🧮 USERS:1 FEEDS:2 TWTS:1353 ARCHIVED:87369 CACHE:2680 FOLLOWERS:22 FOLLOWING:14
Maybe you’ll enjoy this as well:
I still have one of my first modems, a Creatix LC 144 VF:
I think this was the modem that I used when I first connected to the internet, but I’m not sure.
I plugged it in again and it still works:
The firmware appears to be from 1994, which sounds about right. I don’t think we had internet access before that. We certainly did use local mailboxes, though. (Or BBS’s, as you might call them.)
I now want to actually use that modem again. For the moment, I can only use a phone to dial into it, I lack a second modem to actually establish a connection. Here’s a video:
Not spectacular, but the modem does answer after me entering ATA.
I bought another cheap old modem on eBay and am now waiting for it to arrive. Once it’s here, I want to simulate an actual dial-up session, hopefully from OS/2 or Windows 3.x.
Trump crashes Russian stock market: minus US$1 billion in few hours ⌘ Read more
Drones hit Russia’s Shahed drone factory 1,200 km from Ukraine again ⌘ Read more
支付寶證書原理和使用 Golang 集成
支付寶證書驗證機制是保障交易安全的核心環節,主要是基於 PKI(公鑰基礎設施)體系構建。其驗證流程包含以下幾個關鍵部分:1,證書體系支付寶使用兩套證書,應用證書和支付寶根證書。應用證書由開發者上傳到支付寶開放平臺,支付寶根證書用於驗證支付寶返回數據的真實性。2,簽名驗證流程請求時,開發者使用私鑰對請求參數簽名,支付寶使用應用公鑰驗證。響應時,支付寶使用私鑰對返回數據簽名,開發者使用支付寶公鑰驗證。 ⌘ Read more
支付寶證書原理和使用 Golang 集成
支付寶證書驗證機制是保障交易安全的核心環節,主要是基於 PKI(公鑰基礎設施)體系構建。其驗證流程包含以下幾個關鍵部分:1,證書體系支付寶使用兩套證書,應用證書和支付寶根證書。應用證書由開發者上傳到支付寶開放平臺,支付寶根證書用於驗證支付寶返回數據的真實性。2,簽名驗證流程請求時,開發者使用私鑰對請求參數簽名,支付寶使用應用公鑰驗證。響應時,支付寶使用私鑰對返回數據簽名,開發者使用支付寶公鑰驗證。 ⌘ Read more
微服務架構:必懂的 5 種設計模式
1. Database per Service (每個服務一個數據庫)目標 / 目的實現微服務之間的松耦合。 增強服務的獨立性、可伸縮性和數據封裝。 關鍵概念 / 工作方式每個微服務管理自己的私有數據庫。 數據庫只能由擁有該服務的服務訪問。 強制執行清晰的邊界並促進單一職責原則。 數據隔離 減少服務之間的依賴。 技術靈活性 服務可以使 ⌘ Read more
From Zero to $1000/Month | Bug Bounty Automation Blueprint
Proven Tactics, Tools, and Code to Automate Your Way to Consistent Bounties
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/from-zero-to-1000-month-bug-boun … ⌘ Read more
️My Top 7 Mistakes as a New Bug Hunter (And How to Avoid Them)
Free Article Link only for you
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/%EF%B8%8Fmy-top-7-mistakes-as-a-new-bug-hunter- … ⌘ Read more
** The Misconfigured Magnet: How Public Buckets Exposed Millions of User Files **
Hey there😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-misconfigured-magnet-how-public-buck … ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1352 ARCHIVED:87359 CACHE:2686 FOLLOWERS:22 FOLLOWING:14
[47°09′25″S, 126°43′37″W] Reading: 1.51000 PPM
UE1 homebrew 1-bit vacuum computer in action
full series playlist
🧮 USERS:1 FEEDS:2 TWTS:1351 ARCHIVED:87339 CACHE:2704 FOLLOWERS:22 FOLLOWING:14
One of the nicest things about Go is the language itself, comparing Go to other popular languages in terms of the complexity to learn to be proficient in:
- Go:
25keywords (Stack Overflow); CSP-style concurrency (goroutines & channels)
- Python 2:
30keywords (TutorialsPoint); GIL-bound threads & multiprocessing (Wikipedia)
- Python 3:
35keywords (Initial Commit); GIL-bound threads,asyncio& multiprocessing (Wikipedia, DEV Community)
- Java:
50keywords (Stack Overflow); threads +java.util.concurrent(Wikipedia)
- C++:
82keywords (Stack Overflow);std::thread, atomics & futures (en.cppreference.com)
- JavaScript:
38keywords (Stack Overflow); single-threaded event loop &async/await, Web Workers (Wikipedia)
- Ruby:
42keywords (Stack Overflow); GIL-bound threads (MRI), fibers & processes (Wikipedia)
@movq@www.uninformativ.de i feel like when i read go code i’m reading some algebra shit where every part is 1-5 letters long and then there’s weird symbols like := and it’s just infinitely harder for me to parse and infer meaning from lol. it’s such a me problem
More than 1,900 Americans applied for UK citizenship as Trump began second term ⌘ Read more
Tom Homan is costing American taxpayers $1 million a month: reporter
Sarah K. Burris, Senior Digital Editor - Raw Story
_Stephan: Did you know that you and I are spending one million dollars a month protecting the thug Tom Homan, whom aspiring dictator Trump has appointed “Border Czar”? No, neither did I, but we are. As I read this report, all I could think about was how many children would get school lunches for $1,000,000 a month if Trump and the MAGAt … ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1350 ARCHIVED:87332 CACHE:2725 FOLLOWERS:22 FOLLOWING:14
U.S. reports cases of new COVID variant NB.1.8.1 behind surge in China ⌘ Read more
This is one of my attempts: 
$ go build ./cmd/xor/... && ./xor
Generation 95 | Fitness: 0.999964 | Nodes: 9 | Conns: 19
Target reached!
Best network performance:
[0 0] → got=0 exp=0 (raw=0.000) ✅
[0 1] → got=1 exp=1 (raw=0.990) ✅
[1 0] → got=1 exp=1 (raw=0.716) ✅
[1 1] → got=0 exp=0 (raw=0.045) ✅
Overall accuracy: 100.0%
Wrote best.dot – render with `dot -Tpng best.dot -o best.png`
Trump recommends 50% tariff on European Union starting June 1 ⌘ Read more
[47°09′27″S, 126°43′08″W] Reading: 1.15000 PPM
fit 1 $ spin (saw 0.1 * sign fxy) $ rect 0 1 - rect 0 0.99 >> add;#punctual #livecoding #creativecoding #videoart
🧮 USERS:1 FEEDS:2 TWTS:1349 ARCHIVED:87324 CACHE:2738 FOLLOWERS:22 FOLLOWING:14
Five new stable kernels
Greg Kroah-Hartman has announced the release of the 6.14.8, 6.12.30, 6.6.92, 6.1.140, and 5.15.184 stable kernels. As usual, each
contains a long list of important fixes throughout the kernel tree. ⌘ Read more
Adafruit Hit With $36K Tariff Bill on 1,000 lbs of Electronics
Adafruit CEO responds to The Lunduke Journal with details and stays non-political about changing tariffs. ⌘ Read more
Review: Satechi’s Foldable 3-in-1 Charger Maximizes Portability
Satechi, known for its range of accessories for Apple products, recently came out with a new series of OntheGo Wireless Chargers that are perfect for bringing along on trips due to their compact size.
There are two models, a 3-in-1 charger and a 2-in-1 charger. The 3-in-1 option has a Qi2 charging surface for an iPhone, an AirPod … ⌘ Read more
[$] LWN.net Weekly Edition for May 22, 2025
Inside this week’s LWN.net Weekly Edition:
Front: Home Assistant; Setuptools; Debian AI GR; DMA-mapping API; BPF CI; OSPM 2025
Briefs: Go audit; Oniux; Asahi progress; Rust in FreeBSD; RHEL 10; Rust 1.87.0; RIP John L. Young; Quote; …
Announcements: Newsletters, conferences, security updates, patches, and more. ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1348 ARCHIVED:87166 CACHE:2773 FOLLOWERS:22 FOLLOWING:14
[47°09′29″S, 126°43′22″W] Reading: 1.45 Sv
[$] Recent disruptive changes from Setuptools
In late March, version 78.0.1 of Setuptools — an important
Python packaging tool — was released. It was scarcely half an hour before
the first bug\
report came in, and it quickly became clear that the change was far
more disruptive than anticipated. Within only about five hours [78.0.2 was\
published to roll back the change](https://setuptools.pypa.io/e … ⌘ Read more
Security updates for Wednesday
Security updates have been issued by AlmaLinux (.NET 8.0, avahi, buildah, compat-openssl10, compat-openssl11, expat, firefox, gimp, git, grafana, libsoup, libxslt, mod_auth_openidc, nginx, nodejs:22, osbuild-composer, php, redis, redis:7, skopeo, thunderbird, vim, webkit2gtk3, xterm, and yelp), Arch Linux (dropbear, freetype2, go, nodejs, nodejs-lts-iron, nodejs-lts-jod, python-django, webkit2gtk, webkit2gtk-4.1, webkitgtk-6.0, and wpewebkit), Debian (mongo-c-driver), Fedora (openssh, … ⌘ Read more
** They Missed This One Tiny Parameter — I Made $500 Instantly**
✨Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/they-missed-this-one-tiny-parameter-i-made-500-instantly-f2f7d1c1c1d9?source=rss—-7 … ⌘ Read more
The Battle for Python’s Soul: How uv is Challenging pip’s Championship Reign
The stadium lights flicker on. The crowd falls silent. In the blue corner, weighing in with over a decade of dominance and … ⌘ Read more
解密轉轉收銀臺背後的路由系統
1 引言—-在電商交易場景中,支付環節是整個用戶購物環節中的關鍵節點。用戶從搜索、推薦、瀏覽、比較、加購、下單,到最終的支付環節,每一步都經歷了層層漏斗的篩選。當用戶到達支付環節時,已經展現出強烈的購買意向,這時的流量價值已經遠超最初環節。支付環節的體驗直接關係到最終的成交轉化,因此收銀臺不僅要確保支付流程的順暢,更要保證支付的安全性和可靠性。隨着業務規模的不斷擴大,支付場景的日益複雜,如何構 ⌘ Read more
如何畫架構圖 - 軟件設計架構師必學的一門課
前言:是時候乾點正事了,架構圖在做架構設計的時候尤爲重要,有了架構圖,很多時候你能給別人講清楚一些技術上的事情。常見架構圖的分類常見架構圖的畫法2.1 業務架構定義:描述系統對用戶提供了什麼業務功能,類似於 4+1 視圖的場景視圖。技巧:通過不同的顏色來標識業務狀態;業務分組管理。示例:2.2 客戶端架構、前端架構定義:客戶端和前端的領域邏輯架構,類似於 4+1 視圖的邏輯視圖。技巧:通過不同顏色 ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1347 ARCHIVED:87160 CACHE:2773 FOLLOWERS:22 FOLLOWING:14
[47°09′01″S, 126°43′44″W] Reading: 1.09000 PPM
$1 Million Tax Payer Grant for “Gender Inclusive Open Source”
A cancelled grant, worth a million bucks, for Oregon State University to create “best practices for fixing gender-bias bugs”. ⌘ Read more
Rabbit Store | TryHackMe Medium
Problems: What is user.txt? What is root.txt? Solution: First of all we get a IP address so I preformed an NMAP scan discovering ports…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/rabbit-store-tryhackme-medium-f9f5069fbb50?source=r … ⌘ Read more
Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.
[Continue reading … ⌘ Read more
Build Your Own AI SOC — Part 7 Build a Security Knowledge Assistant With RAG + GPT
From Search to Understanding
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/build-you … ⌘ Read more
Exciting Cybersecurity Careers That Don’t Require Coding
Do you believe that cybersecurity is only for programmers who are bent over keyboards, typing code after code to ward off hackers? Rethink…
[Continue reading on InfoSec Write-ups »] … ⌘ Read more
Writing Pentest Reports | TryHackMe Write-Up | FarrosFR
Non-members are welcome to access the full story here. Write-Up by FarrosFR | Cybersecurity
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/writing-pentest-reports-tryhackme-wri … ⌘ Read more
Part 3:1 — Electron-Based App Security Testing Fundamentals - Extract & Analyze .asar ⌘ Read more
Part 1 — Electron-Based App Security Testing Fundamentals — Introduction to Electron Framework ⌘ Read more
OpenAI 公開 Codex 系統提示詞
昨天,OpenAI 發佈了一個新功能:Codex。一個在雲端運行的 Coding Agent。體驗鏈接:chatgpt.com/codex可以處理包括跑現成代碼、解答 Github 上的項目、修復 BUG 以及提 PR 等功能。目前還不能聯網,不能裝包,只能基於倉庫裏已有的代碼 + 提前配置好的環境進行工作。Codex 背後的模型來自 codex-1,基於 OpenAI o3 微調,專門針對軟件工 ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1346 ARCHIVED:87151 CACHE:2786 FOLLOWERS:22 FOLLOWING:14
** “Before injection, understanding” — What every hacker needs to master before exploiting a NoSQL…**
NoSQL database types
[Continue reading on InfoSec Write-ups »](https: … ⌘ Read more
Apple Stops Signing iOS 18.4.1
Apple today stopped signing iOS 18.4.1, a week after releasing the iOS 18.5 update. Because iOS 18.4.1 is no longer being signed, iPhone users who upgraded to iOS 18.5 are no longer able to downgrade to the previous version of iOS.
“Signing” is a server-side verification chec … ⌘ Read more
My baby turned 1 ⌘ Read more
$4,500 Bounty: SQL Injection in WordPress Plugin Leads to PII Exposure at Grab
How a Plugin Preview Feature Exposed User Data and Nearly Enabled Admin Dashboard Pivoting
[Continue reading on Info … ⌘ Read more
I Broke Rate Limits and Accessed 1000+ User Records — Responsibly
👉Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/i-broke-rate-limits-and-accessed-1000-user-records-responsibly-8c45f … ⌘ Read more
Crypto Failures | TryHackMe Medium
Questions: What is the value of the web flag? What is the encryption key? Solution: We are firstly given an IP address. I preformed a…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/crypto-failures-tryhackme-medium-d60d55b849 … ⌘ Read more
$20,000 Bounty: How a Leaked Session Cookie Led to Account Takeover on HackerOne
How one accidental copy-paste exposed sensitive data and what you can learn to find similar bugs
[Continue rea … ⌘ Read more
Strengthening Web service security with Apache2: Best practices for 2025
Keeping your Apache2 web services safe: What you need to know this year
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
Boardcon Idea3576 SBC Showcases RK3576 SoC with CAN Bus and Dual Gigabit Ethernet
Boardcon has recently introduced the Idea3576, a compact single-board computer built around the Rockchip RK3576. Key features include CAN, RS485, 4G connectivity, and support for Debian 12. The SoC features an octa-core configuration with four Cortex-A72 cores clocked at 2.2GHz and four Cortex-A53 cores at 1.8GHz, enabling a hybrid big.LITTLE setup. It also integrates a […] ⌘ Read more
Go 語言中字符串四種拼接方式的性能對比,哪個更勝一籌?
在 Go 語言開發中,字符串拼接是最常見的操作之一。不同的拼接方式在性能上可能有數量級的差異,特別是在高頻調用或大數據量處理的場景下。本文將使用標準基準測試,全面對比四種主流字符串拼接方式的性能表現。測試環境與方法測試環境Go 版本:1.20+ 操作系統:macOS/Windows/Linux CPU:8 核 測試方法我們創建了一個完整的基準測試文件echobenchtest.g ⌘ Read more
Go 語言中字符串四種拼接方式的性能對比,哪個更勝一籌?
在 Go 語言開發中,字符串拼接是最常見的操作之一。不同的拼接方式在性能上可能有數量級的差異,特別是在高頻調用或大數據量處理的場景下。本文將使用標準基準測試,全面對比四種主流字符串拼接方式的性能表現。測試環境與方法測試環境Go 版本:1.20+ 操作系統:macOS/Windows/Linux CPU:8 核 測試方法我們創建了一個完整的基準測試文件echobenchtest.g ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1345 ARCHIVED:87142 CACHE:2783 FOLLOWERS:22 FOLLOWING:14
[47°09′49″S, 126°43′54″W] Raw reading: 0x682A2E32, offset +/-1
Build Your Own AI SOC — Part 6 Daily AI-Powered Threat Briefings With n8n + GPT
Introduction: Information Without Overload
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/buil … ⌘ Read more
** Redirect Roulette: How Poor OAuth Redirect Handling Gave Me Account Takeover **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/redirect-roulette-how-poor-oauth-red … ⌘ Read more
5 Linux Commands You’ve Probably Never Heard Of
In this article, I will show you five Linux commands you’ve probably never heard of. They’re simple, practical, and designed to make your…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c … ⌘ Read more
$750 Bounty: for HTTP Request Smuggling on Data.gov
How a cleverly crafted desync attack revealed a hidden path to client-side compromise, JS injection and potential cookie theft
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
The Most Dangerous Bug I’ve Ever Found (And No One Was Looking)
👉Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-most-dangerous-bug-ive-ever-found-and-no-one-was-looking-2e96e5079a01? … ⌘ Read more
Sharpening Command Injections to get Full RCE
Uncommon Bash tricks to Bypass WAF and achieve Remote Code Execution (RCE)
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/sharpening-command-injections-to-get-full-rce-e4cf257d2c66?source= … ⌘ Read more
**Token of Misfortune: How a Refresh Token Leak Let Me Regenerate Unlimited Sessions **
Free Link 🎈
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/token-of-misfortune … ⌘ Read more
Five more stable kernels
The
6.14.7,
6.12.29,
6.6.91,
6.1.139, and
5.15.183
stable kernel updates have been released; each contains another set of
important fixes. ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1344 ARCHIVED:87123 CACHE:2785 FOLLOWERS:22 FOLLOWING:14
$10,500 Bounty: A Grammarly Account Takeover Vector
When a Space Breaks the System: How Improper Entity Validation Led to a Full SSO Denial and Potential Account Takeovers
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/10-500- … ⌘ Read more
How I Gained Root Access on a Vulnerable Web Server: From Reconnaissance to Privilege Escalation
Web Server Exploitation & Privilege Escalation - Full Walkthr … ⌘ Read more
0 to First Bug: What I’d Do Differently If I Started Bug Bounty Today
Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/0-to-first-bug-what-id-do-differently-if-i-started-bug … ⌘ Read more
I Built a Tool to Hack AI Models — Here’s What It Uncovered
A few months ago, I was auditing a chatbot deployed inside a financial services platform. It used a mix of retrieval-augmented generation…
[Continue reading on InfoSec Write-ups »](http … ⌘ Read more
**Caching Trouble: The Public Cache That Leaked Private User Data **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/caching-trouble-the-public-cache-that-leaked-private-user-data-0d410af5cb4c … ⌘ Read more
$500 Bounty: A Referer Leak in Brave’s Private Tor Window
When Anonymity Isn’t Anonymous: $500 Bounty for Revealing a Brave Referer Exposure
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/500-bounty-a-referer-leak-in … ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1343 ARCHIVED:87117 CACHE:2785 FOLLOWERS:22 FOLLOWING:14
@bender@twtxt.net Just to save some unnecessary und useless network traffic. :-) So that I can download more 1080p videos!!1
Apple Again Named the World’s Most Valuable Brand
Apple has been named the most valuable global brand for the fourth consecutive year, according to the 2025 edition of Kantar’s BrandZ report, with its brand now valued at $1.29 trillion — a year-over-year increase of 28%.
The latest Kantar BrandZ Global Top 100 ranking … ⌘ Read more
Part-2️♂️Bug Bounty Secrets They Don’t Tell You: Tricks From 100+ Reported Bugs
✨Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwri … ⌘ Read more
$500 Bounty: Race Condition in Hacker101 CTF Group Join
$500 for discovering a timing flaw in Hacker101’s invite system that let users join the same team multiple times
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/50 … ⌘ Read more
How a Simple Logic Flaw Led to a $3,250 Bounty
Claiming Unclaimed Restaurants on Zomato via OTP Manipulation
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-a-simple-logic-flaw-led-to-a-3-250-bounty-476d747bf57a?source=rss—-7b722 … ⌘ Read more
is there an idiomatic 1-command way to delete from suffix to end of some line later ⌘ Read more
🧮 USERS:1 FEEDS:2 TWTS:1342 ARCHIVED:87106 CACHE:2787 FOLLOWERS:22 FOLLOWING:14
On my blog: Real Life in Star Trek, Descent, part 1 https://john.colagioia.net/blog/2025/05/15/descent-1.html #scifi #startrek #closereading