AWS 서버리스 챗봇 경진대회에 참여하세요!

2016-08-11 KENNETH 0

AWS 서버리스 챗봇 경진대회에 참여하세요! 유명 인기 협업 메신저인 Slack과 함께 AWS Serverless Chatbot Competition 행사를 개최합니다. 여러분이 AWS Lambda와 Amazon API Gateway 서비스를 활용하여, Slack용  챗봇 개발에 관심이 있으시다면 많이 참여해 주시기 바랍니다.  Slack Events API  및 다른 AWS  서비스와 데이터 소스를 활용하여 슬랙 사용자에게 도움이 될만한 창의적이고 독특한 서비스를 제출 하시면 됩니다. AWS 무료 티어를 활용하시면, AWS Lambda, API Gateway 및 다른 AWS 서비스를 무료로 개발 시 활용하실 수 있습니다. 신규 및 기존 사용자는 AWS Lambda에 대해 월 백만 회 및  400,000 GB-초당 컴퓨팅이 무료입니다. 신규 사용자에 대해서 월 1백만 API 호출이 12개월 동안 무료이기도 하구요. 챗봇 제작 및 알리기 여러분이 만든 챗봇을 다른 사람들이 이해하기 쉽게 좀 더 잘 설명하고, 알릴 수 있도록 아래와 같은 과정을 거치기를 권장 드립니다. 챗봇이 동작하는 데모 동영상 만들기 무엇이 독창적인지 간단한 설명 문서 만들기 챗봇을 동작시키기 위한 코드와 설치 방법을 GitHub에 [ more… ]

No Image

RHBA-2016:1591-1: udev bug fix update

2016-08-11 KENNETH 0

RHBA-2016:1591-1: udev bug fix update Red Hat Enterprise Linux: Updated udev packages that fix one bug are now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Source: RHBA-2016:1591-1: udev bug fix update

No Image

RHBA-2016:1590-1: udev bug fix update

2016-08-11 KENNETH 0

RHBA-2016:1590-1: udev bug fix update Red Hat Enterprise Linux: Updated udev packages that fix one bug are now available for Red Hat Enterprise Linux 6.6 Extended Update Support. Source: RHBA-2016:1590-1: udev bug fix update

No Image

USN-3059-1: xmlrpc-epi vulnerability

2016-08-11 KENNETH 0

USN-3059-1: xmlrpc-epi vulnerability Ubuntu Security Notice USN-3059-1 10th August, 2016 xmlrpc-epi vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary xmlrpc-epi could be made to crash or run programs if it processed specially crafted data. Software description xmlrpc-epi – a XML-RPC request library Details It was discovered that xmlrpc-epi incorrectly handled lengths in thesimplestring_addn function. A remote attacker could use this issue to causeapplications using xmlrpc-epi such as PHP to crash, resulting in a denialof service, or possibly execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: libxmlrpc-epi0 0.54.2-1.1ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2016-6296 Source: USN-3059-1: xmlrpc-epi vulnerability

No Image

USN-3060-1: GD library vulnerabilities

2016-08-11 KENNETH 0

USN-3060-1: GD library vulnerabilities Ubuntu Security Notice USN-3060-1 10th August, 2016 libgd2 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary The GD library could be made to crash or run programs if it processed a specially crafted image file. Software description libgd2 – GD Graphics Library Details It was discovered that the GD library incorrectly handled certain malformedTGA images. If a user or automated system were tricked into processing aspecially crafted TGA image, an attacker could cause a denial of service.(CVE-2016-6132, CVE-2016-6214) It was discovered that the GD library incorrectly handled memory when usinggdImageScale(). A remote attacker could possibly use this issue to cause adenial of service or possibly execute arbitrary code. (CVE-2016-6207) Update instructions The problem can be corrected by updating your system to the following package version: [ more… ]