now, researchers from Japan led by Yize Wang and Hiroshi Okochi from Waseda University have found microplastics in cloud water samples collected from high-altitude mountain regions in Japan.</p><p>Their study identified the presence of microplastics in the cloud water, confirming that microplastics are indeed present in clouds at these altitudes.</p><h3>Microplastics everywhere</h3><p>Microplastics have become a menace. Scientists recently found <a href="https://interestingengineering.com/science/scientists-find-nine-kinds-of-microplastics-in-human-hearts" title="nine types of microplastics" rel="noopener noreferrer" target="_blank">nine types of microplastics</a> in the human heart. Microplastics in terrestrial and aquatic environments have been well studied, but the research on airborne microplastics is limited.&nbsp;</p><p>Airborne microplastics can originate from various sources, such as landfills, clothing, and the ocean (via aerosolization).&nbsp;</p><p>Studies have shown that airborne microplastics can travel long distances and add to global pollution in the free troposphere, the lowest level in the Earth's atmosphere.&nbsp;</p><p>Also, airborne microplastics might play a role in cloud formation by acting as particles that attract water vapor and ice crystals, especially when transported in high-altitude air and the lower atmosphere.</p><p>Speaking of the necessity for this research, Dr. Okochi said in a <a href="https://www.waseda.jp/top/en/news/78501" title="press release" rel="noopener noreferrer" target="_blank">press release</a>, "Microplastics in the free troposphere are transported and contribute to global pollution."</p><p>"If the issue of plastic air pollution is not addressed proactively, climate change and ecological risks may become a reality, causing irreversible and serious environmental damage in the future."</p><p>To collect the cloud water samples for testing, the researchers focused on the high-altitude mountain summits in Japan of Mount Oyama and Mount Fuji.</p><p></p><p></p><h3>Plastics influence cloud behavior</h3><p>The researchers employed advanced imaging techniques, including attenuated total reflection imaging and micro-Fourier transform infrared spectroscopy (&micro;FTIR ATR imaging), to determine the types of microplastics present, their size distribution, and physical and chemical properties.</p><p>Their experiments revealed the presence of nine different kinds of microplastics in the water samples, including polyethylene, polypropylene, polyethylene terephthalate, and polyurethane, which are commonly used in everyday applications.</p><p>Interestingly, they found these microplastics to be fragmented, with their concentrations ranging from 6.7 to 13.9 pieces per liter of cloud water!&nbsp;</p><p>They also noticed the presence of hydrophilic microplastics with carbonyl and hydroxyl groups, suggesting that these particles could actively participate in cloud formation by serving as cloud condensation nuclei.</p><p>Explaining how their research can help with global warming efforts, Okochi said, "Airborne microplastics are degraded much faster in the upper atmosphere than on the ground due to strong ultraviolet radiation, and this degradation releases greenhouse gases and contributes to global warming."</p><p>"As a result, the findings of this study can be used to account for the effects of airborne microplastics in future global warming projections."</p><p>The presence of various microplastics in cloud water raises concerns about their potential impact on climate, ecosystems, and human health. In sensitive ecosystems such as the <a href="https://interestingengineering.com/science/ice-algae-loaded-with-microplastics-arctic" title="polar regions" rel="noopener noreferrer" target="_blank">polar regions</a>, the accumulation of airborne microplastics can profoundly disrupt the Earth's ecological equilibrium, leading to a significant decline in biodiversity.</p><p>The findings of their study are published in <a href="https://doi.org/10.1007/s10311-023-01626-x" title="Environmental Chemistry Letters" rel="noopener noreferrer" target="_blank"><em>Environmental Chemistry Letters</em></a>.        </p>]]></content>
	<updated>2023-10-02T20:13:00+00:00</updated>
	<author><name>Tejasri Gururaj</name></author>
	<source>
		<id>https://interestingengineering.com</id>
		<link href="https://interestingengineering.com" rel="self"/>
		<updated>2023-10-02T20:13:00+00:00</updated>
		<title>Interesting Engineering Articles</title></source>

	<category term="science"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599165</id>
	<link href="https://smashingmagazine.com/2023/10/waterbear-building-free-platform-documentaries-part2/" rel="alternate" type="text/html"/>
	<title type="html">WaterBear: Building A Free Platform For Impactful Documentaries (Part 2)</title>
	<summary type="html"><![CDATA[<p>In my previous article, I talked about Waterbear, a significant project I worked on as a newly-appoi...</p>]]></summary>
	<content type="html"><![CDATA[<p>In my previous article, I talked about Waterbear, a significant project I worked on as a newly-appointed lead developer, and the lessons I learned leading a team for the first time. In this second article, I&rsquo;ll go over some key technical highlights from the project. Before we start, let&rsquo;s quickly remind ourselves what WaterBear is all about and what makes it so interesting.</p>
<p><a href="https://www.waterbear.com" rel="noopener noreferrer" target="_blank">WaterBear</a> is a free platform bringing together inspiration and action with <strong>award-winning high-production environmental documentaries</strong> covering various topics, from animals and climate change to people and communities. The WaterBear team produces their own original films and documentaries and hosts curated films and content from various high-profile partners, including award-winning filmmakers, large brands, and significant non-governmental organizations (NGOs), like Greenpeace, WWF, The Jane Goodall Institute, Ellen MacArthur Foundation, Nikon, and many others.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/1-waterbear-homepage.png" referrerpolicy="no-referrer" loading="lazy"></p>
<p>For context, I am currently working at a software development company called <a href="https://q.agency/" rel="noopener noreferrer" target="_blank">Q Agency</a> based in Zagreb, Croatia. We collaborated with WaterBear and its partner companies to build a <strong>revamped and redesigned version of WaterBear&rsquo;s web and mobile app</strong> from the ground up using modern front-end technologies.</p>
<p>In the first article, I briefly discussed the technical stack that includes a React-based front-end framework, <a href="https://nextjs.org/" rel="noopener noreferrer" target="_blank">Next.js</a> for the web app, Sanity CMS, Firebase Auth, and Firestore database. Definitely read up on the strategy and reasoning behind this stack in the first article if you missed it.</p>
<p>Now, let&rsquo;s dive into the technical features and best practices that my team adopted in the process of building the WaterBear web app. I plan on sharing specifically <strong>what I learned from performance and accessibility practices as a first-time lead developer of a team</strong>, as well as what I wish I had known before we started.</p>
Image Optimization
<p>Images are pieces of content in many contexts, and they are a very important and prominent part of the WaterBear app&rsquo;s experience, from video posters and category banners to partner logos and campaign image assets.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/2-waterbear-image-cards-carousel-ui-elements.png" referrerpolicy="no-referrer" loading="lazy"></p>
<p>I think that if you are reading this article, you likely know the tightrope walk between striking, immersive imagery and performant user experiences we do as front-enders. Some of you may have even grimaced at the heavy use of images in that last screenshot. My team measured the impact, noting that on the first load, this video category page serves up as many as 14 images. Digging a little deeper, we saw those images account for approximately 85% of the total page size.</p>
<p><img src="https://rss.biapy.fr/files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/3-unoptimized-full-size-image.jpg" referrerpolicy="no-referrer" loading="lazy"></p>
<p>That&rsquo;s not insignificant and demands attention. WaterBear&rsquo;s product is visual in nature, so it&rsquo;s understandable that images are going to play a large role in its web app experience. Even so, 85% of the experience feels heavy-handed.</p>
<p>So, my team knew early on that we would be leveraging as many image optimization techniques as we could that would help improve how quickly the page loads. If you want to know everything there is to optimize images, I wholeheartedly recommend Addy Osami&rsquo;s <a href="https://www.smashingmagazine.com/printed-books/image-optimization/" rel="noopener noreferrer" target="_blank"><em>Image Optimization</em></a> for a treasure trove of insightful advice, tips, and best practices that helped us improve WaterBear&rsquo;s performance.</p>
<p>Here is how we tackled the challenge.</p>
<h3>Using CDN For Caching And WebP For Lighter File Sizes</h3>
<p>As I mentioned a little earlier, our stack includes Sanity&rsquo;s CMS. It offers a robust content delivery network (CDN) <a href="https://www.sanity.io/docs/asset-cdn" rel="noopener noreferrer" target="_blank">out of the box</a>, which serves two purposes: (1) optimizing image assets and (2) caching them. Members of the WaterBear team are able to upload unoptimized high-quality image assets to Sanity, which ports them to the CDN, and from there, we instruct the CDN to run appropriate optimizations on those images &mdash; things like compressing the files to their smallest size without impacting the visual experience, then caching them so that a user doesn&rsquo;t have to download the image all over again on subsequent views.</p>
<p>Requesting the optimized version of the images in Sanity boils down to adding query variables to image links like this:</p>
<p><code>https://cdn.sanity.io/.../image.jpg?w=1280&amp;q=70&amp;auto=format</code></p>
<p>Let&rsquo;s break down the query variables:</p>
<ul>
<li><code>w</code> sets the width of the image. In the example above, we have set the width to <code>1280px</code> in the query.</li>
<li><code>q</code> sets the compression quality of the image. We landed on 70% to balance the need for visual quality with the need for optimized file sizes.</li>
<li><code>format</code> sets the image format, which is set to <code>auto</code>, allowing Sanity to determine the best type of image format to use based on the user&rsquo;s browser capabilities.</li>
</ul>
<p>Notice how all of that comes from a URL that is mapped to the CDN to fetch a JPG file. It&rsquo;s pretty magical how a completely unoptimized image file can be transformed into a fully optimized version that serves as a completely different file with the use of a few parameters.</p>
<p>In many cases, the <code>format</code> will be returned as a WebP file. We made sure to use WebP because it yields <a href="https://web.dev/serve-images-webp/" rel="noopener noreferrer" target="_blank">significant savings</a> in terms of file size. Remember that unoptimized 1.2 MB image from earlier? It&rsquo;s a mere 146 KB after the optimizations.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/4-optimized-image.jpg" referrerpolicy="no-referrer" loading="lazy"></p>
<p>And all 14 image requests are smaller than that one unoptimized image!</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/5-table-image-requests-otimized.png" referrerpolicy="no-referrer" loading="lazy"></p>
<p>The fact that images still account for 85% of the page weight is a testament to just how heavy of a page we are talking about.</p>
<p>Another thing we have to consider when talking about modern image formats is browser support. Although <a href="https://caniuse.com/webp" rel="noopener noreferrer" target="_blank">WebP is widely supported</a> and has been a staple for some time now, my team decided to provide an optimized fallback JPG just in case. And again, <strong>Sanity automatically detects the user&rsquo;s browser capabilities</strong>. This way, we serve the WebP version only if Sanity knows the browser supports it and only provide the optimized fallback file if WebP support isn&rsquo;t there. It&rsquo;s great that we don&rsquo;t have to make that decision ourselves!</p>
<p>Have you heard of AVIF? It&rsquo;s another modern image format that promises potential savings even greater than WebP. If I&rsquo;m being honest, I would have preferred to use it in this project, but Sanity unfortunately does not support it, at least at the time of this article. There&rsquo;s a <a href="https://github.com/sanity-io/image-url/issues/26" rel="noopener noreferrer" target="_blank">long-running ticket to add support</a>, and I&rsquo;m holding hope we get it.</p>
<p>Would we have gone a different route had we known about the lack of AVIF support earlier? <a href="https://github.com/sanity-io/image-url/issues/26" rel="noopener noreferrer" target="_blank">Cloudinary supports it</a>, for example. I don&rsquo;t think so. Sanity&rsquo;s tightly coupled CDN integration is too great of a developer benefit, and as I said, I&rsquo;m hopeful Sanity will give us that support in the future. But that is certainly the sort of consideration I wish I would have had early on, and now I have that in my back pocket for future projects. </p>
<h3>Tackling The Largest Contentful Paint (LCP)</h3>
<p>LCP is the biggest element on the page that a user sees on the initial load. You want to optimize it because it&rsquo;s the first impression a user has with the page. It ought to load as soon as possible while everything under it can wait a moment.</p>
<p>For us, images are most definitely part of the LCP. By giving more consideration to the banner images we load at the top of the page, we can serve that component a little faster for a better experience. There are a couple of modern image attributes that can help here: <code>loading</code> and <a href="https://web.dev/fetch-priority/#summary" rel="noopener noreferrer" target="_blank"><code>fetchpriority</code></a>.</p>
<p>We used <strong>an <code>eager</code> loading strategy</strong> paired with a high <code>fetchpriority</code> on the images. This provides the browser with a couple of hints that this image is super important and that we want it early in the loading process.</p>
<pre><code>&lt;!-- Above-the-fold Large Contentful Paint image --&gt;
&lt;img
  loading="eager"
  fetchpriority="high"
  alt="..."
  src="..."
  width="1280"
  height="720"
  class="..."
/&gt;
</code></pre>

<p>We also made use of preloading in the document <code>&lt;head&gt;</code>, indicating to the browser that we want to <code>preload</code> images during page load, again, with <code>high</code> priority, using <a href="https://nextjs.org/docs/pages/api-reference/components/image#priority" rel="noopener noreferrer" target="_blank">Next.js image preload options</a>.</p>
<pre><code>&lt;head&gt;
  &lt;link
    rel="preload"
    as="image"
    href="..."
    fetchpriority="high"
  /&gt;
&lt;/head&gt;
</code></pre>

<p>Images that are &ldquo;below the fold&rdquo; can be de-prioritized and downloaded only when the user actually needs it. <a href="https://www.smashingmagazine.com/search/?q=Lazy%20load" rel="noopener noreferrer" target="_blank">Lazy loading</a> is a common technique that instructs the browser to load particular images once they enter the viewport. It&rsquo;s only <a href="https://css-tricks.com/native-lazy-loading/" rel="noopener noreferrer" target="_blank">fairly recently</a> that it&rsquo;s become a feature baked directly into HTML with the <code>loading</code> attribute:</p>
<pre><code>&lt;!-- Below-the-fold, low-priority image --&gt;
&lt;img
  decoding="async"
  loading="lazy"
  src="..."
  alt="..."
  width="250"
  height="350"
/&gt;
</code></pre>

<p>This cocktail of strategies made a noticeable difference in how quickly the page loads. On those image-heavy <a href="https://www.waterbear.com/watch/category/animals" rel="noopener noreferrer" target="_blank">video category pages</a> alone, it helped us reduce the image download size and number of image requests by <strong>almost 80% on the first load!</strong> Even though the page will grow in size as the user scrolls, that weight is only added if it passes through the browser viewport.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/6-lazy-loading-strategy.png" referrerpolicy="no-referrer" loading="lazy"></p>
<h3>In Progress: Implementing <code>srcset</code></h3>
<p>My team is incredibly happy with how much performance savings we&rsquo;ve made so far. But there&rsquo;s no need to stop there! Every millisecond counts when it comes to page load, and we are still planning additional work to optimize images even further.</p>
<p>The task we&rsquo;re currently planning will implement the <code>srcset</code> attribute on images. This is not a &ldquo;new&rdquo; technique by any means, but it is certainly a component of modern performance practices. It&rsquo;s also a <a href="https://web.dev/learn/design/responsive-images/#responsive-images-with-srcset" rel="noopener noreferrer" target="_blank">key component in responsive design</a>, as it instructs browsers to use certain versions of an image at different viewport widths.</p>
<p>We&rsquo;ve held off on this work only because, for us, the other strategies represented the lowest-hanging fruit with the most impact. Looking at an image element that uses <code>srcset</code> in the HTML shows it&rsquo;s not the easiest thing to read. Using it requires a certain level of art direction because the dimensions of an image at one screen size may be completely different than those at another screen size. In other words, there are additional considerations that come with this strategy.</p>
<p>Here&rsquo;s how we&rsquo;re planning to approach it. We want to avoid loading high-resolution images on small screens like phones and tablets. With the <code>srcset</code> attribute, we can specify separate image sources depending on the device&rsquo;s screen width. With the <code>sizes</code> attribute, we can instruct the browser which image to load depending on the media query.</p>
<p>In the end, our image markup should look something like this:</p>
<pre><code>&lt;img
  width="1280"
  height="720"
  srcset="
    https://cdn.sanity.io/.../image.jpg?w=568&amp;...   568w,
    https://cdn.sanity.io/.../image.jpg?w=768&amp;...   768w,
    https://cdn.sanity.io/.../image.jpg?w=1280&amp;... 1280w
  "
  sizes="(min-width: 1024px) 1280px, 100vw"
  src="https://cdn.sanity.io/.../image.jpg?w=1280&amp;..."
/&gt;
</code></pre>

<p>In this example, we specify a set of three images: </p>
<ol>
<li>Small: <code>568px</code>,</li>
<li>Medium: <code>768px</code>,</li>
<li>Large: <code>1280px</code>.</li>
</ol>
<p>Inside the <code>sizes</code> attribute, we&rsquo;re telling the browser to use the largest version of the image if the screen width is above <code>1024px</code> wide. Otherwise, it should default to selecting an appropriate image out of the three available versions based on the full device viewport width (<code>100vw</code>) &mdash; and will do so <strong>without downloading the other versions</strong>. Providing different image files to the right devices ought to help enhance our performance a bit more than it already is.</p>
Improving CMS Performance With TanStack Query
<p>The majority of content on WaterBear comes from Sanity, the CMS behind the web app. This includes video categories, video archives, video pages, the partners&rsquo; page, and campaign landing pages, among others. Users will constantly navigate between these pages, frequently returning to the same category or landing page.</p>
<p>This provided my team with an opportunity to introduce <strong>query caching</strong> and avoid repeating the same request to the CMS and, as a result, optimize our page performance even more. We used <a href="https://tanstack.com/query/v4/docs/react/overview" rel="noopener noreferrer" target="_blank">TanStack Query</a> (formerly known as <code>react-query</code>) for both fetching data and query caching.</p>
<pre><code>const { isLoading, error, data } = useQuery( /* Options */ )
</code></pre>

<p>TanStack Query caches each request according to the <a href="https://tanstack.com/query/v4/docs/react/guides/query-keys" rel="noopener noreferrer" target="_blank">query key</a> we assign to it. The <strong>query key in TanStack Query is an array,</strong> where the first element is a query name and the second element is an object containing all values the query depends on, e.g., pagination, filters, query variables, and so on.</p>
<p>Let&rsquo;s say we are fetching a list of videos depending on the video category page URL slug. We can filter those results by video duration. The query key might look something like this basic example:</p>
<pre><code>const { isLoading, error, data } = useQuery(
  {
    queryKey: [
      'video-category-list',
      { slug: categorySlug, filterBy: activeFilter }
    ],
  queryFn: () =&gt; /* ... */
  }
)
</code></pre>

<p>These query keys might look confusing at first, but they&rsquo;re similar to the dependency arrays for React&rsquo;s <a href="https://css-tricks.com/intro-to-react-hooks/#aa-create-side-effects-with-useeffect" rel="noopener noreferrer" target="_blank"><code>useEffect</code> hook</a>. Instead of running a function when something in the dependency array changes, it runs a query with new parameters and returns a new state. TanStack Query comes with its dedicated <a href="https://tanstack.com/query/v4/docs/react/devtools" rel="noopener noreferrer" target="_blank">DevTools</a> package. It displays all sorts of useful information about the query that helps debug and optimize them without hassle.</p>
<p>Let&rsquo;s see the query caching in action. In the following video, notice how data loads instantly on repeated page views and repeated filter changes. Compare that to the first load, where there is a slight delay and a loading state before data is shown.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/7-focus-state-green-outline.png" referrerpolicy="no-referrer" loading="lazy"></p>
<p>We&rsquo;re probably not even covering all of our bases! It&rsquo;s so tough to tell without ample user testing. It&rsquo;s a conflicting situation where you want to do everything you can while realistically completing the project with the resources you have and proceed with intention.</p>
<p>We made sure to include a label on interactive elements like buttons, especially ones where the icon is the only content. For that case, we added <a href="https://www.a11yproject.com/posts/how-to-hide-content/" rel="noopener noreferrer" target="_blank">visually hidden</a> text while allowing it to be read by assistive devices. We also made sure to <a href="https://www.smashingmagazine.com/2021/05/accessible-svg-patterns-comparison/" rel="noopener noreferrer" target="_blank">hide the SVG</a> icon from the assistive devices as SVG doesn&rsquo;t add any additional context for assistive devices.</p>
<div>
<pre><code>&lt;!-- Icon button markup with descriptive text for assistive devices --&gt;
&lt;button type="button" class="..."&gt;
  &lt;svg aria-hidden="true" xmlns="..." width="22" height="22" fill="none"&gt;...&lt;/svg
  &gt;&lt;span class="visually-hidden"&gt;Open filters&lt;/span&gt;
&lt;/button&gt;
</code></pre>
</div>

<pre><code>.visually-hidden {
  position: absolute;
  width: 1px;
  height: 1px;
  overflow: hidden;
  white-space: nowrap;
  clip: rect(0 0 0 0);
  -webkit-clip-path: inset(50%);
  clip-path: inset(50%);
}
</code></pre>

<p>Supporting keyboard navigation was one of our accessibility priorities, and we had no trouble with it. We made sure to use proper HTML markup and avoid potential pitfalls like adding a click event to meaningless <code>div</code> elements, which is unfortunately so easy to do in React.</p>
<p>We did, however, hit an obstacle with modals as users were able to move focus outside the modal component and continue interacting with the main page while the modal was in its open state, which isn&rsquo;t possible with the default pointer and touch interaction. For that, we implemented focus traps using the <a href="https://www.npmjs.com/package/focus-trap-react" rel="noopener noreferrer" target="_blank">focus-trap-react library</a> to keep the focus on modals while they&rsquo;re opened, then restore focus back to an active element once the modal is closed.</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/8-focus-trapping.png" referrerpolicy="no-referrer" loading="lazy"></p>
Dynamic Sitemaps
<p><strong>Sitemaps tell search engines</strong> <a href="https://developers.google.com/search/docs/crawling-indexing/sitemaps/build-sitemap" rel="noopener noreferrer" target="_blank"><strong>which pages to crawl</strong></a>. This is faster than just letting the crawler discover internal links on its own while crawling the pages.</p>
<p>The importance of sitemaps in the case of WaterBear is that the team regularly publishes new content &mdash; content we want to be indexed for crawlers as soon as possible by adding those new links to the top of the sitemap. We don&rsquo;t want to rebuild and redeploy the project every time new content has been added to Sanity, so <strong>dynamic server-side sitemaps were our logical choice</strong>.</p>
<p>We used the <a href="https://www.npmjs.com/package/next-sitemap" rel="noopener noreferrer" target="_blank">next-sitemap</a> plugin for Next.js, which has allowed us to easily configure the sitemap generation process for both static and dynamic pages. We used the plugin alongside custom Sanity queries that fetch the latest content from the CMS and quickly generate a fresh sitemap for each request. That way, we made sure that the latest videos get indexed as soon as possible.</p>
<p>Let&rsquo;s say the WaterBear team publishes a page for a video named <em>My Name is Salt</em>. That gets added to a freshly generated XML sitemap:</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/9-example-dynamic-sitemap-latest-video-content.png" referrerpolicy="no-referrer" loading="lazy"></p>
<p>Now, it&rsquo;s indexed for search engines to scoop up and use in search results:</p>
<p><img src="https://files.smashing.media/articles/waterbear-building-free-platform-documentaries-part2/10-indexed-video-sitemap.png" referrerpolicy="no-referrer" loading="lazy"></p>
Until Next Time&hellip;
<p>In this article, I shared some insights about <a href="https://www.waterbear.com/" rel="noopener noreferrer" target="_blank">WaterBear</a>&rsquo;s tech stack and some performance optimization techniques we applied while building it.</p>
<p>Images are used very prominently on many page types on WaterBear, so we used CDN with caching, loading strategies, preloading, and the WebP format to optimize image loading performance. We relied on Sanity for the majority of content management, and we expected repeating page views and queries on a single session, prompting us to implement query caching with TanStack Query.</p>
<p>We made sure to improve basic accessibility on the fly by styling focus states, enabling full keyboard navigation, assigning labels to icon buttons, providing alt text for images, and using focus traps on modal elements.</p>
<p>Finally, we covered how my team handled dynamic server-side rendered sitemaps using the next-sitemap plugin for Next.js.</p>
<p>Again, this was my first big project as lead developer of a team. There&rsquo;s so much that comes with the territory. Not only are there internal processes and communication hurdles to establish a collaborative team environment, but there&rsquo;s the technical side of things, too, that requires balancing priorities and making tough decisions. I hope my learning journey gives you something valuable to consider in your own work. I know that my team isn&rsquo;t the only one with these sorts of challenges, and sharing the lessons I learned from this particular experience probably resonates with some of you reading this.</p>
<p>Please be sure to check out the full work we did on WaterBear. It&rsquo;s available on the <a href="https://www.waterbear.com/" rel="noopener noreferrer" target="_blank">web</a>, <a href="https://play.google.com/store/apps/details?id=com.waterbearnetwork.waterbear&amp;hl=en_US&amp;pli=1" rel="noopener noreferrer" target="_blank">Android,</a> and <a href="https://apps.apple.com/us/app/waterbear/id1461149595" rel="noopener noreferrer" target="_blank">iOS</a>. And, if you end up watching a documentary while you&rsquo;re at it, let me know if it inspired you to take action on a cause!</p>
<h3>References</h3>
<ul>
<li><a href="https://web.dev/fast/#optimize-your-images" rel="noopener noreferrer" target="_blank">Fast load times</a> (web.dev)</li>
<li>&ldquo;<a href="https://www.a11yproject.com/posts/how-to-hide-content/" rel="noopener noreferrer" target="_blank">Hide Content</a>,&rdquo; Dave Rupert (The A11Y Project)</li>
<li>&ldquo;<a href="https://web.dev/serve-images-webp/" rel="noopener noreferrer" target="_blank">Use WebP images</a>,&rdquo; Katie Hempenius (web.dev)</li>
<li>&ldquo;<a href="https://www.smashingmagazine.com/2021/05/accessible-svg-patterns-comparison/" rel="noopener noreferrer" target="_blank">Accessible SVGs: Perfect Patterns For Screen Reader Users</a>,&rdquo; Carie Fisher</li>
<li><a href="https://tanstack.com/query/v4/docs/react/overview" rel="noopener noreferrer" target="_blank">TanStack Query Documentation</a></li>
</ul>
<p><em>Many thanks to WaterBear and Q Agency for helping out with this two-part article series and making it possible. I really would not have done this without their support. I would also like to commend everyone who worked on the project for their outstanding work! You have taught me so much so far, and I am grateful for it.</em></p>]]></content>
	<updated>2023-10-02T18:00:00+00:00</updated>
	<author><name>hello@smashingmagazine.com (Adrian Bece)</name></author>
	<source>
		<id>http://www.smashingmagazine.com</id>
		<link href="http://www.smashingmagazine.com" rel="self"/>
		<updated>2023-10-02T18:00:00+00:00</updated>
		<title>Smashing Magazine</title></source>


	<link href="http://smashing-files.ams3.digitaloceanspaces.com/articles/waterbear-building-free-platform-documentaries-part2/waterbear-building-free-platform-impactful-documentaries.jpg" length="1" rel="enclosure" type="image/jpg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599106</id>
	<link href="https://graphiste.com/blog/format-affiche-publicitaire/" rel="alternate" type="text/html"/>
	<title type="html">Quel format d’affiche publicitaire choisir pour vos campagnes ?</title>
	<summary type="html"><![CDATA[<p>Vous cherchez &agrave; lancer une campagne publicitaire percutante pour promouvoir votre entreprise et che...</p>]]></summary>
	<content type="html"><![CDATA[<p>Vous cherchez &agrave; lancer une campagne publicitaire percutante pour promouvoir votre entreprise et cherchez la meilleure solution pour la r&eacute;aliser&nbsp;? Ne cherchez plus, puisque les affiches publicitaires sont un moyen efficace pour toucher un large public. Cependant, choisir le bon format d&rsquo;impression pour vos affiches papier est essentiel pour maximiser l&rsquo;impact de votre message !</p>



<p>Pour r&eacute;aliser une affiche sur mesure qui saura captiver votre audience, n&rsquo;h&eacute;sitez pas &agrave; faire appel &agrave; un graphiste freelance sur <a href="https://graphiste.com/" rel="noopener noreferrer" target="_blank">Graphiste.com</a>, la plateforme de r&eacute;f&eacute;rence pour la mise en relation entre graphistes et porteurs de projets.</p>



<p>Dans cet article, nous vous pr&eacute;sentons les <strong>diff&eacute;rents formats d&rsquo;affiches publicitaires</strong> et vous donnons des conseils pour concevoir des visuels attractifs.</p>



<h2><strong>Les diff&eacute;rents formats d&rsquo;affiches publicitaires print</strong></h2>



<p>Afin de passer &agrave; l&rsquo;impression de vos affiches publicitaires, vous devrez forc&eacute;ment &agrave; un moment choisir le format d&rsquo;impression de vos affiches papier. Les divers formats d&rsquo;impression existants poss&egrave;dent tous une mise en application diff&eacute;rente, rendant certains formats plus propices &agrave; certaines situations.</p>



<h3><strong>Le format 4 par 3</strong></h3>



<figure><img decoding="async" src="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3.webp" alt="" srcset="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-300x200.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-60x40.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-370x246.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-270x180.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-570x379.webp 570w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-300x200.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-60x40.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-370x246.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-270x180.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-3-570x379.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<h4><strong>Les caract&eacute;ristiques du format 4 par 3</strong></h4>



<p>Le format 4 par 3 est un incontournable dans le domaine des affiches publicitaires. Ce format d&rsquo;impression dispose de dimensions g&eacute;n&eacute;reuses, de 4 m&egrave;tres de largeur sur 3 m&egrave;tres de hauteur.&nbsp;</p>



<h4><strong>L&rsquo;usage du format 4 par 3</strong></h4>



<p>Le format 4 par 3 offre une visibilit&eacute; hors pair aux passants et automobilistes le long des routes et autoroutes. Sa taille imposante permet de communiquer un message clair et impactant, attirant instantan&eacute;ment l&rsquo;attention du public cible.&nbsp;</p>



<p>Id&eacute;al pour les campagnes ext&eacute;rieures &agrave; grande &eacute;chelle, ce format d&rsquo;impression offre un espace cr&eacute;atif g&eacute;n&eacute;reux pour exprimer votre identit&eacute; de marque et mettre en avant vos produits ou services de mani&egrave;re percutante. Il est &eacute;galement parfait pour annoncer des &eacute;v&eacute;nements, des promotions sp&eacute;ciales ou des lancements de produits.&nbsp;</p>



<h3><strong>Le format A0</strong></h3>



<h4><strong>Les caract&eacute;ristiques du format A0</strong></h4>



<p>Le format A0 est un choix strat&eacute;gique pour les campagnes publicitaires demandant une pr&eacute;sence remarquable. Avec ses dimensions de 84,1 cm de largeur sur 118,9 cm de hauteur, cette affiche imposante attire les regards sur les lieux fr&eacute;quent&eacute;s.</p>



<h4><strong>L&rsquo;usage du format A0</strong></h4>



<p>Le format A0 est souvent utilis&eacute; dans les halls d&rsquo;exposition, les grandes salles ou les &eacute;v&eacute;nements du fait de sa surface g&eacute;n&eacute;reuse permettant de pr&eacute;senter votre message de mani&egrave;re percutante.&nbsp;</p>



<p>L&rsquo;avantage majeur de ce format d&rsquo;impression r&eacute;side dans sa capacit&eacute; &agrave; captiver un public nombreux. Sa visibilit&eacute; est amplifi&eacute;e lorsqu&rsquo;il est plac&eacute; dans des zones &agrave; forte affluence, permettant ainsi d&rsquo;atteindre un large &eacute;ventail de prospects. Le format A0 peut contenir des visuels accrocheurs, des informations d&eacute;taill&eacute;es et des &eacute;l&eacute;ments graphiques saisissants gr&acirc;ce &agrave; sa taille imposante.</p>



<h3><strong>H3 : Le format A1</strong></h3>



<h4><strong>Les caract&eacute;ristiques du format A1</strong></h4>



<p>Plus petite que l&rsquo;affiche au format A0, l&rsquo;affiche A1 reste une affiche de grand format. Avec ses dimensions de 59,4 cm de largeur sur 84,1 cm de hauteur, cette affiche offre un &eacute;quilibre parfait entre taille et visibilit&eacute;.</p>



<h4><strong>L&rsquo;usage du format A1</strong></h4>



<p>Le format A1 est un choix judicieux pour les campagnes publicitaires souhaitant concilier impact visuel et praticit&eacute;. Polyvalent, il est id&eacute;al pour les campagnes en ext&eacute;rieur comme en int&eacute;rieur.</p>



<p>En ext&eacute;rieur, le format A1 capte l&rsquo;attention des passants dans des zones &agrave; forte fr&eacute;quentation. Sa taille suffisamment grande permet de diffuser un message clair et percutant. Dans les espaces int&eacute;rieurs, ce format d&rsquo;impression s&rsquo;int&egrave;gre harmonieusement dans les lieux de passage, les commerces ou les halls d&rsquo;accueil.</p>



<p>Son c&ocirc;t&eacute; pratique facilite aussi la gestion des campagnes. L&rsquo;affiche A1 est facile &agrave; installer et peut &ecirc;tre d&eacute;plac&eacute;e ais&eacute;ment selon vos besoins. Pour des messages cibl&eacute;s ou des annonces plus ponctuelles, le format A1 convient aussi parfaitement.</p>



<h3><strong>Le format A2</strong></h3>



<h4><strong>Les caract&eacute;ristiques du format A2</strong></h4>



<p>Le format A2, gr&acirc;ce &agrave; ses dimensions de 42 cm de largeur sur 59,4 cm de hauteur, offre une visibilit&eacute; optimale tout en b&eacute;n&eacute;ficiant de dimensions r&eacute;duites.</p>



<h4><strong>L&rsquo;usage du format A2</strong></h4>



<p>Le format A2 est aussi un choix astucieux pour les campagnes publicitaires qui dont l&rsquo;objectif est d&rsquo;allier praticit&eacute; et impact visuel. Les affiches au format A2 sont principalement utilis&eacute;es en entreprise, que ce soit pour un affichage ext&eacute;rieur comme int&eacute;rieur. Les affiches papier au format A2 sont aussi adapt&eacute;es aux particuliers puisqu&rsquo;elles sont id&eacute;ales pour un affichage int&eacute;rieur.</p>



<h3><strong>Le format A3</strong></h3>



<figure><img decoding="async" src="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2.webp" alt="" srcset="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-300x250.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-60x50.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-370x309.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-270x225.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-570x476.webp 570w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-300x250.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-60x50.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-370x309.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-270x225.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-2-570x476.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<h4><strong>Les caract&eacute;ristiques du format A3</strong></h4>



<p>Avec ses dimensions de 29,7 cm de largeur sur 42 cm de hauteur, le format A3 offre une surface id&eacute;ale pour transmettre un message concis et percutant.</p>



<h4><strong>L&rsquo;usage du format A3</strong></h4>



<p>Choisir le format A3 pour vos affiches publicitaires est id&eacute;al pour les campagnes visant une communication cibl&eacute;e et efficace. Gr&acirc;ce &agrave; sa taille compacte, ce format d&rsquo;impression est particuli&egrave;rement adapt&eacute; pour les campagnes &agrave; petite &eacute;chelle et en int&eacute;rieur. Vous pouvez notamment retrouver des affiches adoptant ce format d&rsquo;impression dans les commerces, les salles d&rsquo;attente ou les vitrines.</p>



<p>Le format A3 est tr&egrave;s pratique car il est facile &agrave; manipuler, &agrave; afficher et &agrave; distribuer. Il vous permet de r&eacute;aliser des campagnes cibl&eacute;es &agrave; moindre co&ucirc;t, tout en touchant efficacement votre public. Avec le format A3, vous privil&eacute;giez donc une communication plus personnalis&eacute;e tout en g&eacute;rant votre message de mani&egrave;re plus flexible.</p>



<h3><strong>Le format 50 x 200 cm</strong></h3>



<h4><strong>Les caract&eacute;ristiques du format 50 x 200 cm</strong></h4>



<p>Comme son nom l&rsquo;indique, le format 50 x 200 cm dispose d&rsquo;une taille de 50 cm de largeur sur 200 cm de hauteur et est destin&eacute;e aux campagnes publicitaires n&eacute;cessitant une communication verticale percutante.</p>



<h4><strong>L&rsquo;usage du format 50 x 200 cm</strong></h4>



<p>Les affiches au format 50 x 200 cm offrent une parfaite visibilit&eacute; dans les espaces en hauteur, tels que les couloirs du m&eacute;tro ou les fa&ccedil;ades de b&acirc;timents.&nbsp;</p>



<p>Gr&acirc;ce &agrave; sa taille allong&eacute;e, vos campagnes publicitaires captiveront l&rsquo;attention des passants lors de leurs d&eacute;placements, ce qui offre une communication efficace dans des zones &agrave; forte fr&eacute;quentation. Il est donc particuli&egrave;rement adapt&eacute; aux campagnes urbaines, touchant un public vari&eacute; et mobile.</p>



<h3><strong>Le format Abribus</strong></h3>



<figure><img decoding="async" src="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1.webp" alt="" srcset="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-300x214.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-60x43.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-370x264.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-270x193.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-570x407.webp 570w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1.webp 700w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-300x214.webp 300w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-60x43.webp 60w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-370x264.webp 370w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-270x193.webp 270w,https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-1-570x407.webp 570w" sizes="(max-width: 700px) 100vw, 700px" referrerpolicy="no-referrer" loading="lazy"></figure>



<h4><strong>Les caract&eacute;ristiques du format Abribus</strong></h4>



<p>Le format Abribus est le seul format d&rsquo;impression sur cette liste aux dimensions variables. Bien que sa taille soit g&eacute;n&eacute;ralement de 120 cm de largeur sur 175 cm de hauteur, ce format d&rsquo;impression doit &ecirc;tre sp&eacute;cifiquement adapt&eacute; afin de s&rsquo;int&eacute;grer &agrave; l&rsquo;affichage urbain des arr&ecirc;ts de bus, tram et m&eacute;tro.&nbsp;</p>



<h4><strong>L&rsquo;usage du format Abribus</strong></h4>



<p>Utilis&eacute; au sein des abris pour bus, trams et m&eacute;tros, le format Abribus se distingue par son emplacement privil&eacute;gi&eacute;, attirant l&rsquo;attention des usagers lors de leur attente. C&rsquo;est un moyen efficace de toucher un large &eacute;ventail de personnes d&rsquo;horizons diff&eacute;rents.</p>



<p>Les voyageurs utilisant r&eacute;guli&egrave;rement les transports en commun seront aussi expos&eacute;s plusieurs fois &agrave; votre annonce, renfor&ccedil;ant ainsi la m&eacute;morisation de votre marque ou de votre produit.</p>



<h2><strong>Comment choisir le bon format d&rsquo;affiche publicitaire ?</strong></h2>



<p><strong>Le choix du format d&rsquo;affiche publicitaire</strong> est une des d&eacute;cisions les plus importantes pour votre campagne de communication. Pour garantir une communication efficace, il est essentiel de prendre en compte certains facteurs cl&eacute;s pour choisir le format d&rsquo;impression de vos affiches.&nbsp;</p>



<h3><strong>1. Analysez votre message et votre objectif</strong></h3>



<p>Avant de choisir un format d&rsquo;impression pour vos affiches, clarifiez le message que vous souhaitez transmettre. Si votre message est simple et percutant, optez pour un format d&rsquo;impression plus grand, comme le 4 par 3 offrant une visibilit&eacute; maximale. En revanche, pour une communication plus d&eacute;taill&eacute;e, pr&eacute;f&eacute;rez des plus petits formats d&rsquo;impression.</p>



<h3><strong>2. &Eacute;tudiez le lieu d&rsquo;affichage</strong></h3>



<p>Le lieu o&ugrave; sera expos&eacute;e votre affiche influence aussi le choix du format d&rsquo;impression de vos affiches. Pour une campagne en ext&eacute;rieur le long des routes ou autoroutes, pr&eacute;f&eacute;rez alors de grands formats d&rsquo;impression, comme le 4 par 3 et le A0. En int&eacute;rieur, les formats A1, A2 ou A3 conviennent mieux pour s&rsquo;adapter &agrave; l&rsquo;espace qui est disponible.</p>



<h3><strong>3. Comprenez votre public cible</strong></h3>



<p>Comprendre son audience est essentiel pour choisir un format d&rsquo;affichage ad&eacute;quat. Si vous visez les usagers des transports en commun, favorisez alors le format abribus. Pour une communication plus cibl&eacute;e, les formats A3 et A2 seront optimaux.</p>



<h3><strong>4. &Eacute;valuez la dur&eacute;e d&rsquo;exposition</strong></h3>



<p>La dur&eacute;e pendant laquelle votre affiche est expos&eacute;e influence aussi le choix de son format d&rsquo;impression. Pour des campagnes &eacute;ph&eacute;m&egrave;res, privil&eacute;giez de grands formats, qui attirent rapidement l&rsquo;attention. Pour des expositions prolong&eacute;es, vous pouvez favoriser les formats abribus.</p>



<h2><strong>Comment concevoir le visuel de votre affiche publicitaire ?</strong></h2>



<p><strong>Concevoir le visuel d&rsquo;une affiche publicitaire</strong> est une &eacute;tape cruciale pour assurer l&rsquo;efficacit&eacute; de votre campagne de communication. Pour capter l&rsquo;attention de votre audience et transmettre votre message de mani&egrave;re percutante, voici quelques astuces essentielles &agrave; suivre :</p>



<ul>
<li>Renseignez-vous sur votre cible ;</li>



<li>Optez pour un design simple et clair ;</li>



<li>Utilisez des visuels attrayants ;</li>



<li>Choisissez des couleurs et des typographies en accord avec votre identit&eacute; visuelle et harmonieuses ;</li>



<li>Hi&eacute;rarchisez les informations pour rendre le message facilement visible ;<br>Appelez le public &agrave; l&rsquo;action.</li>
</ul>



<p>Pour des affiches percutantes et professionnelles, vous pouvez toujours <a href="https://graphiste.com/#open-fast" rel="noopener noreferrer" target="_blank">faire appel &agrave; un graphiste freelance sur Graphiste.com</a>. Les graphistes de notre plateforme sont des experts en communication visuelle et sauront donner vie &agrave; vos id&eacute;es et cr&eacute;er un visuel personnalis&eacute; qui r&eacute;pondra &agrave; vos objectifs marketing. N&rsquo;h&eacute;sitez donc pas &agrave; confier votre projet &agrave; un graphiste talentueux sur Graphiste.com pour une communication visuelle percutante et m&eacute;morable.</p>



<h2><strong>Notre astuce pour r&eacute;aliser une affiche publicitaire au bon format</strong></h2>



<p><strong>Le choix du format d&rsquo;affiche publicitaire</strong> est un &eacute;l&eacute;ment d&eacute;terminant pour le succ&egrave;s de votre campagne de communication. <strong>Chaque format d&rsquo;impression offre des avantages sp&eacute;cifiques</strong> en fonction de l&rsquo;environnement et des objectifs de votre campagne. Chaque choix est donc strat&eacute;gique et impactant &agrave; sa mani&egrave;re.&nbsp;</p>



<p><strong>Pour cr&eacute;er des affiches publicitaires percutantes et professionnelles</strong>, n&rsquo;h&eacute;sitez pas &agrave; faire appel &agrave; un graphiste sur Graphiste.com. Nos graphistes sont sp&eacute;cialis&eacute;s dans la communication visuelle et sauront mettre en valeur vos projets, vos produits ou vos services avec cr&eacute;ativit&eacute; et originalit&eacute;. Faites le choix de l&rsquo;excellence pour vos affiches publicitaires et marquez les esprits de votre audience d&egrave;s aujourd&rsquo;hui.</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://graphiste.com/blog/format-affiche-publicitaire/" target="_blank">Quel format d&rsquo;affiche publicitaire choisir pour vos campagnes&nbsp;?</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://graphiste.com/blog" target="_blank">Graphiste.com</a>.</p>]]></content>
	<updated>2023-10-03T06:30:00+00:00</updated>
	<author><name>Laura</name></author>
	<source>
		<id>https://graphiste.com/blog</id>
		<link href="https://graphiste.com/blog" rel="self"/>
		<updated>2023-10-03T06:30:00+00:00</updated>
		<title>Graphiste.com</title></source>

	<category term="affiche"/>


	<link href="https://graphiste.com/blog/wp-content/uploads/sites/4/2023/09/format-affiche-publicitaire-150x150.webp" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599110</id>
	<link href="https://zonetuto.fr/hardware/quelle-touche-utiliser-pour-acceder-au-bios-uefi-de-sa-carte-mere/" rel="alternate" type="text/html"/>
	<title type="html">Quelle touche utiliser pour accéder au BIOS UEFI de sa carte mère</title>
	<summary type="html"><![CDATA[<p>Comments</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://www.journalduhacker.net/s/ofxdog/quelle_touche_utiliser_pour_acc_der_au" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2023-10-02T13:50:47+00:00</updated>
	<author><name>f4b1</name></author>
	<source>
		<id>https://www.journalduhacker.net/</id>
		<link href="https://www.journalduhacker.net/" rel="self"/>
		<updated>2023-10-02T13:50:47+00:00</updated>
		<title>Journal du hacker</title></source>

	<category term="matériel"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599111</id>
	<link href="https://johackim.com/systemes-vs-objectifs" rel="alternate" type="text/html"/>
	<title type="html">Systèmes vs. objectifs</title>
	<summary type="html"><![CDATA[<p>Comments</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://www.journalduhacker.net/s/cxbkpb/syst_mes_vs_objectifs" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2023-10-02T07:08:15+00:00</updated>
	<author><name>TheBidouilleur</name></author>
	<source>
		<id>https://www.journalduhacker.net/</id>
		<link href="https://www.journalduhacker.net/" rel="self"/>
		<updated>2023-10-02T07:08:15+00:00</updated>
		<title>Journal du hacker</title></source>

	<category term="sysadmin"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599112</id>
	<link href="https://zazaa.blogspot.com/2023/10/les-brouteurs-anonymes.html" rel="alternate" type="text/html"/>
	<title type="html">Les brouteurs anonymes: L'anonymat n'existe pas sur Internet</title>
	<summary type="html"><![CDATA[<p>Comments</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://www.journalduhacker.net/s/d9bag6/les_brouteurs_anonymes_lanonymat" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2023-10-02T03:38:02+00:00</updated>
	<author><name>ache</name></author>
	<source>
		<id>https://www.journalduhacker.net/</id>
		<link href="https://www.journalduhacker.net/" rel="self"/>
		<updated>2023-10-02T03:38:02+00:00</updated>
		<title>Journal du hacker</title></source>

	<category term="criminalité"/>

	<category term="réseau"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599113</id>
	<link href="https://www.youtube.com/watch?v=Kv4FzAdxclA" rel="alternate" type="text/html"/>
	<title type="html">Le projet qui va révolutionner la vidéo pour toujours</title>
	<summary type="html"><![CDATA[<p>Comments</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://www.journalduhacker.net/s/pnfs0q/le_projet_qui_va_r_volutionner_la_vid_o_pour" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2023-10-01T11:12:47+00:00</updated>
	<author><name>Cascador</name></author>
	<source>
		<id>https://www.journalduhacker.net/</id>
		<link href="https://www.journalduhacker.net/" rel="self"/>
		<updated>2023-10-01T11:12:47+00:00</updated>
		<title>Journal du hacker</title></source>

	<category term="vidéo"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599095</id>
	<link href="https://www.it-connect.fr/google-chrome-encore-une-faille-zero-day-exploitee-dans-des-attaques-cve-2023-5217/" rel="alternate" type="text/html"/>
	<title type="html">Google Chrome : encore une faille zero-day exploitée dans des attaques (CVE-2023-5217)</title>
	<summary type="html"><![CDATA[<p>Il y a quelques jours, Google a mis en ligne une nouvelle mise &agrave; jour de s&eacute;curit&eacute; pour son navigateu...</p>]]></summary>
	<content type="html"><![CDATA[<p><strong>Il y a quelques jours, Google a mis en ligne une nouvelle mise &agrave; jour de s&eacute;curit&eacute; pour son navigateur Google Chrome. L'objectif : corriger la 5&egrave;me faille zero-day de l'ann&eacute;e 2023 d&eacute;couverte dans son navigateur. Faisons le point sur cette menace.</strong></p>



<p>Associ&eacute;e &agrave; la r&eacute;f&eacute;rence <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217" target="_blank" rel="noopener noreferrer" title="">CVE-2023-5217</a></strong>, cette faille de s&eacute;curit&eacute; importante h&eacute;rite d'un <strong>score CVSS v3.1 de 8.8 sur 10</strong>. Signal&eacute;e par Cl&eacute;ment Lecigne de l'&eacute;quipe Google Threat Analysis Group, cette faille de s&eacute;curit&eacute; de type "<em>heap buffer overflow</em>" se situe dans une fonction d'encodage de la <strong>biblioth&egrave;que de codecs vid&eacute;o libvpx</strong>.</p>



<p>D'apr&egrave;s Google, cette vuln&eacute;rabilit&eacute; est impliqu&eacute;e au sein de cyberattaque et un exploit est d&eacute;j&agrave; disponible : "<em>Google sait qu'il existe un programme d'exploitation pour CVE-2023-5217 dans la nature</em>", peut-on lire dans le<a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html" target="_blank" rel="noopener noreferrer" title=""> bulletin de s&eacute;curit&eacute; officiel</a>. D'ailleurs, Maddie Stone de l'&eacute;quipe Google Threat Analysis Group affirme que <strong>cette vuln&eacute;rabilit&eacute; a &eacute;t&eacute; utilis&eacute;e pour installer un malware sur des machines</strong>. Comme &agrave; son habitude, Google ne donne pas de d&eacute;tails techniques pour laisser le temps &agrave; ses utilisateurs d'installer le correctif.</p>



<p>Ces derni&egrave;res heures, l'agence am&eacute;ricaine CISA a ajout&eacute; la vuln&eacute;rabilit&eacute;<strong> CVE-2023-5217</strong> &agrave; son catalogue des failles de s&eacute;curit&eacute; connues et exploit&eacute;es dans le cadre d'attaques.</p>



<p>Au-del&agrave; de corriger cette faille de s&eacute;curit&eacute; zero-day, cette mise &agrave; jour int&egrave;gre "10 correctifs de s&eacute;curit&eacute;" d'apr&egrave;s Google, notamment des patchs pour ces deux<strong> autres vuln&eacute;rabilit&eacute;s : CVE-2023-5186 et CVE-2023-5187</strong>, toutes les deux de type "<em>use after free</em>" et situ&eacute;es respectivement dans le Gestionnaire de mots de passe et le Gestionnaire d'extensions de Chrome.</p>



<p>R&eacute;cemment, les d&eacute;veloppeurs ont corrig&eacute; une autre faille zero-day dans Google Chrome, mais elle &eacute;tait li&eacute;e &agrave; la <a href="https://www.it-connect.fr/la-faille-zero-day-dans-la-librairie-webp-est-critique-et-naffecte-pas-seulement-firefox-et-chrome/" target="_blank" rel="noopener noreferrer" title="La faille zero-day dans la librairie WebP est critique et n&rsquo;affecte pas seulement Firefox et Chrome">biblioth&egrave;que libwebp</a> &eacute;galement utilis&eacute;e par d'autres projets, y compris les navigateurs Mozilla Firefox et Microsoft Edge, mais aussi Signal et 1Password.</p>



<p><strong>Si vous utilisez Google Chrome, il est plus que recommand&eacute; d'installer la derni&egrave;re version : 117.0.5938.132.</strong> Cette version est disponible pour Windows, macOS et <a href="https://www.it-connect.fr/cours-tutoriels/administration-systemes/linux/" target="_blank" rel="noopener noreferrer" title="Linux">Linux</a>.</p><p>The post <a href="https://www.it-connect.fr/google-chrome-encore-une-faille-zero-day-exploitee-dans-des-attaques-cve-2023-5217/" rel="noopener noreferrer" target="_blank">Google Chrome : encore une faille zero-day exploit&eacute;e dans des attaques (CVE-2023-5217)</a> first appeared on <a href="https://www.it-connect.fr" rel="noopener noreferrer" target="_blank">IT-Connect</a>.</p>]]></content>
	<updated>2023-10-03T05:29:42+00:00</updated>
	<author><name>Florian Burnel</name></author>
	<source>
		<id>https://www.it-connect.fr</id>
		<link href="https://www.it-connect.fr" rel="self"/>
		<updated>2023-10-03T05:29:42+00:00</updated>
		<title>IT-Connect</title></source>

	<category term="google"/>

	<category term="google chrome"/>

	<category term="logiciel - os"/>

	<category term="sécurité"/>

	<category term="vulnérabilité"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599090</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2023/10/03/chromebook_plus/" rel="alternate" type="text/html"/>
	<title type="html">Google doubles minimum RAM and disk in 'Chromebook Plus' spec</title>
	<summary type="html"><![CDATA[<p>Some may be made in India, where the Big G has teamed to make kit with HP Google has added a 'Plu...</p>]]></summary>
	<content type="html"><![CDATA[<h4>Some may be made in India, where the Big G has teamed to make kit with HP</h4> <p>Google has added a 'Plus' designation to its Chromebook spec that requires machines to offer at least an Intel Core i3 12th Gen or above, or AMD Ryzen 3 7000, plus 8GB of memory and 128GB of onboard storage.&hellip;</p>]]></content>
	<updated>2023-10-03T04:34:28+00:00</updated>
	<author><name>Simon Sharwood</name></author>
	<source>
		<id>https://www.theregister.com/</id>
		<link href="https://www.theregister.com/" rel="self"/>
		<updated>2023-10-03T04:34:28+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599081</id>
	<link href="https://afup.org/news/1195-changement-aperocommunautaire-forum2023" rel="alternate" type="text/html"/>
	<title type="html">Une soirée du jeudi repensée et ludique au Forum PHP 2023</title>
	<summary type="html"><![CDATA[<p>Une soir&eacute;e du jeudi soir repens&eacute;e
Le jeudi soir, le traditionnel ap&eacute;ro communautaire va d&eacute;sormais la...</p>]]></summary>
	<content type="html"><![CDATA[<h3>Une soir&eacute;e du jeudi soir repens&eacute;e</h3>
<p>Le jeudi soir, le traditionnel ap&eacute;ro communautaire va d&eacute;sormais laisser sa place &agrave; une soir&eacute;e communautaire. Notre public est invit&eacute; &agrave; profiter de sa soir&eacute;e sur les bars et restos du Disney Village. Pour information, l'&eacute;quipe AFUP tiendra s&ucirc;rement ses quartiers du c&ocirc;t&eacute; du Billy Bob Saloon ! Profitez de l'ambiance festive de Disneyland Paris avec la communaut&eacute; PHP. </p>
<h3>Un jeu pour faire battre le c&oelig;ur de la soir&eacute;e communautaire</h3>
<p>Le jeu lanc&eacute; lors de l'ap&eacute;ro communautaire du Forum PHP 2022 nous a encourag&eacute; &agrave; pousser l'id&eacute;e un peu plus loin. Afin de pr&eacute;server l'esprit communautaire de la soir&eacute;e, sur une zone bien plus large que ce que nous avons pu conna&icirc;tre les ann&eacute;es pr&eacute;c&eacute;dentes, un jeu permettra de conserver l'&acirc;me f&eacute;d&eacute;ratrice propre &agrave; notre traditionnelle soir&eacute;e du jeudi. <br>
Le jeu sera lanc&eacute; en fin de journ&eacute;e le jeudi, le temps de la soir&eacute;e. Sans vous d&eacute;voiler le concept pour l'instant, sachez qu'il vous faudra retrouver vos &eacute;quipiers et &eacute;quipi&egrave;res, sans savoir qui ils sont ! De quoi encourager les rencontres et lancer quelques discussions. Pensez &agrave; garder votre badge avec vous et &agrave; le porter de mani&egrave;re visible le jeudi soir. <br>
Si le jeu vous pla&icirc;t, sachez que l'&eacute;quipe travaille &agrave; le rendre opensource, afin que tout le monde puisse le reproduire aupr&egrave;s de ses &eacute;quipes ou de ses &eacute;v&eacute;nements.</p>
<h3>L'AFUP participe &agrave; payer votre premier verre</h3>
<p>Bien s&ucirc;r, s'il ya une tradition &agrave; laquelle on ne peut pas d&eacute;roger, c'est celle du ticket boisson : un syst&egrave;me &eacute;quivalent sera mis en place afin que vous puissiez profiter des bars et restos de la zone et l'AFUP participera ainsi &agrave; vous faire plaisir. </p>]]></content>
	<updated>2023-10-03T04:03:34+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://afup.org/rss.xml</id>
		<link href="https://afup.org/rss.xml" rel="self"/>
		<updated>2023-10-03T04:03:34+00:00</updated>
		<title>Le flux RSS de l'AFUP</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599086</id>
	<link href="https://www.frenchweb.fr/acces-des-mineurs-aux-sites-pornos-les-enjeux-du-projet-de-loi/445468" rel="alternate" type="text/html"/>
	<title type="html">Accès des mineurs aux sites pornos: les enjeux du projet de loi</title>
	<summary type="html"><![CDATA[<p>Emp&ecirc;cher les mineurs d&rsquo;acc&eacute;der aux sites pornographiques est une des mesures phare du projet d...</p>]]></summary>
	<content type="html"><![CDATA[<p>Emp&ecirc;cher les mineurs d&rsquo;acc&eacute;der aux sites pornographiques est une des mesures phare du projet de loi de s&eacute;curisation de l&rsquo;espace num&eacute;rique (SREN), qui arrive mercredi en s&eacute;ance publique &agrave; l&rsquo;Assembl&eacute;e. &ndash; Pourquoi le gouvernement entend-il restreindre l&rsquo;acc&egrave;s des sites pornographiques aux mineurs? Chaque mois, 2,3 millions de mineurs fr&eacute;quentent des sites pornographiques, selon l&rsquo;Autorit&eacute; de &hellip;</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://www.frenchweb.fr/acces-des-mineurs-aux-sites-pornos-les-enjeux-du-projet-de-loi/445468" target="_blank">Acc&egrave;s des mineurs aux sites pornos: les enjeux du projet de loi</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://www.frenchweb.fr" target="_blank">FRENCHWEB.FR</a>.</p>]]></content>
	<updated>2023-10-03T04:03:26+00:00</updated>
	<author><name>LA REDACTION DE FRENCHWEB.FR</name></author>
	<source>
		<id>https://www.frenchweb.fr/</id>
		<link href="https://www.frenchweb.fr/" rel="self"/>
		<updated>2023-10-03T04:03:26+00:00</updated>
		<title>FRENCHWEB.FR</title></source>

	<category term="les dernières actualités de la tech"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599079</id>
	<link href="https://www.helpnetsecurity.com/2023/10/03/chalk-open-source-software-security-tool/" rel="alternate" type="text/html"/>
	<title type="html">Chalk: Open-source software security and infrastructure visibility tool</title>
	<summary type="html"><![CDATA[<p>Chalk is a free, open-source tool that helps improve software security. You add a single line to you...</p>]]></summary>
	<content type="html"><![CDATA[<p>Chalk is a free, open-source tool that helps improve software security. You add a single line to your build script, and it will automatically collect and inject metadata into every build artifact: source code, binaries, and containers. Gaining visibility Chalk enables complete visibility across the development process, from the first time a developer creates the code to the entire lifetime a container hosting is running. Chalk is a convenient tool for compliance by producing SBOMs, &hellip; <a href="https://www.helpnetsecurity.com/2023/10/03/chalk-open-source-software-security-tool/" rel="noopener noreferrer" target="_blank">More <span>&rarr;</span></a></p>
<p>The post <a rel="noopener noreferrer" href="https://www.helpnetsecurity.com/2023/10/03/chalk-open-source-software-security-tool/" target="_blank">Chalk: Open-source software security and infrastructure visibility tool</a> appeared first on <a rel="noopener noreferrer" href="https://www.helpnetsecurity.com" target="_blank">Help Net Security</a>.</p>]]></content>
	<updated>2023-10-03T03:30:18+00:00</updated>
	<author><name>Mirko Zorz</name></author>
	<source>
		<id>https://www.helpnetsecurity.com/</id>
		<link href="https://www.helpnetsecurity.com/" rel="self"/>
		<updated>2023-10-03T03:30:18+00:00</updated>
		<title>Help Net Security</title></source>

	<category term="crash override"/>

	<category term="cybersecurity"/>

	<category term="dont miss"/>

	<category term="github"/>

	<category term="software"/>

	<category term="software development"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599082</id>
	<link href="https://www.metafilter.com/200908/Waste-coffee-grounds-make-concrete-30-stronger" rel="alternate" type="text/html"/>
	<title type="html">Waste coffee grounds make concrete 30% stronger</title>
	<summary type="html"><![CDATA[<p>Waste coffee grounds make concrete 30% stronger. Researchers have found that concrete can be made 30...</p>]]></summary>
	<content type="html"><![CDATA[<a href="https://newatlas.com/materials/waste-coffee-grounds-make-concrete-30-percent-stronger/" rel="noopener noreferrer" target="_blank">Waste coffee grounds make concrete 30% stronger</a>. Researchers have found that concrete can be made 30% stronger by replacing a percentage of sand with spent coffee grounds, an organic waste product produced in huge amounts that usually ends up in landfill. The method also reduces the use of natural resources like sand, further contributing to a greener circular economy approach to construction.]]></content>
	<updated>2023-10-03T03:20:17+00:00</updated>
	<author><name>chariot pulled by cassowaries</name></author>
	<source>
		<id>https://www.metafilter.com/</id>
		<link href="https://www.metafilter.com/" rel="self"/>
		<updated>2023-10-03T03:20:17+00:00</updated>
		<title>MetaFilter</title></source>

	<category term="coffee"/>

	<category term="coffeegrounds"/>

	<category term="concrete"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599055</id>
	<link href="https://www.quechoisir.org/actualite-biodechets-les-collectivites-trainent-les-pieds-n111950/" rel="alternate" type="text/html"/>
	<title type="html">Actualité
								 -
							Biodéchets
								 -
							Les collectivités traînent les pieds</title>
	<summary type="html"><![CDATA[<p>Alors que tous les particuliers devraient disposer d&rsquo;une solution pour trier leurs d&eacute;chets organique...</p>]]></summary>
	<content type="html"><![CDATA[<p><img src="https://im.qccdn.fr/node/actualite-biodechets-les-collectivites-trainent-les-pieds-111950/principal-125746.jpg" referrerpolicy="no-referrer" loading="lazy"></p>Alors que tous les particuliers devraient disposer d&rsquo;une solution pour trier leurs d&eacute;chets organiques avant le 1er&nbsp;janvier 2024, la grande majorit&eacute; de la population ne sera pas couverte &agrave; cette &eacute;ch&eacute;ance.]]></content>
	<updated>2023-10-03T01:30:00+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://www.quechoisir.org/</id>
		<link href="https://www.quechoisir.org/" rel="self"/>
		<updated>2023-10-03T01:30:00+00:00</updated>
		<title>Que Choisir</title></source>


	<link href="https://im.qccdn.fr/node/actualite-biodechets-les-collectivites-trainent-les-pieds-111950/listing-125746.jpg" length="1" rel="enclosure" type="image/jpg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599068</id>
	<link href="https://goodtech.info/15-ans-de-duckduckgo-les-choses-a-savoir/" rel="alternate" type="text/html"/>
	<title type="html">15 ans de DuckDuckGo : les choses à savoir</title>
	<summary type="html"><![CDATA[<p>Un article sign&eacute; GOODTECH.info
Voil&agrave; 15 ans que DuckDuckGo d&eacute;fie Google sur le terrain de la recherc...</p>]]></summary>
	<content type="html"><![CDATA[<p>Un article sign&eacute; GOODTECH.info</p>
<p>Voil&agrave; 15 ans que DuckDuckGo d&eacute;fie Google sur le terrain de la recherche en ligne, mais avec un argument de poids : pas question d&rsquo;exploiter vos donn&eacute;es personnelles. R&eacute;cit. Certains l&rsquo;ont adopt&eacute;. D&rsquo;autres simplement test&eacute;. Il se peut aussi que ce nom n&rsquo;&eacute;voque rien pour vous. DuckDuckGo est un moteur de recherche (comme Google et Bing) qui existe depuis 15 ans aujourd&rsquo;hui. Fond&eacute; par Gabriel Weinberg en 2008, il a connu sa premi&egrave;re acc&eacute;l&eacute;ration en 2011. Son si&egrave;ge social est [&hellip;]</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://goodtech.info/15-ans-de-duckduckgo-les-choses-a-savoir/" target="_blank">15 ans de DuckDuckGo : les choses &agrave; savoir</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://goodtech.info" target="_blank">Goodtech Info</a>.</p>]]></content>
	<updated>2023-10-03T01:09:00+00:00</updated>
	<author><name>ecoxx</name></author>
	<source>
		<id>https://goodtech.info/</id>
		<link href="https://goodtech.info/" rel="self"/>
		<updated>2023-10-03T01:09:00+00:00</updated>
		<title>Goodtech Info</title></source>

	<category term="applications"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599045</id>
	<link href="https://goodtech.info/ce-qui-change-avec-itop-3-1-litms-open-source/" rel="alternate" type="text/html"/>
	<title type="html">Ce qui change avec iTop 3.1, l’ITMS open source</title>
	<summary type="html"><![CDATA[<p>Un article sign&eacute; GOODTECH.info
Combodo fait &eacute;voluer sa plateforme open source ITMS et annonce la dis...</p>]]></summary>
	<content type="html"><![CDATA[<p>Un article sign&eacute; GOODTECH.info</p>
<p>Combodo fait &eacute;voluer sa plateforme open source ITMS et annonce la disponibilit&eacute; imm&eacute;diate de la version&nbsp;3.1. C&rsquo;est le point culminant d&rsquo;un chantier de transformation lanc&eacute; en 2020. Combodo iTop est une application (SaaS ou On Premise) destin&eacute;e &agrave; encadrer la complexit&eacute; des infrastructures partag&eacute;es. La solution couvre l&rsquo;ensemble des environnements clients tout en prot&eacute;geant la confidentialit&eacute; n&eacute;cessaire &agrave; chaque organisation. La nouvelle version d&rsquo;iTop&nbsp;3.1, annonc&eacute;e cette semaine, constitue la fin d&rsquo;un grand chantier de modernisation d&eacute;marr&eacute; en avril 2020 apr&egrave;s [&hellip;]</p>
<p>L&rsquo;article <a rel="noopener noreferrer" href="https://goodtech.info/ce-qui-change-avec-itop-3-1-litms-open-source/" target="_blank">Ce qui change avec iTop 3.1, l&rsquo;ITMS open source</a> est apparu en premier sur <a rel="noopener noreferrer" href="https://goodtech.info" target="_blank">Goodtech Info</a>.</p>]]></content>
	<updated>2023-10-02T23:16:00+00:00</updated>
	<author><name>Rédaction</name></author>
	<source>
		<id>https://goodtech.info/</id>
		<link href="https://goodtech.info/" rel="self"/>
		<updated>2023-10-02T23:16:00+00:00</updated>
		<title>Goodtech Info</title></source>

	<category term="applications"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599017</id>
	<link href="https://www.bankinfosecurity.com/eu-lawmaker-questions-csam-proposal-conflicts-interest-a-23204" rel="alternate" type="text/html"/>
	<title type="html">EU Lawmaker Questions CSAM Proposal 'Conflicts of Interest'</title>
	<summary type="html"><![CDATA[<p>LIBE Committee Chair Seeks Clarifications From EU Home Affairs MinisterThe head of a key European Pa...</p>]]></summary>
	<content type="html"><![CDATA[<img src="https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eu-lawmakers-question-csam-proposal-conflicts-interest-imageFile-4-a-23204.jpg" align="right" hspace="4" referrerpolicy="no-referrer" loading="lazy"><b>LIBE Committee Chair Seeks Clarifications From EU Home Affairs Minister</b><br>The head of a key European Parliament committee said he's concerned about media reports suggesting that a proposal mandating that instant messenger apps scan for CSAM was crafted under the influence of an American tech foundation and a nonprofit with ties the British and U.S. government.]]></content>
	<updated>2023-10-03T16:15:19+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://www.bankinfosecurity.com/rssFeeds.php?type=main</id>
		<link href="https://www.bankinfosecurity.com/rssFeeds.php?type=main" rel="self"/>
		<updated>2023-10-03T16:15:19+00:00</updated>
		<title>BankInfoSecurity.com  RSS Syndication</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599019</id>
	<link href="https://uxdesign.cc/how-a-font-website-dishonestly-earns-money-34fa4c2092b4?source=rss----138adf9c44c---4" rel="alternate" type="text/html"/>
	<title type="html">How a font website dishonestly earns money</title>
	<summary type="html"><![CDATA[<p>An examination of Fontesk&rsquo;s deceptive font distribution practices, and how type designers can safegu...</p>]]></summary>
	<content type="html"><![CDATA[<h4><em>An examination of Fontesk&rsquo;s deceptive font distribution practices, and how type designers can safeguard their typographic creations from exploitation.</em></h4><figure><img alt="An illustration of a thief trying to steal a work-in-progress font file from an online repository, to redistribute in their website, and profit from ad placement." src="https://cdn-images-1.medium.com/max/1024/1*-xOeTc7xY5TY3d2wbPRCWg.png" referrerpolicy="no-referrer" loading="lazy"></figure><p>On August 29th of this year, Xiaoyuan Gao from <a href="https://notyourtype.nl/" rel="noopener noreferrer" target="_blank">Not Your Type Foundry</a> posted a <a href="https://www.instagram.com/p/Cwhh-sYMwJZ/?img_index=1" rel="noopener noreferrer" target="_blank">statement</a> on her Instagram addressing the unauthorized use of her font files by a font distribution website. The website in question is <a href="https://fontesk.com/" rel="noopener noreferrer" target="_blank">Fontesk.com</a>, a platform where users can access and download numerous &ldquo;high-quality&rdquo; &ldquo;free fonts for commercial use&rdquo; and &ldquo;open-source fonts.&rdquo;</p><p>In what ways did Fontesk overstep their boundaries in utilising the fonts that Gao had generously uploaded online for&nbsp;free?</p><p>To understand this, we first need to grasp how &ldquo;free fonts&rdquo;&nbsp;work.</p><h3><strong>&lsquo;Free&rsquo; in the absolute&nbsp;sense</strong></h3><p>The fonts obtained from Fontesk differ from those you can find on <a href="https://www.dafont.com/" rel="noopener noreferrer" target="_blank">dafont.com</a>. Why is that? For individuals seeking fonts for business and advertising purposes, there are complications with many of the free fonts available for download on Dafont. Sometimes, these so-called &ldquo;free&rdquo; fonts are merely <a href="https://www.dafont.com/golden-hills.font" rel="noopener noreferrer" target="_blank">samples</a>, offering limited characters, and excluding punctuations and other&nbsp;symbols.</p><p>Font providers typically require payment to access the full character set, and additional charges may apply if you intend to use them in a commercial context, necessitating a license for such&nbsp;usage.</p><p>This is precisely why Fontesk proudly promotes its free fonts as both commercial-free and open-source. Users are not required to purchase costly licenses to employ them in their business endeavours. In the case of open-source fonts, designers can modify these fonts and share them freely with others, allowing for versatile use. This is a level of freedom that many fonts on Dafont and other paid font sites do not allow. It is this significant flexibility in font usage that makes downloading fonts from Fontesk an appealing and cost-effective choice.</p><figure><img alt="An illustration of a fictional download page of a font, stating that it is under the OFL, and it is free for personal and commercial use." src="https://cdn-images-1.medium.com/max/1024/1*VsDnR65QRvsP-GMmeVOPKw.png" referrerpolicy="no-referrer" loading="lazy"></figure><h3><strong>What makes fonts commercial-free and open-source?</strong></h3><p>The majority of these free fonts fall under the <a href="http://scripts.sil.org/ofl" rel="noopener noreferrer" target="_blank">Open Font License</a>* (OFL), which was created by SIL International. This license allows fonts to be used, modified, and distributed freely, as long as the resulting fonts remain under the Open Font License. The only restriction under this license is that users cannot use the same font name if they wish to share their edited version of the font&nbsp;online.</p><p>*<em>It&rsquo;s important to note that type designers also use other font licenses, such as the </em><a href="https://www.apache.org/licenses/LICENSE-2.0.html" rel="noopener noreferrer" target="_blank"><em>Apache</em></a><em> and </em><a href="https://creativecommons.org/about/cclicenses/" rel="noopener noreferrer" target="_blank"><em>Creative Commons</em></a><em> licenses. Users who download fonts should carefully read and identify the specific licenses attached to them to avoid any violations of rights when using these&nbsp;fonts.</em></p><p>The creation of the Open Font License had a significant purpose from the outset. SIL International, a non-profit organization, had several objectives*, one of which was to help document and preserve languages that might be in danger of becoming obsolete while promoting literacy.</p><p><em>*It&rsquo;s worth mentioning that SIL International is affiliated with evangelical Christians and has a mission to increase Bible literacy in support of their missionary activities. Consequently, certain countries, especially those with indigenous communities, have banned SIL International from their territories (</em><a href="https://web.archive.org/web/20061012190742/http://www.oup.co.uk/pdf/0-19-823387-6.pdf" rel="noopener noreferrer" target="_blank"><em>p.&nbsp;182</em></a><em>)</em>.</p><p>Whether the aim is to enhance accessibility to minority languages or simply an act of generosity, many typographers have chosen to use the OFL for their fonts, making them available online for others to freely use in their projects. Given this context, one might wonder why Xiaoyuan Gao is upset with the way Fontesk is handling her font&nbsp;files.</p><figure><img alt="An illustration of a fictional online repository page featuring a font file, with a documentation, stating it&rsquo;s a &ldquo;work-in-progress&rdquo; and not for publishing on any websites." src="https://cdn-images-1.medium.com/max/1024/1*ChsfYH0APHIugBzZMNZbbg.png" referrerpolicy="no-referrer" loading="lazy"></figure><h3><strong>It wasn&rsquo;t done&nbsp;yet</strong></h3><p>Gao intends to release her fonts through the Velvetyne type foundry in the near future. Therefore, when Fontesk published her fonts on their site before the official announcement, they were still a work in progress and were not yet meant for public&nbsp;release.</p><p>These files, which are still under development, are stored on a cloud-based service called GitHub. Many open-source software developers, including typographers, use <a href="https://github.com/" rel="noopener noreferrer" target="_blank">GitHub</a> or <a href="https://about.gitlab.com/" rel="noopener noreferrer" target="_blank">GitLab</a> to store, track, and collaborate on various software projects, such as fonts. This sort of collaboration was true of Velvetyne and Gao&rsquo;s font&nbsp;project.</p><p>During our email interview, she further explained, &ldquo;Putting OFL projects on GitHub doesn&rsquo;t mean anyone can just take it for granted. Fontesk never contacted me about what they are planning to do with my&nbsp;files.</p><p>There is a &ldquo;READ.ME&rdquo; file in my Github repository&#8202;&mdash;&#8202;which clearly mentions my font will be published at Velvetyne Type Foundry, and normal people will at least check if the font is released or not before doing anything with&nbsp;it.&rdquo;</p><figure><img alt="A portion of the first illustration in this article, showing a thief plotting and redistributing a work-in-progress font unethically." src="https://cdn-images-1.medium.com/max/1024/1*lK_w7GxjqLhqlH35aaKxDg.png" referrerpolicy="no-referrer" loading="lazy"></figure><h3><strong>Is Fontesk at&nbsp;fault?</strong></h3><p>While the fonts themselves are open-source and can be redistributed, Fontesk ignored Gao&rsquo;s specified publishing conditions and proceeded to release her work prematurely on their platform without her knowledge.</p><p>While Fontesk has made efforts to provide attribution to the type designers on their website, three other aspects of their font distribution practices raise questions:</p><h4>Font quality</h4><p>The in-progress font files that Gao and other users have on GitHub/GitLab are stored <a href="https://github.com/topics/typeface" rel="noopener noreferrer" target="_blank">publicly</a>. Fontesk takes advantage of this by searching for fonts in these public repositories, extracting them, and reuploading them to their&nbsp;website.</p><p>With this approach, can Fontesk still claim that their curated fonts are of &ldquo;high quality&rdquo; when they are essentially using people&rsquo;s unfinished work for publication?</p><p>By offering these fonts for download and regular use online, Fontesk not only puts their reputation at risk but also jeopardises the reputation of the type designers. Users may encounter certain bugs or unfinished character sets and express their dissatisfaction. They may attribute the subpar font quality to poor production, when, in reality, the typographer has not yet completed the font&nbsp;project.</p><h4>Ad placements</h4><p>The OFL prohibits users from obtaining fonts and selling them for profit. However, Fontesk incorporates ads on their web pages. Consequently, whenever individuals visit their website to download fonts and encounter these ads, Fontesk receives compensation from the advertising agency based on web page viewership.</p><p>Needless to say, Gao wasn&rsquo;t impressed. She stated, &ldquo;Fontesk just steals people&rsquo;s work because they can&hellip; I think they are very aware of their dirty business; there are tons [of ads on their website] so that they can make money out of people&rsquo;s&nbsp;work.&rdquo;</p><p>By earning from people&rsquo;s work (including mine!) through ads, Fontesk&rsquo;s website is built on the backs of countless hardworking typographers who were exploited without their knowledge. Gao adds, &ldquo;As a type designer and owner of a type foundry, taking and publishing people&rsquo;s open-source type design projects without asking permission from the creators is so messed up and way too disrespectful. I would never do that because respecting people&rsquo;s hard work is the bare minimum.&rdquo;</p><h4>Their hostile&nbsp;reaction</h4><p>Upon discovering Fontesk&rsquo;s actions and requesting the removal of her font files, Gao was met with a <a href="https://typo.social/@velvetyne@mamot.fr/110977402290088660" rel="noopener noreferrer" target="_blank">resolute refusal</a>, and they even went so far as to block her IP address from accessing their&nbsp;website.</p><p>Although they eventually removed her fonts (the specific font download page is now inaccessible), their handling of the situation has been nothing short of discourteous. Not only did they release unfinished fonts without the designer&rsquo;s consent, but they also chose to be less than transparent with Gao and displayed disrespect by attempting to keep her fonts available on their&nbsp;site.</p><p>This further tarnishes their reputation as a font distributor. One can only wonder how many fonts they may have clandestinely acquired without the knowledge or permission of the typographers, all to discreetly profit from&nbsp;them.</p><figure><img alt="An illustration of a fictional pop-up on a website, requiring users to sign up for a premium membership to download more fonts, or to continue downloading free by watching ads." src="https://cdn-images-1.medium.com/max/1024/1*Km41rosABPPRJoLqwBi9tw.png" referrerpolicy="no-referrer" loading="lazy"></figure><h3><strong>A bigger&nbsp;issue</strong></h3><p>In the broader context, Fontesk is just one among several questionable font websites engaging in more serious infractions. For instance, there&rsquo;s <a href="https://eng.fontke.com/user/?m=Misc&amp;a=groups&amp;do=svip" rel="noopener noreferrer" target="_blank">FontKe</a>, a font distribution site based in China, which permits users to <a href="https://www.youtube.com/watch?v=pT_mJ0HsOzo" rel="noopener noreferrer" target="_blank">download</a> only one free font from their server before requiring them to <a href="https://eng.fontke.com/user/?m=Misc&amp;a=groups&amp;do=svip" rel="noopener noreferrer" target="_blank">pay</a> for memberships and virtual currency to access additional fonts, including those intended to be open-source or non-redistributable from their original&nbsp;source.</p><p>To compound the issue, FontKe does not take the initiative to provide proper attribution and licenses for each of these fonts, something that any reputable font retailer or distributor would have done and displayed upfront. Instead, they expect users to independently seek out individual font licenses, and they claim innocence if users inadvertently violate font usage&nbsp;rights.</p><p>Furthermore, they have a quotation form for users to inquire about the pricing of font licenses, even for fonts that should already be attributed to the OFL. I attempted to request a quote for one of their free, open-source fonts, but I received no response from them, casting doubt even on this aspect of their&nbsp;service.</p><figure><img alt="An illustration of a font file being in front of a shield, which blocks users from accessing the font for unehtical use." src="https://cdn-images-1.medium.com/max/1024/1*N8ozCgpfoowmx6-kfc6EMA.png" referrerpolicy="no-referrer" loading="lazy"></figure><h3><strong>What can designers do to protect their&nbsp;fonts?</strong></h3><p>Recognizing that the OFL is written in a way that can be <a href="https://typo.social/@ltlnx@g0v.social/110979651646387367" rel="noopener noreferrer" target="_blank">easily exploited</a>, type designers can first opt to create their own written agreements, often referred to as End User License Agreements (<a href="https://www.iubenda.com/en/help/22363-what-is-an-eula" rel="noopener noreferrer" target="_blank">EULA</a>s) that users must adhere to.* This can help prevent the misuse of their fonts. The agreement may include <a href="https://typo.social/@drj/110983432696785111" rel="noopener noreferrer" target="_blank">restrictions</a> on redistributing the fonts on other websites, even if modifications have been made. Designers can also use this opportunity to incorporate clauses in their agreements to provide additional <a href="https://eyeondesign.aiga.org/some-type-foundries-want-to-restrict-usage-of-their-fonts-on-ethical-grounds-will-it-work/" rel="noopener noreferrer" target="_blank">safeguards</a> against unethical practices, such as hate&nbsp;speech.</p><p>*<em>To learn more about what designers can and should do regarding EULAs, you can find additional information in my other essay&nbsp;</em><a href="https://uxdesign.cc/font-agreements-are-messy-33b6c1204efa" rel="noopener noreferrer" target="_blank"><em>here</em></a><em>.</em></p><p>Of course, no amount of agreements can completely prevent thieves from attempting to illegally profit from the fonts of hardworking typographers. Fortunately, with a strong online presence, Gao was able to utilise her network and social media to expose Fontesk&rsquo;s unethical practices and safeguard her&nbsp;work.</p><p>Many artists have also turned to social media to shed light on companies misusing their artwork for profit. Artists on Twitter <a href="https://fortune.com/2019/12/06/we-committed-copyright-infringement-and-want-to-be-sued-by-disney/" rel="noopener noreferrer" target="_blank">discovered</a> that bots were taking people&rsquo;s artwork from the platform and selling it on T-shirts. To combat this, users created copyright-infringing art to lure these bots into extracting the images, intending to sell them as printed T-shirts on their websites. This tactic worked, prompting distributors to promptly remove these listings to avoid legal repercussions.</p><p>Unfortunately, the battle against such thefts remains an ongoing challenge. In cases like these, it&rsquo;s crucial for artists of all backgrounds, whether established or emerging, to continue supporting one another by exposing and taking action against unscrupulous websites that seek to profit from illicit&nbsp;means.</p><figure><img alt="Some screenshots from the homepage of type foundry, Etcetera Type Company." src="https://cdn-images-1.medium.com/max/1024/1*j0YmDAwD0bfKan3wSHmkOw.png" referrerpolicy="no-referrer" loading="lazy"><figcaption><a href="https://etceteratype.co/" rel="noopener noreferrer" target="_blank">Etcetera Type Company</a> is an open-source type foundry offering high-quality, free fonts. (Image has been recoloured to fit the article&rsquo;s colour&nbsp;theme.)</figcaption></figure><h3><strong>Reputable distributors</strong></h3><p>We can also take steps to ensure the fonts we use in our projects are sourced responsibly. It&rsquo;s a good practice to verify whether the fonts we intend to use are obtained from reputable websites and if their licenses align with our specific use cases before incorporating them.</p><p>Whether you&rsquo;re in search of free/open-source fonts or even paid ones, it&rsquo;s always advisable to seek out the original websites that host these fonts. This is crucial because legitimate font distributors provide the proper licenses and usage conditions, which illegal distributors may attempt to omit or modify in their&nbsp;files.</p><p>The founders of an open-source type foundry, <a href="https://deathoftypography.com/" rel="noopener noreferrer" target="_blank">Death of Typography</a>, have thoughtfully compiled a list of reputable font distribution websites offering high-quality fonts, including some that are open-source. You can access the list <a href="https://docs.google.com/document/d/1atX4m2gUaTTY5pwbEE4oCWbxwFwcR_sd1_6Q9C6kXVE/edit" rel="noopener noreferrer" target="_blank">here</a>. Many thanks to Yen for this valuable curation!</p><p>If you have any other reputable free font websites to recommend, please do share them in the comments. Additionally, consider showing your support by expressing gratitude to the type foundries and designers through their social media channels. After all, they are creating and sharing these fonts generously from the&nbsp;heart!</p><figure><img alt="A screenshot of type foundry, Grilli Type&rsquo;s homepage." src="https://cdn-images-1.medium.com/max/1024/1*cfmspu3gNmT-rnJ5HRh3Cw.png" referrerpolicy="no-referrer" loading="lazy"><figcaption><a href="https://www.grillitype.com/" rel="noopener noreferrer" target="_blank">Grilli Type</a> is an independent Swiss type foundry offering in-house fonts, with some typefaces created over several years before release. Various license prices are offered upfront before purchase. (Image has been recoloured to fit the article&rsquo;s colour&nbsp;theme.)</figcaption></figure><h3><strong>Paying for&nbsp;fonts</strong></h3><p>As I mentioned in my <a href="https://medium.com/user-experience-design-1/lets-explore-the-free-font-index-ab8005915018" rel="noopener noreferrer" target="_blank">review</a> of the Free Font Index, open-source fonts play a crucial role in preserving the written works of linguistic communities that are often overlooked. They also encourage aspiring typographers to learn by reverse-engineering these fonts, making high-quality typemaking accessible to everyone.</p><p>However, these positive contributions can only continue if there is sufficient funding to archive and maintain these fonts online, as the people behind them also need to earn a living. Whenever possible, consider paying for fonts to support the field of typography. Paid font licenses are priced the way they are because it can take days, or even <a href="https://www.gt-zirkon.com/" rel="noopener noreferrer" target="_blank"><strong>years</strong></a>, for type foundries to create complete character sets and font families, making them ideal for use in your documents and design projects.</p><p>This commitment to quality can also be observed in how professional type foundries* present font specimens and allow users to test their fonts directly on their websites. To enhance the user experience during font testing, professional websites often choose not to include ads to avoid distractions or quietly earn from your visit before you decide to make a purchase.</p><p><em>*There is a difference between certain type foundries and online font retailers in how they operate and pay type designers. As a rule of thumb, it is always better to support independent type foundries than commercial moguls (like Monotype, who owns MyFonts).</em></p><p><em>If you would like more information regarding this, please feel free to let me know in the comments and I may write an article about it in the&nbsp;future.</em></p><figure><img alt="An illustration of multiple 3D visual interpretations of font files, stacked together in various piles and sizes." src="https://cdn-images-1.medium.com/max/1024/1*EgFd_9XAFVPrypf8lXc1hA.png" referrerpolicy="no-referrer" loading="lazy"></figure><p>We&rsquo;re grateful for the increasing accessibility of high-quality, free fonts online. It&rsquo;s thanks to the efforts of type designers that platforms like <a href="https://canva.com/" rel="noopener noreferrer" target="_blank">Canva</a> and <a href="http://docs.google.com" rel="noopener noreferrer" target="_blank">Google Docs</a> can offer a wider selection of&nbsp;fonts.</p><p>However, this accessibility comes with the responsibility for all of us to use these fonts ethically and not take advantage of the kindness of others, as seen in Fontesk&rsquo;s treatment of Gao&rsquo;s work. Let&rsquo;s support the proper use of free and open-source fonts by downloading them from official sources and giving professional type design the respect it deserves.</p><img src="https://medium.com/_/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=34fa4c2092b4" alt="" referrerpolicy="no-referrer" loading="lazy"><hr><p><a href="https://uxdesign.cc/how-a-font-website-dishonestly-earns-money-34fa4c2092b4" rel="noopener noreferrer" target="_blank">How a font website dishonestly earns money</a> was originally published in <a href="https://uxdesign.cc" rel="noopener noreferrer" target="_blank">UX Collective</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content>
	<updated>2023-10-02T22:48:35+00:00</updated>
	<author><name>Faux Icing</name></author>
	<source>
		<id>https://uxdesign.cc?source=rss----138adf9c44c---4</id>
		<link href="https://uxdesign.cc?source=rss----138adf9c44c---4" rel="self"/>
		<updated>2023-10-02T22:48:35+00:00</updated>
		<title>UX Collective - Medium</title></source>

	<category term="design"/>

	<category term="graphic-design"/>

	<category term="typography"/>

	<category term="ui"/>

	<category term="ux"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599014</id>
	<link href="https://www.bleepingcomputer.com/news/security/microsoft-defender-no-longer-flags-tor-browser-as-malware/" rel="alternate" type="text/html"/>
	<title type="html">Microsoft Defender no longer flags Tor Browser as malware</title>
	<summary type="html"><![CDATA[<p>For Windows users who frequently use the TorBrowser, there's been a pressing concern. Recent version...</p>]]></summary>
	<content type="html"><![CDATA[<p>For Windows users who frequently use the TorBrowser, there's been a pressing concern. Recent versions of the TorBrowser, specifically because of the tor.exe file it contained, were being flagged as potential threats by Windows Defender. [...]</p>]]></content>
	<updated>2023-10-02T22:33:17+00:00</updated>
	<author><name>Mayank Parmar</name></author>
	<source>
		<id>https://www.bleepingcomputer.com/</id>
		<link href="https://www.bleepingcomputer.com/" rel="self"/>
		<updated>2023-10-02T22:33:17+00:00</updated>
		<title>BleepingComputer</title></source>

	<category term="security"/>

	<category term="software"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599004</id>
	<link href="https://chriscoyier.net/2023/10/02/dan-mall-answers-to-common-design-questions/" rel="alternate" type="text/html"/>
	<title type="html">Dan Mall — Answers to Common Design Questions</title>
	<summary type="html"><![CDATA[<p>Dave, on ShopTalk Show lately, has been in favor of reducing nuance when it comes to discussing and...</p>]]></summary>
	<content type="html"><![CDATA[<p><a href="https://daverupert.com/" rel="noopener noreferrer" target="_blank">Dave</a>, on <a href="https://shoptalkshow.com/" rel="noopener noreferrer" target="_blank">ShopTalk</a> Show lately, has been in favor of <em>reducing nuance</em> when it comes to discussing and deciding on web stuff. Do this. No, don&rsquo;t use that. Put this here. There is already so much <em>it depends</em> stuff, you can get lost. Can we get some answers around here, please?</p>



<p>That&rsquo;s a reason I love Dan&rsquo;s <a href="https://danmall.com/posts/answers-to-common-design-questions/" rel="noopener noreferrer" target="_blank">recent answers</a>. </p>



<blockquote>
<p><strong>What colors should go in my color palette?</strong></p>



<p>Black, white, and one strong accent color.</p>
</blockquote>



<p>Zero nuance. Just answers. </p>]]></content>
	<updated>2023-10-02T22:32:13+00:00</updated>
	<author><name>Chris Coyier</name></author>
	<source>
		<id>https://chriscoyier.net/</id>
		<link href="https://chriscoyier.net/" rel="self"/>
		<updated>2023-10-02T22:32:13+00:00</updated>
		<title>Chris Coyier</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598989</id>
	<link href="https://geoffgraham.me/the-csswg-adopted-a-new-css-form-sizing-property/" rel="alternate" type="text/html"/>
	<title type="html">The CSSWG adopted a new CSS form-sizing property</title>
	<summary type="html"><![CDATA[<p>It aims to solve the age-old frustration of running out of room when typing in a &lt;textarea&gt; e...</p>]]></summary>
	<content type="html"><![CDATA[<div>
<p>It aims to solve the age-old frustration of running out of room when typing in a <code>&lt;textarea&gt;</code> element. We can already set the number of rows in a <code>&lt;textarea&gt;</code> directly in HTML:</p>



<pre><code>&lt;textarea rows="10"&gt;</code></pre>



<p>Setting the initial size isn&rsquo;t the issue, but what happens after the user has reached that threshold. It&rsquo;s at that point where any text entered into the element that goes beyond that 10 rows starts cutting off text at the top.</p>



<figure><video controls src="https://geoffgraham.me/wp-content/uploads/textarea-height.mov" playsinline></video></figure>



<p>We might go so far as to consider this to be a form of <a href="https://www.smashingmagazine.com/2019/09/overflow-data-loss-css/" rel="noopener noreferrer" target="_blank">CSS data loss</a>.</p>



<p>That&rsquo;s what the proposal for a new <code>form-sizing</code> property is all about, which the <a href="https://github.com/w3c/csswg-drafts/issues/7542#issuecomment-1542505774" rel="noopener noreferrer" target="_blank">CSSWG approved back on May 10, 2023</a>. The idea is that we can opt into textareas that are automatically sized by the content they contain:</p>



<pre><code>/* Adjust sizing to content */
textarea { form-sizing: auto; }

/* Normal behavior */
textarea { form-sizing: normal; }</code></pre>



<p>Chrome appears to be the only browser <a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1447058&amp;q=form-sizing&amp;can=2" rel="noopener noreferrer" target="_blank">currently working on the new property</a>, at least in Chrome Canary. There&rsquo;s a <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1832409" rel="noopener noreferrer" target="_blank">quiet ticket</a> in Firefox, and nada that I could find in WebKit. Does that mean I&rsquo;m obligated to file it?</p>



<div>
<div><a href="https://www.amitmerchant.com/textarea-auto-increase-height/" rel="noopener noreferrer" target="_blank">Source</a></div>
</div>
</div>]]></content>
	<updated>2023-10-02T22:20:38+00:00</updated>
	<author><name>Geoff Graham</name></author>
	<source>
		<id>https://geoffgraham.me</id>
		<link href="https://geoffgraham.me" rel="self"/>
		<updated>2023-10-02T22:20:38+00:00</updated>
		<title>Geoff Graham</title></source>

	<category term="css"/>

	<category term="til"/>


	<link href="https://geoffgraham.me/wp-content/uploads/textarea-height.mov" length="2095846" rel="enclosure" type="video/quicktime"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598996</id>
	<link href="https://www.hackread.com/fortiguard-labs-malicious-npm-packages-steal-data/" rel="alternate" type="text/html"/>
	<title type="html">FortiGuard Labs Uncovers Series of Malicious NPM Packages Stealing Data</title>
	<summary type="html"><![CDATA[<p>By Waqas
There are over 17 million developers worldwide who use NPM packages, making it a lucrative ...</p>]]></summary>
	<content type="html"><![CDATA[<p>By <a rel="noopener noreferrer" href="https://www.hackread.com/author/hackread/" target="_blank">Waqas</a></p>
<p>There are over 17 million developers worldwide who use NPM packages, making it a lucrative target for cybercriminals.</p>
<p>This is a post from HackRead.com Read the original post: <a rel="noopener noreferrer" href="https://www.hackread.com/fortiguard-labs-malicious-npm-packages-steal-data/" target="_blank">FortiGuard Labs Uncovers Series of Malicious NPM Packages Stealing Data</a></p>]]></content>
	<updated>2023-10-02T21:54:29+00:00</updated>
	<author><name>Waqas</name></author>
	<source>
		<id>https://www.hackread.com</id>
		<link href="https://www.hackread.com" rel="self"/>
		<updated>2023-10-02T21:54:29+00:00</updated>
		<title>Hackread – Latest Cybersecurity News, Press Releases &amp; Technology Today</title></source>

	<category term="cybersecurity"/>

	<category term="javascript"/>

	<category term="malware"/>

	<category term="npm"/>

	<category term="pypi"/>

	<category term="security"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598971</id>
	<link href="https://go.theregister.com/feed/www.theregister.com/2023/10/02/tom_hanks_ai_advert/" rel="alternate" type="text/html"/>
	<title type="html">Fuming Tom Hanks says he had nothing to do with that AI dental ad clone of him</title>
	<summary type="html"><![CDATA[<p>I'm not a smart man, but I know it should be cast away Updated&nbsp; A dental healthcare advert f...</p>]]></summary>
	<content type="html"><![CDATA[<h4>I'm not a smart man, but I know it should be cast away</h4> <p><strong>Updated</strong>&nbsp; A dental healthcare advert featuring what looks like a younger Tom Hanks dressed in a black suit is fake and AI-generated, the Forrest Gump actor has warned.&hellip;</p> <p><!--#include virtual='/data_centre/_whitepaper_textlinks_top.html' --></p>]]></content>
	<updated>2023-10-03T23:23:11+00:00</updated>
	<author><name>Katyanna Quach</name></author>
	<source>
		<id>https://www.theregister.com/</id>
		<link href="https://www.theregister.com/" rel="self"/>
		<updated>2023-10-03T23:23:11+00:00</updated>
		<title>The Register</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598982</id>
	<link href="https://www.freecodecamp.org/news/guide-to-a-successful-open-source-journey/" rel="alternate" type="text/html"/>
	<title type="html">A Guide to a Successful Open Source Journey – Lessons from Real-Life Experience</title>
	<summary type="html"><![CDATA[<p>The journey to becoming a successful open-source contributor can be intimidati...</p>]]></summary>
	<content type="html"><![CDATA[<p>The journey to becoming a successful open-source contributor can be intimidating, frustrating, or confusing depending on your level of confidence, commitment, and expertise. I have had my fair share of all sides of the emotions that come with contributing to open source in the one and a half years (at</p>]]></content>
	<updated>2023-10-02T20:07:51+00:00</updated>
	<author><name>kaxada</name></author>
	<source>
		<id>https://www.freecodecamp.org/news/</id>
		<link href="https://www.freecodecamp.org/news/" rel="self"/>
		<updated>2023-10-02T20:07:51+00:00</updated>
		<title>freeCodeCamp.org</title></source>

	<category term="open source"/>


	<link href="https://www.freecodecamp.org/news/content/images/2023/10/cover-image.jpg" length="1" rel="enclosure" type="image/generic"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/599037</id>
	<link href="https://hackernoon.com/prompt-engineering-understanding-the-potential-of-large-language-models?source=rss" rel="alternate" type="text/html"/>
	<title type="html">Prompt Engineering: Understanding the Potential of Large Language Models</title>
	<summary type="html"><![CDATA[<p>\
Whether you're a developer integrating AI into your software or a no-coder, marketer, or business ...</p>]]></summary>
	<content type="html"><![CDATA[<p>\
Whether you're a developer integrating <a href="https://hackernoon.com/c/ai" rel="noopener noreferrer" target="_blank">AI</a> into your software or a no-coder, marketer, or business analyst adopting AI, prompt engineering is a MUST-HAVE skill that we need to acquire.</p>
<p>In the following video, Andrej Karpathy, one of the well-known prominent figures in AI, gives a golden lesson on prompt engineering:</p>
<p><a href="https://youtu.be/bZQun8Y4L2A?si=jg6Da4jT05Nn2VbE&amp;embedable=true" rel="noopener noreferrer" target="_blank">https://youtu.be/bZQun8Y4L2A?si=jg6Da4jT05Nn2VbE&amp;embedable=true</a></p>
<p>\
We all use <a href="https://hackernoon.com/microsoft-proposes-morality-test-for-llms-is-ai-on-the-naughty-or-nice-list" rel="noopener noreferrer" target="_blank">LLMs</a> like ChatGPT, Claude, or Llama to generate human-like text and assist in a wide range of tasks, from answering questions to generating creative content.</p>
<p>\
However, to effectively use these models, it is crucial to understand the process of training them and how to prompt them to achieve the desired results.</p>
<p>\
In this post, I will give you various techniques to harness the full potential of large language models that I have learned from Andrej&rsquo;s speech.</p>
<p>\</p>
<h2>Training Large Language Models</h2>
<p>The training process of large language models like GPT involves several stages;
1- Pre-training
2- Supervised fine-tuning
3- Reward modeling
4- Reinforcement learning.</p>
<p>\
<strong>Pre-training</strong> is the initial stage where the model is trained on a vast amount of data, including web scrapes, and high-quality datasets like HuggingFace, Github, Wikipedia, books, and more. The data is preprocessed to convert it into a suitable format for training the neural network.</p>
<p>\
Pre-training, the model predicts the next token in a sequence. This process is repeated for numerous tokens, enabling the model to learn the underlying patterns and structures of the language. The resulting model has billions of parameters (1T GPT-4, 176B GPT-3, 130B Claude-2, 7B, 13B, and 70B Llama-2), making it a powerful tool for various tasks.</p>
<p>\
<strong>Supervised fine-tuning</strong> is the next stage, where the model is trained on specific datasets with labeled examples. Humans behind computers gather data in the form of prompts and ideal responses, creating a training set for the model. The model is trained to generate appropriate responses based on the given prompts. This fine-tuning process helps the model specialize in specific tasks.</p>
<p>\
<strong>Reward modeling and reinforcement learning</strong> are additional stages that can be applied to further improve the model's performance. In reward modeling, the model is trained to predict the quality of different completions for a given prompt. This allows the model to learn which completions are more desirable and helps in generating high-quality responses. Reinforcement learning involves training the model with respect to a reward model, refining its language generation capabilities.</p>
<p>\</p>
<h2>Effective Prompt Engineering Techniques</h2>
<p>Prompt engineering plays a crucial role in effectively utilizing large language models. Here are some techniques that can enhance the performance and control the output of these models:</p>
<p>\</p>
<ol>
<li><p><strong>==Task-Relevant Prompts:==</strong> When prompting the model, ensure that the prompts are task-relevant and include clear instructions. Think about how those humans behind the computer contractor would approach the task and provide prompts accordingly. Including relevant instructions helps guide the model's response.</p>
<p>\</p></li>
<li><p><strong>==Retrieval-Augmented Generation:==</strong> Incorporate relevant context and information into the prompts. By retrieving and adding context from external sources, such as documents or databases, you can enhance the model's understanding and generate more accurate responses. This technique allows the model to leverage external knowledge effectively.</p>
<p>\</p></li>
<li><p><strong>==Few-Shot Learning:==</strong> Provide a few examples of the desired output to guide the model's response. By showing the model a few examples of the expected output, you can help it understand the desired format and generate more accurate responses. This technique is particularly useful when dealing with specific formats or templates.</p>
<p>\</p></li>
<li><p><strong>==System 2 Thinking:==</strong> System 2 thinking involves deliberate planning and reasoning. Break down complex tasks into smaller steps and prompt the model accordingly. This approach helps the model to reason step-by-step and generate more accurate and coherent responses.</p>
<p>\</p></li>
<li><p><strong>==Constraint Prompting:==</strong> Use constraint prompting to enforce specific templates or formats in the model's output. By reducing the probabilities of specific tokens, you can guide the model to fill in the blanks according to the desired format. This technique ensures that the model adheres to specific constraints while generating responses.</p>
<p>\</p></li>
<li><p><strong>==Fine-Tuning:==</strong> Fine-tuning the model can further enhance its performance for specific tasks. By training the model on task-specific datasets, you can specialize its language generation capabilities. However, fine-tuning requires careful consideration and expertise, as it involves complex data pipelines and may slow down the training process.</p></li>
</ol>
<p>\
Finally, it is important to consider the limitations and potential biases of these models. They may generate false information, make reasoning errors, or be susceptible to various attacks. Therefore, it is advisable to use them with human oversight and treat them as sources of suggestions rather than completely autonomous systems.</p>
<p>\
Prompt engineering is a crucial aspect of effectively utilizing large language models.</p>
<p>Andrej's Microsoft Developer Conference video is a great source for understanding the overall sight of LLMs. </p>
<p>\</p>
<p>:::info
Also published <a href="https://twitter.com/youraimarketer/status/1700278999144870142?s=20" rel="noopener noreferrer" target="_blank">here.</a> </p>
<p>:::</p>
<p>\</p>]]></content>
	<updated>2023-10-02T19:02:47+00:00</updated>
	<author><name>Muratcan Koylan</name></author>
	<source>
		<id>https://hackernoon.com</id>
		<link href="https://hackernoon.com" rel="self"/>
		<updated>2023-10-02T19:02:47+00:00</updated>
		<title>Hacker Noon</title></source>

	<category term="ai-prompts"/>

	<category term="chatgpt"/>

	<category term="few-shot-learning"/>

	<category term="generative-ai"/>

	<category term="openai"/>

	<category term="prompt-engineering"/>

	<category term="retrieval-augmented-generation"/>

	<category term="system-2-thinking"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598936</id>
	<link href="https://chriscoyier.net/2023/10/02/kagi-small-web/" rel="alternate" type="text/html"/>
	<title type="html">Kagi Small Web</title>
	<summary type="html"><![CDATA[<p>I&rsquo;ve been clicking the Next Post button on Kagi Small Web quite a bit. 



It&rsquo;s like th...</p>]]></summary>
	<content type="html"><![CDATA[<p>I&rsquo;ve been clicking the <strong>Next Post</strong> button on <a href="https://kagi.com/smallweb/" rel="noopener noreferrer" target="_blank">Kagi Small Web</a> quite a bit. </p>



<p>It&rsquo;s like the StumbleUpon of yore (a &ldquo;bar&rdquo; across the top and randomized <code>&lt;iframe&gt;</code>d websites below) except all the websites it brings you to are people&rsquo;s personal blogs. </p>



<p>It&rsquo;s just a charming experience because you land on websites that you&rsquo;d very likely never land on, but can be entirely interesting. <a href="https://front-end.social/@chriscoyier/111092070860520200" rel="noopener noreferrer" target="_blank">It&rsquo;s true.</a></p>



<figure><a href="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39%E2%80%AFAM.png?ssl=1" rel="noopener noreferrer" target="_blank"><img decoding="async" fetchpriority="high" src="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39%E2%80%AFAM.png?resize=1024%2C759&amp;ssl=1" alt="" srcset="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=1024%2C759&amp;ssl=1 1024w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=300%2C222&amp;ssl=1 300w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=768%2C569&amp;ssl=1 768w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=1536%2C1139&amp;ssl=1 1536w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=2048%2C1518&amp;ssl=1 2048w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=1024%2C759&amp;ssl=1 1024w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=300%2C222&amp;ssl=1 300w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=768%2C569&amp;ssl=1 768w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=1536%2C1139&amp;ssl=1 1536w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/Screenshot-2023-10-02-at-11.48.39&#8239;AM.png?resize=2048%2C1518&amp;ssl=1 2048w" sizes="(max-width: 1000px) 100vw, 1000px" referrerpolicy="no-referrer" loading="lazy"></a></figure>



<p>Collection of thoughts!</p>



<hr>



<p>Some people&rsquo;s sites don&rsquo;t take kindly to being iframed. Some will try to break out of it. Some will just refuse to load. </p>


<div>
<figure><a href="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07%E2%80%AFPM.png?ssl=1" rel="noopener noreferrer" target="_blank"><img decoding="async" src="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07%E2%80%AFPM.png?resize=405%2C222&amp;ssl=1" alt="" srcset="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=1024%2C561&amp;ssl=1 1024w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=300%2C164&amp;ssl=1 300w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=768%2C421&amp;ssl=1 768w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=1536%2C842&amp;ssl=1 1536w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=2048%2C1123&amp;ssl=1 2048w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=1024%2C561&amp;ssl=1 1024w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=300%2C164&amp;ssl=1 300w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=768%2C421&amp;ssl=1 768w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=1536%2C842&amp;ssl=1 1536w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/09/Screenshot-2023-09-30-at-2.53.07&#8239;PM.png?resize=2048%2C1123&amp;ssl=1 2048w" sizes="(max-width: 405px) 100vw, 405px" referrerpolicy="no-referrer" loading="lazy"></a></figure></div>


<p>I suspect a lot of people don&rsquo;t even know that about their own site, it&rsquo;s something imposed by the host. If I had to guess why, it&rsquo;s because there is this security concern called &ldquo;clickjacking&rdquo;. If a site is allowed to be iframed, technically, someone could position like hidden inputs directly over inputs on the site and it could <em>look </em>like you are entering information on the real website but are really giving data to a nefarious website. The only way around it is to prevent iframing at all. </p>



<hr>



<p>The fact that the site you&rsquo;re looking at is iframed means you can&rsquo;t just copy the URL quick, in case you&rsquo;re trying to share or bookmark it or whatever. It&rsquo;s not impossible, you just click the URL and it pops you out, but then you&rsquo;ve kinda <em>left the flow</em>.</p>



<p>It&rsquo;s not just the sharing that has a &ldquo;breaks the web&rdquo; feeling, it&rsquo;s the back and forward buttons too. If you leave a site without meaning to, you ain&rsquo;t finding it again. It&rsquo;s not in your browsing history, you can&rsquo;t press &ldquo;back&rdquo; to get back there, and there is nothing saved to your Kagi account or anything, which I suspect is partially because this is an MVP thing and partially because I think Kagi is privacy focused and saving user data opens up a can of worms there. </p>



<hr>



<p>All the awkwardness with iframes makes me think that this thing shouldn&rsquo;t be iframing at all. My opinion is that it should be a browser extension, which takes you right to the sites directly. The browser extension could offer the same options/controls. I think anyway! Have you seen <a href="https://developer.chrome.com/docs/extensions/reference/sidePanel/" rel="noopener noreferrer" target="_blank">the sidePanel API</a>? (<a href="https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/sidebarAction" rel="noopener noreferrer" target="_blank">sidebarAction</a> on Firefox, unclear what Safari offers) I think that might be the ticket to get persistent UI while using it.</p>



<figure><a href="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?ssl=1" rel="noopener noreferrer" target="_blank"><img decoding="async" src="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?resize=375%2C470&amp;ssl=1" alt="" srcset="https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?w=582&amp;ssl=1 582w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?resize=240%2C300&amp;ssl=1 240w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?w=582&amp;ssl=1 582w,https://i0.wp.com/chriscoyier.net/wp-content/uploads/2023/10/sidepanel.png?resize=240%2C300&amp;ssl=1 240w" sizes="(max-width: 375px) 100vw, 375px" referrerpolicy="no-referrer" loading="lazy"></a></figure>



<p>I know <a href="https://www.tango.us/" rel="noopener noreferrer" target="_blank">Tango</a> was eyeing up side panels highly because their extension would benefit highly from it, but ultimately went with a popup window (probably for browser consistency?).</p>



<hr>



<p>There is an &ldquo;Appreciate&rdquo; button and a &ldquo;Leave a Note&rdquo; button. I like the idea! I don&rsquo;t totally understand how they work. I&rsquo;ve used both, but:</p>



<ol>
<li>I&rsquo;ve never come across a site that had either, I don&rsquo;t think.</li>



<li>I&rsquo;m not entirely sure what happens when <em>I </em>use them.</li>
</ol>



<p>I suspect when other people come across that same site, it&rsquo;ll have a number listed if other people appreciated it, but again I&rsquo;ve never seen that, nor a note left. If the notes are just sitting there, that also feels weird, because allowing people to leave anonymous messages on the internet is just something that never ends well. </p>



<p>Poking around a little, I see they did mention it <a href="https://blog.kagi.com/small-web" rel="noopener noreferrer" target="_blank">in the intro blog post</a>:</p>



<blockquote>
<p>Here, you can &ldquo;appreciate&rdquo; a post or jot down a temporary public note about it. These notes will vanish in about a week as we cycle in new content &ndash; emphasizing the fleeting, imperfect nature of the small web.</p>
</blockquote>



<hr>



<p>Wow, a lot of personal sites are ugly. &#128556;&#128556;&#128556;</p>



<p>Not trying to be a jerk, it&rsquo;s just surprising (and a little comforting in a weird way, like how you don&rsquo;t want a bowling alley to be too nice). I also find it surprising that if a site looks decent (to me), there is a good chance it&rsquo;s a pretty off-the-shelf decent WordPress theme. </p>]]></content>
	<updated>2023-10-02T18:58:25+00:00</updated>
	<author><name>Chris Coyier</name></author>
	<source>
		<id>https://chriscoyier.net/</id>
		<link href="https://chriscoyier.net/" rel="self"/>
		<updated>2023-10-02T18:58:25+00:00</updated>
		<title>Chris Coyier</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598932</id>
	<link href="https://www.scmagazine.com/news/six-zero-days-in-exim-mail-transfer-agent-could-impact-more-than-253000-servers" rel="alternate" type="text/html"/>
	<title type="html">Six zero-days in Exim mail transfer agent could impact more than 253,000 servers</title>
	<summary type="html"><![CDATA[<p>Trend Micro&rsquo;s Zero Day Initiative says Exim zero-days leave organizations open to an remote code exe...</p>]]></summary>
	<content type="html"><![CDATA[<p>Trend Micro&rsquo;s Zero Day Initiative says Exim zero-days leave organizations open to an remote code execution attack.</p>]]></content>
	<updated>2023-10-02T18:52:03+00:00</updated>
	<author><name>Steve Zurier</name></author>
	<source>
		<id>https://www.scmagazine.com/topic/latest</id>
		<link href="https://www.scmagazine.com/topic/latest" rel="self"/>
		<updated>2023-10-02T18:52:03+00:00</updated>
		<title>SCM feed for Latest</title></source>

	<category term="email-security"/>

	<category term="incident-response"/>

	<category term="patchconfiguration-management"/>


	<link href="https://files.scmagazine.com/wp-content/uploads/2023/10/1002_email.jpg" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-03:/599067</id>
	<link href="https://www.codersjungle.com/2023/10/02/why-does-devops-recommend-shift-left-principles/" rel="alternate" type="text/html"/>
	<title type="html">Why does DevOps recommend “Shift left” principles?</title>
	<summary type="html"><![CDATA[<p>Read Time:9 Minute, 23 Second                

            


Se...</p>]]></summary>
	<content type="html"><![CDATA[<div>
                <div>
                	<i></i> <span>Read Time:</span>9 Minute, 23 Second                </div>

            </div><div><img decoding="async" src="https://escape.tech/blog/content/images/2023/10/why-does-devops-shift-left.png" referrerpolicy="no-referrer" loading="lazy"></div>
<p><!--kg-card-begin: html--><br>
<!--kg-card-end: html--></p>
<h2>Security in software development</h2>
<p>Large and small corporations share a common fundamental interest in delivering secured software. Neglecting security exposes them to data breaches, financial losses, legal liability, and reputation damage.</p>
<p>Most IT departments have dedicated security teams to mitigate these risks. However, the approach to delivering secure software has evolved over the last decades through the DevOps movement.</p>
<p>DevOps emphasizes proactive security, collaboration, and automation. Instead of treating security as a separate phase, it integrates security from the beginning, catching vulnerabilities early and reducing the chance of issues reaching production. Moving security concerns from the end of the development lifecycle to its source defines a transformative process named &ldquo;Shift left.&rdquo;</p>
<h2>What are shift-left principles?</h2>
<h3>Security management in traditional IT teams</h3>
<p>Traditional IT departments rely on reactive security measures, addressing security issues primarily after they occur. They have developed skills and tools to identify production issues and perform emergency operations in production environments.</p>
<p>Security is seen as a separate phase, often applied as a &ldquo;band-aid&rdquo; solution rather than an integrated part of the development and operations processes. Security operations are considered as firemen and not as consolidation engineers. Also, this does not include developers in securitizing their codebase, supply chain, or infrastructure.</p>
<h3>Liabilities of the traditional security process</h3>
<p>This structure strongly emphasizes protecting the public interfaces, while internal systems and applications may receive less attention. It results in uneven security guarantees in the components of information systems. Operations heavily monitor firewalls and gateways, but the code running on these platforms is audited only as part of larger-scale, end-to-end security audits.</p>
<p>These security assessments and audits are typically manual, periodic processes after the development and deployment phases. Vulnerability scans, penetration testing, and code reviews may be infrequent, leaving systems vulnerable to emerging threats.</p>
<h3>Bringing DevOps culture into the mix</h3>
<p>DevOps is a cultural and organizational movement that promotes collaboration and communication between software development (Dev) and IT operations (Ops) teams. It breaks down traditional silos, fostering a culture of shared responsibility and mutual understanding between these traditionally separate groups.</p>
<p>The main objective of DevOps practices is to streamline the process of delivering high-quality software. Automation plays a significant role in that context, and CI/CD practices are at the heart of it. It involves automating tasks like code builds, testing, deployment, and infrastructure provisioning to reduce manual errors and accelerate delivery cycles.</p>
<p>DevOps promotes a feedback-driven approach to development and operations, emphasizing continuous communication and learning. It fosters early feedback by automating testing, integrating feedback loops throughout the software development process, and deploying code changes frequently.</p>
<h3>DevOps and security: Shifting left</h3>
<p>Shift left for security practices in DevOps means that security testing occurs earlier in the development process, ideally during the coding and build stages. DevOps emphasizes collaboration and integration between development and operations teams, which also extends to security teams.</p>
<p>Originally, DevOps was designed to limit operational concerns for production issues like bugs or downtimes. Later, we explicitly incorporated security in the development and deployment pipeline with the rise of the DevSecOps movement.</p>
<p>In left-shifted security management, the DevOps process includes security teams. Thus, it ensures that security is considered from the beginning (the left) of the development lifecycle rather than being a separate process.</p>
<h2>Why does DevOps recommend shift left principles?</h2>
<h3>Principles at the core of DevOps</h3>
<ul>
<li>DevSecOps encourages security testing and continuous security monitoring as part of the development process.</li>
<li>DevOps strongly focuses on interacting with production environments through constant deployment pipelines.</li>
<li>Security testing, including static analysis, dynamic analysis, and vulnerability scanning, is automated and integrated into the CI/CD pipeline.</li>
<li>DevOps fosters a culture of collaboration, including security experts as part of cross-functional teams.</li>
<li>Developers are educated about security best practices, and security professionals gain insights into development processes.</li>
</ul>
<h3>Security as Code</h3>
<p>DevOps encourages using infrastructure as code (IaC) for infrastructure provisioning and management. It has the first significant benefit of avoiding manual operations in production environments. When using IaC, infrastructure components are provisioned and deployed automatically through a continuous deployment (CD) pipeline, bringing consistency.</p>
<p>Defining infrastructure and access controls as code allows for enforcing security standards on these configuration files. It is possible to assess compliance with these standards within a continuous integration (CI) pipeline before deployment.</p>
<p>The above applies to configuration as code in general, whether it be a Dockerfile or a CI configuration file. Most supply chain security tools work by assessing the content of a project configuration file and defining the various dependencies of the said project.</p>
<h3>Continuous Monitoring</h3>
<p><strong>There is no such thing as zero risk</strong>. While limiting risks with continuous assessment, DevOps also promotes monitoring of applications and infrastructure in production. Developers remain involved as the DevOps approach for monitoring focuses on giving developers the best tooling to assess and answer production issues quickly. Time to recovery is a standard metric for determining a team&rsquo;s performance in DevOps practices.</p>
<p>DevOps fosters small and frequent deployments. It also involves investing to be able to roll back changes easily. Thus, it becomes possible for developers to provide swift responses to security incidents, dramatically reducing the time to recovery of IT teams.</p>
<h3>Automated compliance against common security standards</h3>
<p>DevOps practices can streamline compliance and auditing processes. Automation ensures that security controls and compliance requirements are consistently applied, reducing manual efforts.</p>
<p>This automation takes place through security assessment tools in CI pipelines. Thanks to this, security teams can continuously monitor for security threats. Since this evaluation happens before the code reaches production environments, ensuring ongoing compliance with security policies and standards is much more convenient.</p>
<p>CI pipelines can enforce the most common security standards. Supply chain (dependencies), code, infrastructure, or even a live application in a test environment can all be assessed regarding common security standards directly from a CI pipeline before it reaches a deployed environment.</p>
<div readability="7.9027027027027">
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f4a1.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"></p>
<div readability="34.342541436464">Escape security scans can achieve compliance against renown API security frameworks, such as the OWASP top 10, as well as PCI-DSS, among others. For more details, see <a rel="noopener noreferrer" target="_blank" href="https://escape.tech/blog/automated-graphql-compliance/">our blog post</a>.</div>
</div>
<h2>Shifting security left: Methods and best practices</h2>
<h3>Improve collaboration between developers and security engineers</h3>
<p>The first step for shifting left regarding security management is to act to foster a DevOps culture in how your organization delivers software. Conway&rsquo;s law is an empirical law that we often refer to in IT management circles.</p>
<div readability="8">
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f5de.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"></p>
<p>Any organization that designs a system will produce a design whose structure is a copy of the organization&rsquo;s communication structure.</p>
</div>
<p>In the context of DevOps, this law has a single, fundamental consequence: We have to structure the IT department to foster communication between developers and operations.</p>
<p>The above can mean including an operation in each developer team and asking developers&rsquo; teams to control their whole deployment lifecycle. It will be the most efficient way to share security and operational knowledge across developers. However, you will stop communication between DevOps of different teams. Per the law above, there is a risk of creating discrepancies in how you operate software across the organization.</p>
<p>You can also ask developers teams to manage their operational aspects through security/monitoring tools provided by DevOps teams that they can use as a service. For instance, a use-case we can often relate to at Escape is an operations team providing access to developers teams on our SaaS platform while setting up Escape security scans within their CI/CD pipeline. Pre-deployment enforcement of security best practices remains controlled by operations teams. Still, developers are notified much earlier in the development lifecycle if their code fails to comply with these best practices.</p>
<div readability="6.7068062827225">
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f4a1.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"></p>
<div readability="32.545454545455">A <a rel="noopener noreferrer" target="_blank" href="https://escape.tech/product/?ref=escape.tech#ci-cd-integration">use-case</a> we can often relate to at Escape, is an operations team providing access to developers teams on the platform while setting up Escape security scans within their CI/CD pipeline.</div>
</div>
<h3>Migrate gradually to DevOps practices</h3>
<p>A DevOps-compliant IT department features a lot of organizational as well as technological characteristics. These characteristics range from adding a large set of testing tools within a CI pipeline to purely managerial features such as security considerations in the product design phase and infrastructure management by deploying infrastructure as code.</p>
<p>Adopting every practice defined by DevOps guidelines at once will be, at best, challenging for managers and the teams involved. However, there is no need to shift everything at once. Becoming a DevOps organization one step at a time is possible and recommended.</p>
<p>The starting point will depend on your organization&rsquo;s operational constraints. For instance, if your deployment process involves a lot of manual operations, and is known for being flaky, you might want to focus on implementing an Infrastructure as Code strategy. On the other hand, if your product features access control caveats, you will want to focus on security guidelines and checklists for your product teams.</p>
<h3>Provide developers&rsquo; training for early identification and mitigation of risks</h3>
<p>Bringing developers closer to operational and security concerns is the key to a successful DevOps transition. Organizations must provide security training and awareness programs for development and operations teams to ensure they understand and can address security issues.</p>
<p>No limit exists to how left security can be shifted in the development process. Product teams can be involved in security concerns by formalizing security behaviors in their user stories. For instance, at Escape, we must consider the interactions of each feature we develop with our <a rel="noopener noreferrer" target="_blank" href="https://docs.escape.tech/enterprise/rbac?ref=escape.tech">role-based access control (RBAC) model</a>. Should we do a new role for accessing this feature? Does it end in the scope of the RBAC? We systematically address these concerns when designing our product.</p>
<p>Peer code reviews are also an excellent tool for enforcing security concerns to be addressed and sharing knowledge with developers. More than that, security engineers can gain a deeper understanding of the constraints developers meet regarding security. Fostering this mutual understanding can only increase the productivity of the organization overall.</p>
<div readability="7.7142857142857">
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f4a1.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"></p>
<div readability="32.472727272727">At Escape, we specialize in security, especially API security, through our SaaS platform. Still, we also want to generalize security best practices. For that purpose, we just released our <a rel="noopener noreferrer" target="_blank" href="https://escape.tech/blog/api-security-academy-tech/">open-source API Security Academy</a></div>
</div>
<h3>Automate security review processes</h3>
<p>Automating being at the core of DevOps processes, this is a non-exhaustive list of possible automation for your security processes:</p>
<ul>
<li>Use IaC to define and provision infrastructure through code, allowing for early identification of configuration and security issues.</li>
<li>Perform static and dynamic application security testing to identify coding issues and vulnerabilities during development. -&gt; Present Escape for DAST part</li>
<li>Integrate security scanning tools into the CI/CD pipeline to detect vulnerabilities early in deployment.</li>
<li>Use automated deployment verification techniques to ensure that deployments meet predefined criteria for quality and security.</li>
</ul>
<h2>Conclusion</h2>
<p>In today&rsquo;s IT landscape, shift-left principles have emerged as a vital security strategy. They place security at the heart of software development and IT operations, detecting vulnerabilities early and reducing the risk of security breaches.</p>
<p>This proactive approach safeguards data and privacy and shields organizations from financial losses, legal consequences, and reputational damage.</p>
<p>Shift-left promotes collaboration, automation, and continuous improvement, breaking down traditional silos among development, operations, and security teams. It&rsquo;s not a passing trend but a strategic necessity, ensuring the delivery of secure, resilient, and reliable software.</p>
<hr>
<div readability="7">
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f9e2.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"></p>
<p>Do you have to help your team shift API security left? Get started with Escape now.</p>
</div>
<hr>
<p><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f4a1.png" alt="&#65533;" referrerpolicy="no-referrer" loading="lazy"> <strong>Want to learn more? </strong></p>
<p>Check out the following articles:</p>
<p>Source: <a rel="noopener noreferrer" target="_blank" href="https://escape.tech/blog/why-does-devops-recommend-shift-left-testing-principles/">https://escape.tech/blog/why-does-devops-recommend-shift-left-testing-principles/</a></p>

<hr>
<h3>You might also like this video</h3>
<div>

</div>
<p>The post <a rel="noopener noreferrer" href="https://www.codersjungle.com/2023/10/02/why-does-devops-recommend-shift-left-principles/" target="_blank">Why does DevOps recommend &ldquo;Shift left&rdquo; principles?</a> appeared first on <a rel="noopener noreferrer" href="https://www.codersjungle.com" target="_blank">Coder's Jungle</a>.</p>]]></content>
	<updated>2023-10-02T18:02:57+00:00</updated>
	<author><name>admin</name></author>
	<source>
		<id>https://www.codersjungle.com</id>
		<link href="https://www.codersjungle.com" rel="self"/>
		<updated>2023-10-02T18:02:57+00:00</updated>
		<title>Coder's Jungle</title></source>

	<category term="devops"/>

	<category term="security"/>

	<category term="shift left"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598933</id>
	<link href="https://securityboulevard.com/2023/10/how-to-stop-phishing-attacks-with-protective-dns/" rel="alternate" type="text/html"/>
	<title type="html">How to Stop Phishing Attacks with Protective DNS</title>
	<summary type="html"><![CDATA[<p>Phishing Threats Are Increasing in Scale and Sophistication
Phishing remains one of the most d...</p>]]></summary>
	<content type="html"><![CDATA[<div>
 <a href="https://www.hyas.com/blog/how-to-stop-phishing-attacks-with-protective-dns" title="" rel="noopener noreferrer" target="_blank"> <img src="https://www.hyas.com/hubfs/iStock-1427415133_738x320.jpg" alt="How to Stop Phishing Attacks with Protective DNS" referrerpolicy="no-referrer" loading="lazy"> </a>
</div>
<h3>Phishing Threats Are Increasing in Scale and Sophistication</h3>
<p>Phishing remains one of the most dangerous and widespread cybersecurity threats. This blog examines the escalating phishing landscape, shortcomings of common anti-phishing approaches, and why implementing a Protective DNS service as part of a layered defense provides the most effective solution.</p>
<p>Phishing is now the most common initial attack vector, overtaking stolen or compromised credentials. Stolen or compromised credentials was the leading attack vector in the prior year&rsquo;s report. (Source: IBM Security: Cost of a Data Breach Report 2023) </p>
<p>According to recent research, the number of phishing attacks vastly outpaces all other cyber threats. Business Email Compromise (BEC), a type of phishing attack, results in the greatest financial losses of any cybercrime. </p>
<p>In 2021 alone, estimated adjusted losses from BEC totaled $2.4 billion USD globally. This staggering figure represents more than 59 percent of the losses from the top five most costly internet crimes worldwide. These statistics highlight the immense threat posed by phishing, especially BEC attacks, to organizations across industries. (Source: Microsoft Digital Defense Report 2022)</p>
<p>Phishing continues to dominate the Social Engineering incident classification pattern, ensuring that email remains one of the most common and easiest means of influencing individuals in an organization (Source: 2023 Verizon Data Breach Investigations Report) These trends demonstrate how phishing remains one of the most pervasive and costly cyber threats facing businesses today.</p>
<h3>Phishing Attacks Evolve, Improve and Automate</h3>
<ul>
<li>Phishing attacks are becoming more targeted. Phishing attackers are increasingly using social engineering techniques to personalize their attacks and target specific individuals or organizations. For example, attackers may research their victims on social media or other online sources to gather personal information that can be used to make their phishing emails more believable.</li>
<li>Phishing attacks are becoming more difficult to detect. Phishing attackers are using increasingly sophisticated techniques to evade detection by traditional security solutions. For example, attackers may use domain spoofing techniques to create websites that look like legitimate websites, or they may use malware to inject malicious code into legitimate websites.</li>
<li>Phishing attacks are becoming more automated. Phishing attackers are increasingly using automation tools to scale their attacks. This allows them to send millions of phishing emails per day, making it difficult for organizations to keep up.</li>
</ul>
<p>These trends make it clear that phishing attacks are becoming increasingly threatening to businesses of all sizes. Organizations need to implement a layered security approach that includes Protective DNS to effectively protect themselves from phishing attacks.</p>
<blockquote>
<p><a href="https://www.hyas.com/hubfs/HYAS_How_to_Stop_Phishing_Attacks.pdf" rel="noopener noreferrer" target="_blank">Download: How to Stop Phishing Attacks with Protective DNS</a></p>
</blockquote>
<p>&nbsp;</p>
<h3>An Evolving Threat Requires Adaptive Defenses</h3>
<p>While phishing methods are constantly evolving, common attack vectors include:</p>
<ul>
<li>Spear phishing - Highly targeted emails personalized with researched details to appear authentic. Often used to compromise executive and privileged accounts.</li>
<li>Deceptive domains - Phony websites designed to impersonate and trick visitors into entering login credentials or sensitive data. URL spoofing and typosquatting techniques bypass casual inspection.</li>
<li>Malware payloads - Malicious attachments or links that install info-stealing malware, ransomware, or remote access Trojans via phishing messages.</li>
<li>Social engineering - Psychological manipulation triggers emotions like fear, curiosity, or a sense of urgency that override caution.</li>
</ul>
<p>This combination of highly-tailored social engineering, stealthy technical deception, and harmful payloads allow phishing attacks to circumvent many current defenses.</p>
<h3>Why Existing Anti-Phishing Measures Fall Short</h3>
<p>Organizations employ various methods to combat phishing, but limitations remain:</p>
<p>1. Email filtering relies on signatures, display names, and content inspection. </p>
<p>2. Blacklisting URLs fail to keep pace as phishers exploit typosquatting and generate new fraudulent domains rapidly. </p>
<p>3. User education is unreliable when faced with highly-refined psychological manipulation tailored to override caution. </p>
<p>4. Multi-factor authentication (MFA) blocks unauthorized access by requiring an additional factor, but does not stop the phishing attempt itself. Users still access harmful links or attachments.</p>
<p>5. Business email compromise (BEC) filters focus solely on email while phishing also occurs via web, social media, search, and apps. Other vectors are missed.</p>
<p>These examples demonstrate the need for advanced solutions that reliably block phishing proactively at the lower level before attacks reach end users. This is where Protective DNS comes in.</p>
<h3>Why Protective DNS Provides Superior Phishing Protection</h3>
<p>A Protective DNS service can preemptively block known phishing sites and domains before requests reach them by focusing on the DNS layer which is a common thread required in most internet interactions. This prevents connections to phishing content at the source, stopping attacks earlier in the kill chain.</p>
<p>Key advantages of Protective DNS include:</p>
<p><strong>Real-time blocking</strong> - Newly identified phishing sites and emails are blocked instantly across the protected network as they are added to the DNS filter database. No reliance on match lists, signatures, or patterns.</p>
<p><strong>Identifies emerging threats faster</strong> - By leveraging our unique adversary infrastructure platform's data lake, Protective DNS services continuously analyze the web to rapidly detect phishing sites as they emerge.</p>
<p><strong>Universal coverage</strong> - Blocks phishing sites regardless of vector - email links, web pages, documents, apps, search engine results, etc.</p>
<p><strong>Difficult to evade</strong> - Blocking based on domain reputation prevents circumvention via display name spoofing, content changes, or social engineering.</p>
<p>For example, a phishing email slips past the corporate email gateway defenses. But when the embedded link is clicked, the Protective DNS service recognizes the destination domain as fraudulent based on real-time threat intelligence and blocks access. The user's device never connects to the phishing site.</p>
<p>This unique ability to reliably stop phishing attacks prior to interaction establishes Protective DNS as an essential anti-phishing technical control.</p>
<h3>A Layered Defense-in-Depth Strategy Is Ideal</h3>
<p>While Protective DNS serves as the foundation for blocking phishing proactively, incorporating additional safeguards provides defense-in-depth. This blend of human and technical measures provides overlapping protection across potential phishing vectors, including:</p>
<ul>
<li>Email Security - Safelisting, impersonation analysis, attachment sandboxing</li>
<li>Access Controls - Multi-factor authentication, single sign-on, identity management</li>
<li>Endpoint Protection - Antivirus, endpoint detection and response (EDR)</li>
<li>User Education - Ongoing security awareness training and testing</li>
<li>Incident Response - Rapid containment, investigation and remediation</li>
<li>Penetration Testing - Uncover configuration gaps that may enable phishing</li>
</ul>
<h3>Conclusion</h3>
<p>As phishing threats accelerate, organizations can no longer rely solely on reactive methods like email filtering, URL blacklisting, or end user discretion. Businesses need proactive technical solutions like Protective DNS to reliably block phishing at the source before attacks reach and fool users. </p>
<p>Anchoring your anti-phishing defenses with Protective DNS and layered security provides comprehensive protection against this dangerous and constantly evolving threat.</p>
<h3>Further Reading</h3>
<p><a href="https://www.hyas.com/hyas-protect" rel="noopener noreferrer" target="_blank">HYAS Protect Protective DNS</a></p>
<p><a href="https://www.hyas.com/hubfs/HYAS_Guide_to_Protective_DNS_Security.pdf" rel="noopener noreferrer" target="_blank">Guide to Protective DNS Security</a></p>
<p><a href="https://pages.hyas.com/protective-dns-ebook" rel="noopener noreferrer" target="_blank">Protective DNS eBook</a></p>
<p><a href="https://www.av-test.org/fileadmin/pdf/reports/AV-TEST_HYAS_Protect_Evaluation_February_2023.pdf" rel="noopener noreferrer" target="_blank">AV-TEST evaluation of HYAS Protect</a> </p>
<p>Want to talk to an expert to learn more about Protective DNS? <a href="https://www.hyas.com/contact" rel="noopener noreferrer" target="_blank">Contact us</a> today to find out what HYAS security solutions can do for your organization.</p>
<p>The post <a rel="noopener noreferrer" href="https://securityboulevard.com/2023/10/how-to-stop-phishing-attacks-with-protective-dns/" target="_blank">How to Stop Phishing Attacks with Protective DNS</a> appeared first on <a rel="noopener noreferrer" href="https://securityboulevard.com" target="_blank">Security Boulevard</a>.</p>]]></content>
	<updated>2023-10-02T17:53:32+00:00</updated>
	<author><name>Zia Hotaki</name></author>
	<source>
		<id>https://securityboulevard.com/</id>
		<link href="https://securityboulevard.com/" rel="self"/>
		<updated>2023-10-02T17:53:32+00:00</updated>
		<title>Security Boulevard</title></source>

	<category term="security bloggers network"/>


	<link href="https://securityboulevard.com/" length="1" rel="enclosure" type=""/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598841</id>
	<link href="https://www.techradar.com/pro/security/exim-mail-servers-left-open-to-zero-day-attacks-for-over-a-year" rel="alternate" type="text/html"/>
	<title type="html">Exim mail servers left open to zero-day attacks for over a year</title>
	<summary type="html"><![CDATA[<p>A major f...</p>]]></summary>
	<content type="html"><![CDATA[<article>
                                <p>A major flaw in Exim&rsquo;s mail transfer agent (MTA) software has been detected that has gone without a patch for more than a year.</p><p>Researchers from Trend Micro&rsquo;s Zero Day Initiative were tipped off by an anonymous researcher in June last year, about an out-of-bounds write weakness discovered in the SMTP service, BleepingComputer reported.</p><p>Exim is an MTA that runs in the background of <a href="https://www.techradar.com/news/best-email-provider" rel="noopener noreferrer" target="_blank">email servers</a>, and hackers can use it to run malware on vulnerable endpoints.</p>
<h2>Used by Russian hackers</h2>
<p>That vulnerability is being tracked as CVE-2023-42115, and can be used to crash software and corrupt valuable data, but more importantly - it can be used to run malicious code on vulnerable servers.</p><p>Exim was reportedly first notified about the flaw in June 2022, and then again in May 2023, but apparently to no avail. Given Exim&rsquo;s failure to address it, Trend Micro Zero Day Initiative has now published an advisory describing the flaw, and detailing its discussion with Exim over the months.</p><p>According to <em>BleepingComputer</em>, MTA servers like Exim are a popular target among hackers as they can be accessed remotely and used to move into the wider corporate network. It&rsquo;s also apparently the &ldquo;world&rsquo;s most popular MTA software, installed on more than 56% of 602,000 internet-connected mail servers&rdquo; (342,000). This is mostly because it comes bundled with many popular Linux distros including Debian and Red Hat.</p><p>Three years ago, Sandworm (a Russian state-sponsored threat actor) was using a flaw found in Exim to infiltrate endpoints, the NSA warned at the time.</p><p>&ldquo;The Russian actors, part of the General Staff Main Intelligence Directorate&rsquo;s (GRU) Main Center for Special Technologies (GTsST), have used this exploit to add privileged users, disable network security settings, execute additional scripts for further network exploitation; pretty much any attacker&rsquo;s dream access &ndash; as long as that network is using an unpatched version of Exim MTA,&rdquo; the NSA said.</p>
<p><em>Via </em><a href="https://www.bleepingcomputer.com/news/security/millions-of-exim-mail-servers-exposed-to-zero-day-rce-attacks/" target="_blank" rel="noopener noreferrer"><em>BleepingComputer</em></a></p>
<h3><span>More from TechRadar Pro</span></h3>
<ul><li><a href="https://www.techradar.com/news/russian-agents-have-been-hacking-major-email-program" target="_blank" rel="noopener noreferrer">Russian criminals accused of hacking this top email service</a></li><li>Here's a list of the&nbsp;<a href="https://www.techradar.com/best/firewall" target="_blank" rel="noopener noreferrer">best firewalls today</a>&nbsp;</li><li>These are the&nbsp;<a href="https://www.techradar.com/news/best-endpoint-security-software" target="_blank" rel="noopener noreferrer">best endpoint protection software</a> right now</li></ul>
                                                            </article>]]></content>
	<updated>2023-10-02T16:32:09+00:00</updated>
	<author><name/></author>
	<source>
		<id>http://airedale.futurecdn.net/feeds/en_feed_3accf2b0.rss-fse?articleTerritory=US&amp;articleType=news&amp;nb_results=20&amp;site=techradar</id>
		<link href="http://airedale.futurecdn.net/feeds/en_feed_3accf2b0.rss-fse?articleTerritory=US&amp;articleType=news&amp;nb_results=20&amp;site=techradar" rel="self"/>
		<updated>2023-10-02T16:32:09+00:00</updated>
		<title>TechRadar - All the latest technology news</title></source>

	<category term="pro"/>

	<category term="security"/>


	<link href="https://cdn.mos.cms.futurecdn.net/NGKiUcJVFBC8HkMp9dTo9a.jpg" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598877</id>
	<link href="https://arstechnica.com/?p=1972519" rel="alternate" type="text/html"/>
	<title type="html">Tux the cat found after Lyft fiasco dragged on for days, Lyft to pay vet bills</title>
	<summary type="html"><![CDATA[<p>Enlarge (credit: Aurich Lawson | Getty Images)  







Tux the cat has been found, and L...</p>]]></summary>
	<content type="html"><![CDATA[<div>
<figure>
  <img src="https://cdn.arstechnica.net/wp-content/uploads/2023/10/lost-cat-tux-sign-800x450.jpg" alt="Tux the cat found after Lyft fiasco dragged on for days, Lyft to pay vet bills" referrerpolicy="no-referrer" loading="lazy">
      <p><a href="https://cdn.arstechnica.net/wp-content/uploads/2023/10/lost-cat-tux-sign.jpg" rel="noopener noreferrer" target="_blank">Enlarge</a> (credit: Aurich Lawson | Getty Images)</p>  </figure>






<div><a name="page-1"></a></div>
<p>Tux the cat has been found, and Lyft has agreed to cover "all of her veterinary bills," after a Lyft driver zoomed away with the sick cat still in the car, a Lyft spokesperson told Ars.</p>
<p>"We&rsquo;re so happy to report that Tux has been reunited with her owner, and we are focused on ensuring Tux has everything she needs right now, including covering all of her veterinary bills," Lyft's spokesperson told Ars.</p>
<p>Tux's story went viral online after the cat's owner, Palash Pandey, <a href="https://twitter.com/palashp40616755/status/1708742541401526442" rel="noopener noreferrer" target="_blank">posted on X</a>, detailing his attempts to recover his lost cat. The cat went missing on Saturday, and millions of concerned online onlookers worried she might not be recovered. But Pandey <a href="https://twitter.com/palashp40616755/status/1708742541401526442" rel="noopener noreferrer" target="_blank">posted</a> today that Lyft investigators helped retrieve the cat, which was found at a real estate agency in Austin, Texas.</p></div><p><a href="https://arstechnica.com/?p=1972519#p3" rel="noopener noreferrer" target="_blank">Read 19 remaining paragraphs</a> | <a href="https://arstechnica.com/?p=1972519&amp;comments=1" rel="noopener noreferrer" target="_blank">Comments</a></p>]]></content>
	<updated>2023-10-02T16:24:00+00:00</updated>
	<author><name>Ashley Belanger</name></author>
	<source>
		<id>https://arstechnica.com</id>
		<link href="https://arstechnica.com" rel="self"/>
		<updated>2023-10-02T16:24:00+00:00</updated>
		<title>Ars Technica - All content</title></source>

	<category term="lost cat"/>

	<category term="lyft"/>

	<category term="lyft pet policy"/>

	<category term="policy"/>

	<category term="ridesharing"/>

	<category term="tux the cat"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598838</id>
	<link href="https://cybersecuritynews.com/apache-nifi-rce-vulnerability/" rel="alternate" type="text/html"/>
	<title type="html">Apache NiFi RCE Vulnerability Let Attackers Exfiltrate Sensitive Data</title>
	<summary type="html"><![CDATA[<p>The widely used data integration tool Apache NiFi has been discovered to be susceptible to&nbsp;a c...</p>]]></summary>
	<content type="html"><![CDATA[<p>The widely used data integration tool Apache NiFi has been discovered to be susceptible to&nbsp;a critical&nbsp;security flaw tracked as CVE-2023-34468&nbsp;that might allow remote code execution.</p>



<p>Additionally, this&nbsp;significant issue&nbsp;might allow attackers to exfiltrate sensitive information, compromise data integrity, obtain unauthorized access, and more, posing serious operational and reputational consequences.</p>



<p>To fix this issue, Apache NiFi&rsquo;s maintainers have provided patches and upgrades.</p>






    
    
    
    


    <section>
        <span>FREE Demo</span>
        <h2><a href="https://rss.biapy.fr" rel="noopener noreferrer" target="_blank">
            Deploy Advanced AI-Powered Email Security Solution</a></h2>
        <p>Implementing AI-Powered Email security solutions &ldquo;Trustifi&rdquo; can secure your business from today&rsquo;s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware &amp; Ransomware</p>
        
    </section>





<h2><strong>Key Details of the Vulnerability</strong></h2>



<p>The Remote Code Execution vulnerability has a CVSS Severity Score of 8.8 [High] and is tagged as <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34468" target="_blank" rel="noopener noreferrer">CVE-2023-34468</a>.</p>



<p>According to CYFIRMA <a href="https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/" target="_blank" rel="noopener noreferrer">Research</a>, by utilizing specifically crafted&nbsp;H2 database connection strings, the bug enables remote code execution. H2 is a widely used embedded Java-based database in Apache NiFi installations.</p>



<p>&ldquo;Attackers could potentially take advantage of this vulnerability to execute arbitrary code on vulnerable Apache NiFi instances. This could lead to unauthorized access, data theft, or system compromise&rdquo;, researchers said.</p>



<p>Reports mention that there are almost 2700 publicly accessible Apache Nifi that might be affected by the CVE-2023-34468 issue.</p>



<p>Since Apache NiFi is utilized worldwide, the effects of this vulnerability are not geographically restricted. As a result, businesses in places like North America, Europe, Asia-Pacific, and others where <a href="https://cybersecuritynews.com/apache-openmeeting-flaw/" rel="noopener noreferrer" target="_blank">Apache NiFi</a> installations are widely distributed may be vulnerable to abuse.</p>



<p>This vulnerability has a potential impact on healthcare, banking, government, telecommunications, and several other industries that depend on Apache NiFi for data integration and automation but not limited to.</p>



<p>Particularly appealing targets may be businesses handling sensitive data or those who rely significantly on Apache NiFi&rsquo;s capabilities.</p>



<p>If this vulnerability is successfully exploited, it can allow unauthorized code execution, which could compromise the wider technical ecosystem.&nbsp;</p>



<p>Servers, applications, and interconnected&nbsp;systems that have been integrated with Apache NiFi are included in this, which increases the potential impact of a company&rsquo;s technological infrastructure.</p>



<p>The researchers have discovered that unidentified hackers are selling Apache NiFi Exploits on dark web forums.</p>



<h2><strong>Affected Versions</strong></h2>



<p>Apache NiFi &ndash; 0.0.2 through 1.21.0</p>



<p>Organizations utilizing these versions are in danger and need to act right away.</p>



<h2><strong>Mitigation Measures</strong></h2>



<ul>
<li>Users are urged to install the fixes right away.</li>



<li>Limit the vulnerability of Apache NiFi instances to untrusted networks by implementing network segmentation.</li>



<li>Keep an eye out for any unusual activity or indicators of compromise on Apache NiFi systems.</li>



<li>&nbsp;Implement stringent access restrictions and authentication procedures.</li>
</ul>



<p>Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the&nbsp;<strong><a href="https://www.manageengine.com/patch-management/?utm_source=GBHackers&amp;utm_medium=Website-CPM&amp;utm_campaign=PMP-300x600" target="_blank" rel="noopener noreferrer">free&nbsp;trial</a></strong>&nbsp;to ensure 100% security.</p>
<p>The post <a rel="noopener noreferrer" href="https://cybersecuritynews.com/apache-nifi-rce-vulnerability/" target="_blank">Apache NiFi RCE Vulnerability Let Attackers Exfiltrate Sensitive Data</a> appeared first on <a rel="noopener noreferrer" href="https://cybersecuritynews.com" target="_blank">Cyber Security News</a>.</p>]]></content>
	<updated>2023-10-02T16:03:20+00:00</updated>
	<author><name>Dhivya</name></author>
	<source>
		<id>https://cybersecuritynews.com/</id>
		<link href="https://cybersecuritynews.com/" rel="self"/>
		<updated>2023-10-02T16:03:20+00:00</updated>
		<title>Cyber Security News</title></source>

	<category term="apache nifi rce"/>

	<category term="cyber security news"/>

	<category term="vulnerabilities"/>

	<category term="vulnerability"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598827</id>
	<link href="https://www.clubic.com/actualite-486793-x-com-ex-twitter-des-utilisateurs-actifs-moins-nombreux-au-quotidien.html" rel="alternate" type="text/html"/>
	<title type="html">X.com (ex-Twitter) : des utilisateurs actifs moins nombreux au quotidien</title>
	<summary type="html"><![CDATA[<p>Les choses ne vont pas en s'arrangeant pour X.com, anciennement Twitter. Lors d'une interview, sa P....</p>]]></summary>
	<content type="html"><![CDATA[<p>Les choses ne vont pas en s'arrangeant pour X.com, anciennement Twitter. Lors d'une interview, sa P.-D.G. a r&eacute;v&eacute;l&eacute; le nombre d'utilisateurs quotidiens actifs sur la plateforme. Probl&egrave;me, ce chiffre &eacute;tait bien plus &eacute;lev&eacute; avant qu'Elon Musk n'en fasse l'acquisition&hellip;</p>]]></content>
	<updated>2023-10-02T16:00:00+00:00</updated>
	<author><name>Mathilde Rochefort</name></author>
	<source>
		<id>http://clubic.com/</id>
		<link href="http://clubic.com/" rel="self"/>
		<updated>2023-10-02T16:00:00+00:00</updated>
		<title>Clubic.com</title></source>

	<category term="réseaux sociaux"/>

	<category term="twitter"/>


	<link href="https://pic.clubic.com/v1/images/2128660/raw" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598844</id>
	<link href="https://hackernoon.com/go-and-protocol-buffers-quick-tutorial?source=rss" rel="alternate" type="text/html"/>
	<title type="html">Go and Protocol Buffers (Quick Tutorial)</title>
	<summary type="html"><![CDATA[<p>A very short example of how to use Protocol Buffers in Go. This is proto3, i.e. the 3rd version of t...</p>]]></summary>
	<content type="html"><![CDATA[<p>A very short example of how to use Protocol Buffers in Go. This is proto3, i.e. the 3rd version of the protocol, but the example is generally valid for the second version as well.</p>
<h2><strong>Preparation</strong></h2>
<p>Go to this <a href="https://github.com/protocolbuffers/protobuf/releases" rel="noopener noreferrer" target="_blank">link</a> to read, download, and install (everything is simple there).</p>
<p>Installation instructions in Go can be found <a href="https://github.com/golang/protobuf" rel="noopener noreferrer" target="_blank">here</a>:</p>
<pre><code>go get -u github.com/golang/protobuf/{proto,protoc-gen-go}
</code></pre>
<p>\
You may need to use <code>-f</code> if you have something like this in <code>~/.gitconfig</code>:</p>
<pre><code>[url "ssh://git@github.com/"]
insteadOf = https://github.com/
</code></pre>
<h2><strong>Example</strong></h2>
<p>For this example, we will save an array of numbers and a string, and then read them back. Furthermore, we will assume that we are in the root of our new project.</p>
<p>The proto-file will look like this:</p>
<p><em>msg/msg.proto</em></p>
<pre><code>// comments follow a style C/C++
/*
   and multiline too
*/
syntax = "proto3";

// package name, this will be saved in the resulting go-file
package msg;

// type of data to be saved
message msg {
    // type field_name = field_number
    string key = 1;
    // repeated means slice
    repeated int64 value = 2;
}
/*
 In the third version, there are no required fields and extensions.
 Instead of extensions, the type `Any` is implemented (more on that later)
*/
</code></pre>
<p>\
Now, we need to compile the proto file:</p>
<pre><code>protoc --go_out=. msg/*.proto
</code></pre>
<p>\
The result will be a file like this:</p>
<p><em>msg/msg.pb.go</em></p>
<pre><code>package msg

import proto "github.com/golang/protobuf/proto"

var _ = proto.Marshal

/*
The structure looks like this. Note that tags for JSON have been added automatically
*/
type Msg struct {
    Key   string  `protobuf: "bytes,1,opt,name=key" json: "key,omitempty"`
    Value []int64 `protobuf: "varint,2,rep,name=value" json: "value,omitempty"`
}

// methods are needed to make the structure conform to the proto.Message interface
func (m *Msg) Reset()         { *m = Msg{} }
func (m *Msg) String() string { return proto.CompactTextString(m) }
func (*Msg) ProtoMessage()    {}

func init() {
}
</code></pre>
<p>\
Now let's create a structure, write its bytes, and read it back:</p>
<p><em>main.go</em></p>
<pre><code>package main

import (
    "log"
    "./msg"
    "github.com/golang/protobuf/proto"
)

func main() {
    // create a new "message"
    msg1 := &amp;msg.Msg{
        Key: "Hello Protocol Buffers",
        Value: []int64{1, 2, 3, 4},
    }

    // structure to bytes
    data, err := proto.Marshal(msg1)
    if err != nil {
        log.Fatal("marshaling error: ", err)
        return
    }

    // how much memory does it take?
    log.Printf("data length: %d", len(data))

    // bytes into the structure
    msg2 := new(msg.msg)
    err = proto.Unmarshal(data, msg2)
    if err != nil {
        log.Fatal("unmarshaling error: ", err)
    }

    // now both structures must be equal
    if msg1.Key != msg2.Key {
        log.Printf("unexpected value, expected '%s', got '%s'", msg1.Key, msg2.Key)
    }

    for i := 0; i &lt; 4; i++ {
        if msg1.Value[i] != msg2.Value[i] {
            log.Printf("unexpected value, expected %d, got %d", msg1.Value[i], msg2.Value[i])
        }
    }

    log.Println("Done")
}
</code></pre>
<p>\
As you can see, it's easy. If we dig deeper, let's say there is a desire to create a database that stores "messages" - so that the type of "message" is not initially defined, and to store these "messages" in some structure. In other words, to have a library that will store what we give it in a certain format. In proto3 type <code>Any</code> is implemented to store any type.</p>
<p>Type <code>Any</code> looks like this:</p>
<pre><code>message Any {
    string type_url = 1; // type
    bytes value = 2; // type content in bytes
}
</code></pre>
<h2>Links</h2>
<ul>
<li><a href="https://github.com/protocolbuffers/protobuf/releases" rel="noopener noreferrer" target="_blank">Protocol Buffers GitHub Releases</a></li>
<li><a href="https://github.com/protocolbuffers/protobuf/issues" rel="noopener noreferrer" target="_blank">Protocol Buffers Issue Tracker</a></li>
<li><a href="https://github.com/golang/protobuf" rel="noopener noreferrer" target="_blank">One of the Protocol Buffers implementations for Go</a></li>
<li><a href="https://protobuf.dev/programming-guides/proto3/" rel="noopener noreferrer" target="_blank">Guide to Protocol Buffers v3</a></li>
</ul>
<p>\</p>]]></content>
	<updated>2023-10-02T15:42:22+00:00</updated>
	<author><name>David Kibizov</name></author>
	<source>
		<id>https://hackernoon.com</id>
		<link href="https://hackernoon.com" rel="self"/>
		<updated>2023-10-02T15:42:22+00:00</updated>
		<title>Hacker Noon</title></source>

	<category term="go"/>

	<category term="go-tutorial"/>

	<category term="golang"/>

	<category term="programming"/>

	<category term="programming-tutorial"/>

	<category term="protocol-buffers"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598804</id>
	<link href="https://www.clubic.com/actualite-486832-free-confirme-le-lancement-d-une-nouvelle-freebox-pour-la-fin-de-l-annee.html" rel="alternate" type="text/html"/>
	<title type="html">Free confirme le lancement d'une nouvelle Freebox pour la fin de l'année</title>
	<summary type="html"><![CDATA[<p>L'op&eacute;rateur Free a confirm&eacute; le lancement d'une nouvelle Freebox, la V9, qui devrait &ecirc;tre commerciali...</p>]]></summary>
	<content type="html"><![CDATA[<p>L'op&eacute;rateur Free a confirm&eacute; le lancement d'une nouvelle Freebox, la V9, qui devrait &ecirc;tre commercialis&eacute;e d'ici les f&ecirc;tes de No&euml;l.</p>]]></content>
	<updated>2023-10-02T15:30:00+00:00</updated>
	<author><name>Alexandre Boero</name></author>
	<source>
		<id>http://clubic.com/</id>
		<link href="http://clubic.com/" rel="self"/>
		<updated>2023-10-02T15:30:00+00:00</updated>
		<title>Clubic.com</title></source>

	<category term="box internet"/>

	<category term="free"/>


	<link href="https://pic.clubic.com/v1/images/1711938/raw" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598747</id>
	<link href="https://www.zdnet.fr/actualites/rentree-loupee-pour-le-cyberscore-39961592.htm#xtor=123456" rel="alternate" type="text/html"/>
	<title type="html">Rentrée loupée pour le cyberscore</title>
	<summary type="html"><![CDATA[<p>Le nouvel indicateur permettant &agrave; l&rsquo;internaute d&rsquo;&eacute;valuer en un coup d'&oelig;il la s&eacute;curit&eacute; des sites fran...</p>]]></summary>
	<content type="html"><![CDATA[<p>Le nouvel indicateur permettant &agrave; l&rsquo;internaute d&rsquo;&eacute;valuer en un coup d'&oelig;il la s&eacute;curit&eacute; des sites fran&ccedil;ais devait entrer en vigueur le 1er octobre. Mais ses textes d&rsquo;application n&rsquo;ont toujours pas &eacute;t&eacute; publi&eacute;s.</p>]]></content>
	<updated>2023-10-02T15:18:01+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://www.zdnet.fr/feeds/rss/</id>
		<link href="https://www.zdnet.fr/feeds/rss/" rel="self"/>
		<updated>2023-10-02T15:18:01+00:00</updated>
		<title>ZDNet - Business et Solutions IT</title></source>

	<category term="actualités : internet"/>

	<category term="cybersécurité"/>

	<category term="sécurité"/>


	<link href="https://d1fmx1rbmqrxrr.cloudfront.net/zdnet/optim/i/edit/ne/2020/10/cyber%20fr__w630.jpg" length="2783" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598768</id>
	<link href="https://www.techradar.com/pro/security/theres-a-dangerous-new-malware-as-a-service-on-the-rise-heres-what-you-need-to-know" rel="alternate" type="text/html"/>
	<title type="html">There's a dangerous new malware-as-a-service on the rise - here's what you need to know</title>
	<summary type="html"><![CDATA[<p>A brand n...</p>]]></summary>
	<content type="html"><![CDATA[<article>
                                <p>A brand new malware-as-a-service (MaaS), capable of a wide range of malicious actions, is being offered on the dark web, researchers have found.</p><p>Cybersecurity experts from Zscaler ThreatLabz observed a MaaS called BunnyLoader being offered online for $250 (lifetime license).&nbsp;</p><p>After further analysis, the researchers discovered all of the things BunnyLoader can do - from deploying stage-two malware to stealing passwords stored in browsers to grabbing system information. Furthermore, BunnyLoader can run remote commands on the infected <a href="https://www.techradar.com/news/best-endpoint-security-software" target="_blank" rel="noopener noreferrer">endpoint</a>, capture keystrokes via an integrated keylogger, and monitor the clipboard for cryptocurrency wallets.</p>
<h2>C2 panel features</h2>
<p>If a victim decides to send a cryptocurrency payment from one address to another, they&rsquo;d usually copy and paste the recipient&rsquo;s address in the app, mostly because wallet addresses are a long string of random letters and numbers. When malware monitors the clipboard, it can detect when the victim copies a wallet address and can replace the contents in the clipboard with an address belonging to the attacker. Thus, when a payment is initiated, the funds go to the attacker&rsquo;s account.</p><p>BunnyLoader was written in C/C++ by a threat actor named PLAYER_BUNNY (aka PLAYER_BL). It is under active development since early September this year, allegedly getting new features and enhancements every day. Some of the newer ungraded include anti-sandbox and antivirus evasion techniques, made possible via a fileless loading feature.&nbsp;</p><p>Hackers who buy a license can also expect a C2 panel to monitor all active tasks, keep track of infection statistics, track connected and inactive hosts, and more.</p><p>The only thing that remains a mystery with BunnyLoader is how it makes it to the victim&rsquo;s endpoints, as the researchers were unable to discover any initial access mechanisms.&nbsp;</p><p>"BunnyLoader is a new MaaS threat that is continuously evolving their tactics and adding new features to carry out successful campaigns against their targets," the researchers concluded.</p>
<p><em>Via </em><a href="https://thehackernews.com/2023/10/bunnyloader-new-malware-as-service.html" target="_blank" rel="noopener noreferrer"><em>TheHackerNews</em></a></p>
<h3><span>More from TechRadar Pro</span></h3>
<ul><li><a href="https://www.techradar.com/pro/security/a-powerful-new-malware-backdoor-is-targeting-governments-across-the-world" target="_blank" rel="noopener noreferrer">A powerful new malware backdoor is targeting governments across the world</a></li><li>Here's a list of the&nbsp;<a href="https://www.techradar.com/best/firewall" target="_blank" rel="noopener noreferrer">best firewalls today</a>&nbsp;</li><li>These are the&nbsp;<a href="https://www.techradar.com/best/best-malware-removal" target="_blank" rel="noopener noreferrer">best malware removal tools</a>&nbsp;right now</li></ul>
                                                            </article>]]></content>
	<updated>2023-10-02T15:12:58+00:00</updated>
	<author><name/></author>
	<source>
		<id>http://airedale.futurecdn.net/feeds/en_feed_3accf2b0.rss-fse?articleTerritory=US&amp;articleType=news&amp;nb_results=20&amp;site=techradar</id>
		<link href="http://airedale.futurecdn.net/feeds/en_feed_3accf2b0.rss-fse?articleTerritory=US&amp;articleType=news&amp;nb_results=20&amp;site=techradar" rel="self"/>
		<updated>2023-10-02T15:12:58+00:00</updated>
		<title>TechRadar - All the latest technology news</title></source>

	<category term="pro"/>

	<category term="security"/>


	<link href="https://cdn.mos.cms.futurecdn.net/tfTPM2h23pWZ3334EbhVKT.jpg" length="1" rel="enclosure" type="image/jpeg"/>

</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598807</id>
	<link href="https://www.autocar.co.uk/car-news/new-cars/first-drive-toyota-prius" rel="alternate" type="text/html"/>
	<title type="html">First drive: 2024 Toyota Prius</title>
	<summary type="html"><![CDATA[<p>The Prius has never been more desirable, yet we're being denied it in the UK. So what are we missi...</p>]]></summary>
	<content type="html"><![CDATA[<a href="https://rss.biapy.fr/car-news/new-cars/first-drive-toyota-prius" rel="noopener noreferrer" target="_blank"><img src="https://www.autocar.co.uk/sites/autocar.co.uk/files/styles/car_review_image_190/public/images/car-reviews/first-drives/legacy/toyota-prius-review-202301-cornering-front_0.jpg?itok=wwXD_Efs" alt="toyota prius review 202301 cornering front" title="toyota prius review 202301 cornering front" referrerpolicy="no-referrer" loading="lazy"></a>

The Prius has never been more desirable, yet we're being denied it in the UK. So what are we missing?
<div>
<p>One car has been flying the flag for electrification longer than most: the <a href="http://car-review/toyota/prius" rel="noopener noreferrer" target="_blank">Toyota Prius</a>.</p>
<p>Over four generations and more than five million examples sold in 26 years, the Prius was originally billed by its maker as &lsquo;the car for the 21st century&rsquo;, a trailblazer for more efficient driving, harnessing part-electric power in what subsequently became known as a self-charging hybrid.</p>
<p><img alt="" src="https://www.autocar.co.uk/sites/autocar.co.uk/files/styles/body-image/public/toyota-prius-review-202304-driving.jpg?itok=e1MWgwPj" referrerpolicy="no-referrer" loading="lazy"></p>
<p>The world&nbsp;has come around to <a href="https://rss.biapy.fr/car-review/toyota" rel="noopener noreferrer" target="_blank">Toyota</a>&rsquo;s view, and then some. Every car maker with any eye on a solvent future is now producing electrified models to reduce emissions (Toyota says the Prius alone has saved more than 82 million tonnes of CO2 entering the atmosphere) ultimately down towards zero. Not every car maker or car buyer is ready to go full on into <a href="https://rss.biapy.fr/car-news/best-cars/top-10-best-electric-cars" rel="noopener noreferrer" target="_blank">electric cars</a>, so hybrid power remains a fine bridging technology to improve efficiency and emissions by pairing electric propulsion with an internal combustion engine.&nbsp;</p>
<p>In this context, then, you&rsquo;d think that the new fifth-generation Toyota Prius would be ripe for a successful launch in the UK, especially as it looks this good. But no: this Prius is not for us.</p>
<p>Truth is, we Brits don&rsquo;t buy the Prius. When this new version was revealed at the 2022<a href="https://rss.biapy.fr/car-news/la-motor-show" rel="noopener noreferrer" target="_blank"> LA motor show</a>, Toyota highlighted that just 563 Prius models were sold in 2021 compared with just under 18,000 <a href="https://rss.biapy.fr/car-review/toyota/c-hr-2016-2023" rel="noopener noreferrer" target="_blank">Toyota C-HR</a>s. Uber drivers are being pointed in the direction of the <a href="https://rss.biapy.fr/car-review/toyota/corolla-touring-sports" rel="noopener noreferrer" target="_blank">Toyota Corolla Touring Sports</a>.</p>
<p>Perhaps we didn&rsquo;t buy the previous Priuses (Pri-ii?) because of that Uber reputation in recent years, and a sneeriness towards the car before that because of it being seen as a bit of a Hollywood stooge. But then it was always quite frumpy to look at, and up until the fourth-generation model a car devoid of any character to drive from the dark days of Toyota.</p>
<p>But just look at it now. Would we be inclined to buy this Prius? It&rsquo;s sleek and sporty, rakish in profile and really rather desirable. Put it next to even a fourth-generation Prius and you&rsquo;ll never have guessed the lineage, save for a very loose wedge shape.</p>
<p>The proportions are very different from before. This Prius is 50mm lower and 46mm shorter than the previous car but the wheelbase has increased by 50mm. It&rsquo;s 22mm wider as well and looks more so than that thanks to a light bar that runs the full width of the car's front. It rides on 19in alloy wheels.</p>
<p>It&rsquo;s all change visually and all change under the bonnet, too. While a classic series hybrid (sorry, self-charging hybrid) will be offered in some global markets based around a 2.0-litre engine, in Europe the Prius will be sold as a plug-in hybrid only. This mixes a 2.0-litre petrol engine with twin electric motors for a combined 220bhp, working in conjunction with a 13.6kWh battery that provides a 45-mile electric range.</p>
<p>A very nice drivetrain it is, too. For the most part, you&rsquo;re able to nip around on electric power as that EV range is substantial and on a typical journey you&rsquo;re unlikely to exhaust it. When you do, the engine can be a bit grumbly and the refinement drops under heavier acceleration loads; &rsquo;twas ever thus with many a hybrid and the Prius is no exception.&nbsp;</p>
<p>Still, among a sea of heavy, bulky and often bloated electric cars, the Prius feels a breath of fresh air to drive. It is based on the latest version of Toyota&rsquo;s TNGA platform, which has already yielded many an everyday handling hero and the Prius is another one. Here, that platform is said to be stiffer, quieter and more stable than before.</p>
<p><img alt="" src="https://www.autocar.co.uk/sites/autocar.co.uk/files/styles/body-image/public/toyota-prius-review-202301-cornering-front.jpg?itok=5v-n9guJ" referrerpolicy="no-referrer" loading="lazy"></p>
<p>This new Prius feels shrink-wrapped and fleet of foot, alert and nimble and keen to change direction. The chunky steering wheel feels great in your hands and the steering itself is direct and precise, backed by the Prius&rsquo;s willingness to be really turned in to a corner. It&rsquo;s surprisingly resistant to understeer and just good, honest, everyday fun. Drab to drive this is not, and the tidy handling is backed up with a supple ride at all speeds. Who&rsquo;d have thought we&rsquo;d ever say this about a Prius?</p>
<p>The interior lacks the wow factor of the exterior, let down by a drab steering wheel taken from the <a href="https://rss.biapy.fr/car-review/toyota/bz4x" rel="noopener noreferrer" target="_blank">Toyota&nbsp;bZ4X</a>. Better news comes from the number of physical controls on the dashboard, including those for the heating and ventilation. A large touchscreen for the infotainment atop the dash is clear, with good graphics, and a further driver display is pushed a long way back almost to the windscreen, which makes it sit nicely in your eyeline and probably saves Toyota the cost of fitting a head-up display in the process.&nbsp;</p>
<p>The sleeker profile has resulted in a trade-off in rear space for passengers, if not at the tape measure then certainly in perception as the narrower windows make it feel cosier. The rear interior door handles&nbsp;might need a continental taxi driver to put a sign up on the back of the front headrest saying where to locate them, assuming they didn&rsquo;t buy a Corolla estate instead, of course.</p>
<p>Ultimately, it&rsquo;s a shame UK buyers aren&rsquo;t given the chance to buy the Prius when it&rsquo;s this capable. Toyota is a company that rarely lacks confidence, but it&rsquo;s one thing deciding not to take the Prius when looking at past performance with a very different proportion and quite another when the car has been so successfully reinvented.&nbsp;</p>
<p><strong>Toyota Prius PHEV</strong></p>
<p><strong>Verdict </strong>4 stars&nbsp;</p>
<p><strong>Engine</strong>&nbsp;4 cyls in line, 1987cc, petrol, plus 161bhp permanent magnet synchronous motor <strong>Power</strong>&nbsp;220bhp (peak combined) <strong>Torque</strong>&nbsp;140lb ft at 5200rpm (engine only) <strong>Transmission</strong>&nbsp;eCVT, front-wheel drive <strong>Battery</strong>&nbsp;13.6kWh&nbsp;<strong>Kerb weight </strong>1545kg <strong>0-62mph&nbsp;</strong>6.8sec <strong>Top speed&nbsp;</strong>110mph <strong>Economy</strong> 404mpg <strong>CO2, tax band</strong>&nbsp;16g/km, na <strong>Electric range </strong>45 miles <strong>Rivals</strong>&nbsp;<a href="https://rss.biapy.fr/car-review/hyundai/ioniq" rel="noopener noreferrer" target="_blank">Hyundai Ioniq</a> PHEV, <a href="https://rss.biapy.fr/car-review/kia/niro" rel="noopener noreferrer" target="_blank">Kia Niro</a> PHEV</p>
<p><img alt="" src="https://www.autocar.co.uk/sites/autocar.co.uk/files/styles/body-image/public/toyota-prius-review-202303-cornering-front.jpg?itok=5Uu8po-V" referrerpolicy="no-referrer" loading="lazy"></p>
</div>]]></content>
	<updated>2023-10-02T15:11:40+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://www.autocar.co.uk/</id>
		<link href="https://www.autocar.co.uk/" rel="self"/>
		<updated>2023-10-02T15:11:40+00:00</updated>
		<title>Autocar RSS Feed</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598794</id>
	<link href="https://packetstormsecurity.com/files/174866/jsql-injection-0.93.tar.gz" rel="alternate" type="text/html"/>
	<title type="html">jSQL Injection 0.93</title>
	<summary type="html"><![CDATA[<p>jSQL Injection is a lightweight application used to find database information from a distant server....</p>]]></summary>
	<content type="html"><![CDATA[<p>jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.</p>]]></content>
	<updated>2023-10-02T15:03:21+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://packetstormsecurity.com/</id>
		<link href="https://packetstormsecurity.com/" rel="self"/>
		<updated>2023-10-02T15:03:21+00:00</updated>
		<title>Files ≈ Packet Storm</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598753</id>
	<link href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-surge-in-phantom-hacker-scams-impacting-elderly/" rel="alternate" type="text/html"/>
	<title type="html">FBI warns of surge in 'phantom hacker' scams impacting elderly</title>
	<summary type="html"><![CDATA[<p>The FBI issued a public service announcement warning&nbsp;of a significant increase in 'phantom hacker' s...</p>]]></summary>
	<content type="html"><![CDATA[<p>The FBI issued a public service announcement warning&nbsp;of a significant increase in 'phantom hacker' scams targeting senior citizens across the United States. [...]</p>]]></content>
	<updated>2023-10-02T15:01:06+00:00</updated>
	<author><name>Sergiu Gatlan</name></author>
	<source>
		<id>https://www.bleepingcomputer.com/</id>
		<link href="https://www.bleepingcomputer.com/" rel="self"/>
		<updated>2023-10-02T15:01:06+00:00</updated>
		<title>BleepingComputer</title></source>

	<category term="security"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598846</id>
	<link href="https://hackernoon.com/hackernoon-releases-the-editing-protocol-technical-documentation-for-digital-publishing-at-scale?source=rss" rel="alternate" type="text/html"/>
	<title type="html">HackerNoon Releases “The Editing Protocol” - Technical Documentation for Digital Publishing at Scale</title>
	<summary type="html"><![CDATA[<p>:::tip
Learn More at EditingProtocol.com, where the HackerNoon CMS powers the most up-to-date techni...</p>]]></summary>
	<content type="html"><![CDATA[<p>:::tip
<strong>Learn More at EditingProtocol.com, where the HackerNoon CMS powers the most up-to-date technical documentation about The Editing Protocol</strong></p>
<p>:::</p>
<p>\
<strong><a href="http://hackernoon.com" rel="noopener noreferrer" target="_blank">HackerNoon</a></strong>, the independent technology publishing company, has released <strong><a href="http://editingprotocol.com/" rel="noopener noreferrer" target="_blank">The Editing Protocol</a></strong> to the public, a set of rules and guidelines that can be used by humans and machines to determine whether a story is worth publishing, how to specifically improve the story&rsquo;s content, and how to distribute the story with more reach and relevance.</p>
<p>\</p>
<h2>What is The Editing Protocol?</h2>
<p>One of the world leaders in online publishing, HackerNoon is home to over 45,000 published contributors. As a startup, the company was tasked with reviewing thousands of submissions a month with just a small team of editors. To do that, HackerNoon created a set of preliminary checks, rules, and quality guidelines that determine whether or not a story can be published, or should be rejected. This document was dubbed The Editing Protocol and can be read by humans to guide publishing at scale.&nbsp;</p>
<p>\</p>
<blockquote>
  <p>&ldquo;In publishing a hundred thousand stories, we&rsquo;ve learned best practices for how to improve and distribute professional technology content on the internet,&rdquo; said <strong><a href="http://hackernoon.com/about/David" rel="noopener noreferrer" target="_blank">HackerNoon Creator and CEO David Smooke</a></strong>. </p>
</blockquote>
<p>\</p>
<blockquote>
  <p>&ldquo;I&rsquo;m excited to open up this technical documentation for feedback, and continue integrating the most cutting-edge technologies into the Editing Protocol.&rdquo;&nbsp;</p>
</blockquote>
<p>\
To elevate the quality of published content, and optimize the user experience for contributors and readers alike, the editing protocol incorporates several inventive technologies, such as:</p>
<p>\</p>
<ul>
<li>An AI-powered (GPT-4) headline generator.</li>
<li>AI image generator models like Stable Diffusion XL, Stable Diffusion v2.1, Stable Diffusion v2.0, Stable Diffusion v1.5, Midjourney Diffusion, Kandinsky 2.2, and Kandinsky 2.1.</li>
<li>AI-generated content detection.</li>
<li>AI text translator.</li>
<li>AI TLDR generator.</li>
<li>Plagiarism checker.</li>
<li>Backlink checker bots.</li>
</ul>
<p>\
The protocol&rsquo;s guidelines are rule-based and can be easily converted into conditional statements. Once programmed, the protocol can allow human editors to focus on the quality and improvement of publishable stories, while the system automatically informs writers of what rule they have broken, or guidelines they have missed. With The Editing Protocol, small teams can publish content at scale, using both human editors and rule-based flagging systems to provide an efficient publishing process.&nbsp;</p>
<p>\
HackerNoon has already programmed a lot of the protocol into the custom CMS the company has built from the ground up. For instance, submissions that are below the minimum structural quality measure are automatically rejected, and writers are sent an email specifically stating how to improve the story they hope to publish before resubmitting.</p>
<p>\
Furthermore, there is a section in the protocol that highlights the importance of <strong><a href="https://editingprotocol.com/originality-score" rel="noopener noreferrer" target="_blank">originality score</a></strong>. As one of the most important aspects of online publishing is the visual presentation of the story, HackerNoon built an <strong><a href="https://hackernoon.com/ai-image-generation-in-the-hackernoon-editor-with-stable-diffusion" rel="noopener noreferrer" target="_blank">AI image generator</a></strong> into their CMS, allowing writers to create original images and help writers adhere to the protocol using the tech itself.</p>
<p>\
HackerNoon believes the protocol will not only guide human editors to better vet stories, but also help developers automate the tedious workflows within the traditional editorial review process.</p>
<p>\</p>
<h2>How to Use The Editing Protocol</h2>
<p>The full protocol can be viewed via <strong><a href="https://editingprotocol.com/" rel="noopener noreferrer" target="_blank">https://editingprotocol.com/</a></strong> which is hosted on HackerNoon&rsquo;s custom CMS builder.&nbsp;</p>
<p>\
With The Editing Protocol, HackerNoon aims to help make the internet better by getting rid of the noise&mdash;low-quality self-published articles, spammy content riddled with even spammier links, and a horde of other bad SEO practices that prioritize clicks at the expense of quality.&nbsp;</p>
<p>\
As the Internet changes with <strong><a href="https://hackernoon.com/p/web-two-and-a-half-documentary" rel="noopener noreferrer" target="_blank">the emergence of Web3 technologies</a></strong>, it is likely that The Editing Protocol, too, will change. As such, whenever rules or processes are added, removed, or updated, users can find them on <strong><a href="https://editingprotocol.com/" rel="noopener noreferrer" target="_blank">editingprotocol.com</a></strong>, and use that domain as the ground truth.&nbsp;</p>
<p>\n </p>]]></content>
	<updated>2023-10-02T15:00:04+00:00</updated>
	<author><name>HackerNoon Product Updates</name></author>
	<source>
		<id>https://hackernoon.com</id>
		<link href="https://hackernoon.com" rel="self"/>
		<updated>2023-10-02T15:00:04+00:00</updated>
		<title>Hacker Noon</title></source>

	<category term="digital-publishing-at-scale"/>

	<category term="editing-protocol"/>

	<category term="editing-protocol-overview"/>

	<category term="hackernoon-editing-protocol"/>

	<category term="hackernoon-product"/>

	<category term="hackernoon-top-story"/>

	<category term="the-editing-protocol"/>

	<category term="what-is-the-editing-protocol"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598795</id>
	<link href="https://packetstormsecurity.com/files/174865/junos_phprc_auto_prepend_file.rb.txt" rel="alternate" type="text/html"/>
	<title type="html">Juniper SRX Firewall / EX Switch Remote Code Execution</title>
	<summary type="html"><![CDATA[<p>This Metasploit module exploits a PHP environment variable manipulation vulnerability affecting Juni...</p>]]></summary>
	<content type="html"><![CDATA[<p>This Metasploit module exploits a PHP environment variable manipulation vulnerability affecting Juniper SRX firewalls and EX switches. The affected Juniper devices running FreeBSD and every FreeBSD process can access their stdin by opening /dev/fd/0. The exploit also makes use of two useful PHP features. The first being auto_prepend_file which causes the provided file to be added using the require function. The second PHP function is allow_url_include which allows the use of URL-aware fopen wrappers. By enabling allow_url_include, the exploit can use any protocol wrapper with auto_prepend_file. The module then uses data:// to provide a file inline which includes the base64 encoded PHP payload. By default this exploit returns a session confined to a FreeBSD jail with limited functionality. There is a datastore option JAIL_BREAK, that when set to true, will steal the necessary tokens from a user authenticated to the J-Web application, in order to overwrite the root password hash. If there is no user authenticated to the J-Web application this method will not work. The module then authenticates with the new root password over SSH and then rewrites the original root password hash to /etc/master.passwd.</p>]]></content>
	<updated>2023-10-02T15:00:02+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://packetstormsecurity.com/</id>
		<link href="https://packetstormsecurity.com/" rel="self"/>
		<updated>2023-10-02T15:00:02+00:00</updated>
		<title>Files ≈ Packet Storm</title></source>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598741</id>
	<link href="https://packetstormsecurity.com/news/view/35077/Critical-Vulnerabilities-In-Exim-Threaten-Over-250k-Email-Servers-Worldwide.html" rel="alternate" type="text/html"/>
	<title type="html">Critical Vulnerabilities In Exim Threaten Over 250k Email Servers Worldwide</title>
	<summary type="html"/>
	<content type="html"/>
	<updated>2023-10-02T14:54:29+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://packetstormsecurity.com/</id>
		<link href="https://packetstormsecurity.com/" rel="self"/>
		<updated>2023-10-02T14:54:29+00:00</updated>
		<title>News ≈ Packet Storm</title></source>

	<category term="email"/>

	<category term="flaw"/>

	<category term="hacker"/>

	<category term="headline"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598743</id>
	<link href="https://packetstormsecurity.com/news/view/35075/Recently-Patched-TeamCity-Vuln-Exploited-To-Hack-Servers.html" rel="alternate" type="text/html"/>
	<title type="html">Recently Patched TeamCity Vuln Exploited To Hack Servers</title>
	<summary type="html"/>
	<content type="html"/>
	<updated>2023-10-02T14:54:22+00:00</updated>
	<author><name/></author>
	<source>
		<id>https://packetstormsecurity.com/</id>
		<link href="https://packetstormsecurity.com/" rel="self"/>
		<updated>2023-10-02T14:54:22+00:00</updated>
		<title>News ≈ Packet Storm</title></source>

	<category term="flaw"/>

	<category term="hacker"/>

	<category term="headline"/>

	<category term="patch"/>


</entry>

<entry>
	<id>tag:rss.biapy.fr,2023-10-02:/598720</id>
	<link href="https://www.silicon.fr/magic-quadrant-gestion-conteneurs-471890.html" rel="alternate" type="text/html"/>
	<title type="html">Dix ans après Docker, les principales plates-formes de conteneurs</title>
	<summary type="html"><![CDATA[<p>Six fournisseurs sont &laquo; leaders &raquo; dans le premier Magic Quadrant de la gestion des conteneurs. &Agrave; que...</p>]]></summary>
	<content type="html"><![CDATA[<p>Six fournisseurs sont &laquo; leaders &raquo; dans le premier Magic Quadrant de la gestion des conteneurs. &Agrave; quels titres ?</p>]]></content>
	<updated>2023-10-02T14:32:45+00:00</updated>
	<author><name>Clément Bohic</name></author>
	<source>
		<id>http://www.silicon.fr</id>
		<link href="http://www.silicon.fr" rel="self"/>
		<updated>2023-10-02T14:32:45+00:00</updated>
		<title>silicon.fr</title></source>

	<category term="magic quadrant"/>

	<category term="microservices"/>


	<link href="https://www.silicon.fr/wp-content/uploads/2020/11/Conteneurs-hyperscalers.jpg" length="38737" rel="enclosure" type="image/jpeg"/>

</entry>


</feed><!-- vim:ft=xml
	  -->