[47°09′34″S, 126°43′49″W] Raw reading: 0x68964931, offset +/-4
Mas que sarilho é este em que me meti?
(Spoiler alert: @o_sarilho@o_sarilho ! )
(Just for fun, SuSE Linux 6.4 from ~25 years ago: https://movq.de/v/dc62d0256c/s.png )
@lyse@lyse.isobeef.org @kat@yarn.girlonthemoon.xyz Colorized manpages have been a thing for a very long time:
https://movq.de/v/81219d7f7a/s.png
Problem is, hardly anybody knows this, because you configure this by … drumroll … overwriting TERMCAP entries of less in your ~/.bashrc:
export LESS_TERMCAP_md=$'\e[38;5;3m' # Bold
export LESS_TERMCAP_me=$'\e[0m' # End Bold
export LESS_TERMCAP_us=$'\e[4;38;5;6m' # Underline
export LESS_TERMCAP_ue=$'\e[0m' # End Underline
export GROFF_NO_SGR=1 # Needed since groff 1.23
@kat@yarn.girlonthemoon.xyz https://snippets.4-walls.net/kat/890f9db00b1940679161d0348b28c339
@lyse@lyse.isobeef.org 4 years. 🫤
i am having fun with dmenu
https://bytes.4-walls.net/kat/dotfiles/src/branch/main/config/.local/bin/dict
https://bytes.4-walls.net/kat/dotfiles/commit/b5ca2e0eaba3cbc0cf0898926ffcb0bb064d17c7
@kat@yarn.girlonthemoon.xyz NVM i stole other peoples code to make a dictionary lookup script https://bytes.4-walls.net/kat/dotfiles/src/branch/main/config/.local/bin/dict
@lyse@lyse.isobeef.org @kat@yarn.girlonthemoon.xyz I spent so much time in the past figuring out if something is a dict or a list in YAML, for example.
What are the types in this example?
items:
- part_no: A4786
descrip: Water Bucket (Filled)
price: 1.47
quantity: 4
- part_no: E1628
descrip: High Heeled "Ruby" Slippers
size: 8
price: 133.7
quantity: 1
items is a dict containing … a list of two other dicts? Right?
It is quite hard for me to grasp the structure of YAML docs. 😢
The big advantage of YAML (and JSON and TOML) is that it’s much easier to write code for those formats, than it is with XML. json.loads() and you’re done.
[47°09′59″S, 126°43′41″W] Raw reading: 0x687DC951, offset +/-4
The WM_CLASS Property is used on X11 to assign rules to certain windows, e.g. “this is a GIMP window, it should appear on workspace number 16.” It consists of two fields, name and class.
Wayland (or rather, the XDG shell protocol – core Wayland knows nothing about this) only has a single field called app_id.
When you run X11 programs under Wayland, you use XWayland, which is baked into most compositors. Then you have to deal with all three fields.
Some compositors map name to app_id, others map class to app_id, and even others directly expose the original name and class.
Apparently, there is no consensus.
@movq@www.uninformativ.de Yeah, it’s a shitshow. MS overconfirms all my prejudices constantly.
Ignoring e-mail after lunch works great, though. :-)
Our timetracking is offline for over a week because of reasons. The responsible bunglers are falling by the skin of their teeth: https://lyse.isobeef.org/tmp/timetracking.png
- The error message neither includes the timeframe nor a link to an announcement article.
- The HTML page needs to download JS in order to display the fucking error message.
- Proper HTTP status codes are clearly only for big losers.
- Despite being down, heaps of resources are still fetched.
I find it really fascinating how one can screw up on so many levels. This is developed inhouse, I’m just so glad that we’re not a software engineering company. Oh wait. How embarrassing.
@prologic@twtxt.net Yeah, this really could use a proper definition or a “manifest”. 😅 Many of these ideas are not very wide spread. And I haven’t come across similar projects in all these years.
Let’s take the farbfeld image format as an example again. I think this captures the “spirit” quite well, because this isn’t even about code.
This is the entire farbfeld spec:
farbfeld is a lossless image format which is easy to parse, pipe and compress. It has the following format:
╔════════╤═════════════════════════════════════════════════════════╗
║ Bytes │ Description ║
╠════════╪═════════════════════════════════════════════════════════╣
║ 8 │ "farbfeld" magic value ║
╟────────┼─────────────────────────────────────────────────────────╢
║ 4 │ 32-Bit BE unsigned integer (width) ║
╟────────┼─────────────────────────────────────────────────────────╢
║ 4 │ 32-Bit BE unsigned integer (height) ║
╟────────┼─────────────────────────────────────────────────────────╢
║ [2222] │ 4x16-Bit BE unsigned integers [RGBA] / pixel, row-major ║
╚════════╧═════════════════════════════════════════════════════════╝
The RGB-data should be sRGB for best interoperability and not alpha-premultiplied.
(Now, I don’t know if your screen reader can work with this. Let me know if it doesn’t.)
I think these are some of the properties worth mentioning:
- The spec is extremely short. You can read this in under a minute and fully understand it. That alone is gold.
- There are no “knobs”: It’s just a single version, it’s not like there’s also an 8-bit color depth version and one for 16-bit and one for extra large images and one that supports layers and so on. This makes it much easier to implement a fully compliant program.
- Despite being so simple, it’s useful. I’ve used it in various programs, like my window manager, my status bars, some toy programs like “tuxeyes” (an Xeyes variant), or Advent of Code.
- The format does not include compression because it doesn’t need to. Just use something like bzip2 to get file sizes similar to PNG.
- It doesn’t cover every use case under the sun, but it does cover the most important ones (imho). They have discussed using something other than RGBA and decided it’s not worth the trouble.
- They refrained from adding extra baggage like metadata. It would have needlessly complicated things.
Sem palavras pra descrever esta baixeza de artigo:
é citado um único estudo baseado em testemunhos de alunos (ficam de fora pais e profs), um estudo qualitativo por isso não generalizável. Mm assim, os autores do artigo copiam as conclusões do estudo, e o Público tb parece estar ok com artigos decalcados
os autores do artigo são consultores que dão formação a pais e educadores sobre problemas do digital nas crianças, por isso basear opinião apenas num estudo q os ignora é ainda mais wtf
argumento de q crianças têm acesso a dispositivos fora da escola é parvo - tb têm acesso a tabaco e álcool, por isso tb os devemos permitir na escola? come on
e é muito conveniente clamar pela regulamentação das redes sociais sem especificar a forma (proibir anúncios? introduzir idades mínimas? não sabemos).
No final é o costume, os pais e profs que se desenmerdem, a responsabilidade é deles e não das empresas que criam mecanismos de viciação, claro
** Om nom nom LLMs, in which I respond to Simon Willison’s analogy **
I am hesitant to wade into the tumultuous waters that are the discourse around generative AI and LLMs, but this morning I came across a thing that so thoroughly melted my brain I feel uncontrollably compelled to respond.
This morning, at evidently 4:10 AM (no mention of timezone), Simon Willison shared the following blog post, quoted here in full:
Quitting programming as … ⌘ Read more
[47°09′52″S, 126°43′06″W] Raw reading: 0x6864BCD1, offset +/-4
[47°09′35″S, 126°43′09″W] Raw reading: 0x685A4CF2, offset +/-4
Exigimos ao governo de Portugal o mínimo. Que:
Condene a agressão ilegal ao Irão por parte de Israel e dos Estados Unidos da América;
Proíba o uso de infraestruturas e do espaço aéreo português para qualquer tipo de apoio aos ataques;
Aplique sanções ao Estado de Israel pelas suas consecutivas violações do Direito Internacional e pelo genocídio em curso na Palestina;
Reconheça de imediato o Estado da Palestina.
Assina-se aqui: https://actionnetwork.org/forms/parar-a-guerra/
Saw this on Mastodon:
https://racingbunny.com/@mookie/114718466149264471
18 rules of Software Engineering
- You will regret complexity when on-call
- Stop falling in love with your own code
- Everything is a trade-off. There’s no “best” 3. Every line of code you write is a liability 4. Document your decisions and designs
- Everyone hates code they didn’t write
- Don’t use unnecessary dependencies
- Coding standards prevent arguments
- Write meaningful commit messages
- Don’t ever stop learning new things
- Code reviews spread knowledge
- Always build for maintainability
- Ask for help when you’re stuck
- Fix root causes, not symptoms
- Software is never completed
- Estimates are not promises
- Ship early, iterate often
- Keep. It. Simple.
Solid list, even though 14 is up for debate in my opinion: Software can be completed. You have a use case / problem, you solve that problem, done. Your software is completed now. There might still be bugs and they should be fixed – but this doesn’t “add” to the program. Don’t use “software is never done” as an excuse to keep adding and adding stuff to your code.
@prologic@twtxt.net … or just bullshit.
I’m Alex, COO at ColdIQ. Built a $4.5M ARR business in under 2 years.
Some “C-level” guy telling people what to do, yeah, I have my doubts.
@movq@www.uninformativ.de make that 4 people! i use plain text when i can because this page convinced me lmfao
@movq@www.uninformativ.de Me too 😅 – Speaking of which i know you’ve lost a bit of “mojo” or “energy” (so have i of late), rest assured, I want to keep the status quo here with what we’ve built, keep it simple and change very little. What we’ve built has worked very well for 5+ years and we have at least 3 very strong clients (maybe 4 or 5?).
@movq@www.uninformativ.de Ahh but it kind of is mine 😅 Or at least I’ve done this kind of thing at least 3 or 4 times now 🤣
É por isso imperioso que não baixemos a guarda, que não nos deixemos intimidar, e que não tenhamos medo de quem nos quer vencer pelo medo. Resistir, sempre!
4/4
Essa tentativa de revisionismo é uma afronta a todos os que sofreram sob o jugo da ditadura. Mais grave ainda é a postura ostensivamente ofensiva e arrogante que o “professor” tem perante quem se identifica com ideais de Esquerda. Em vez de promover o debate democrático, Mithá Ribeiro opta pela caricatura e pelo insulto, tratando os seus opositores ideológicos como inimigos a abater. O autor de “Um século de escombros”, livro que dedicou, entre outros, a Steve Bannon (o fascista que arquitetou a linha política seminal de Trump) demoniza o pensamento progressista, rotulando-o de forma simplista e maliciosa, como se defender a justiça social, igualdade ou direitos humanos fosse sinónimo de ignorância, fragilidade ou subversão.
Num momento em que o discurso público exige responsabilidade e rigor, a presença de figuras como Mithá Ribeiro nos espaços de decisão e influência representa um retrocesso. A sua glorificação de um passado ditatorial e o desrespeito constante pelas vozes divergentes são sinais claros de um projeto político que rejeita a convivência democrática e que procura, através da provocação, normalizar a intolerância e a ignorância histórica. Esta retórica despudorada corrói a democracia e instiga o ódio.
¾
#CoopAzine N.º 4 (Maio 2025)
20 Years of the Open Invention Network
The Open Invention Network (OIN) is celebrating
its 20th anniversary.
The central feature of the OIN community is a patent cross-license
that covers core Open Source functionality and expands in parallel
with the growth of Open Source technology. As growth in Open Source
has accelerated, OIN has proactively expanded the scope of the OIN
license’s benefit by including more than 4,500 software components … ⌘ Read more
Security updates for Tuesday
Security updates have been issued by Debian (python-django), Fedora (krb5), Mageia (cockpit, golang, kernel, and kernel-linus), SUSE (augeas, go1.23, go1.24, iputils, libwebp, transfig, and xen), and Ubuntu (amd64-microcode, apport, linux-azure, linux-azure, linux-azure-4.15, linux-azure-fips, linux-raspi, systemd, and tomcat). ⌘ Read more
Ghost in the Network ⌘ Read more
Cracking JWTs: A Bug Bounty Hunting Guide [Part 6] ⌘ Read more
GraphQL Gatecrash: When an Introspection Query Opened the Whole Backend ️
Free Link 🎈
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/graphql-gatecrash-when-an-intro … ⌘ Read more
Practical study material OSWP Part 3: WEP Walkthrough ⌘ Read more
Practical study material OSWP Part 2: WPA2-MGT Walkthrough ⌘ Read more
Practical study material OSWP Part 1: WPA2-PSK Walkthrough ⌘ Read more
Could XSS Be the Hidden Key to Account Takeover
What if I told you that a simple Cross-Site Scripting (XSS) vulnerability could be the golden ticket to a full Account Takeover (ATO)? No…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups … ⌘ Read more
OSWE Web Hacking Tips (IPPSEC): Java Reversing href=”https://txt.sour.is/search?q=%232”>#2** ⌘ Read more
Crafting Standalone Python Proof of Concept Exploits
Creating standalone proof of concept exploits implementing a zero-to-hero method, requiring a single action to run.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/craf … ⌘ Read more
$560 Bounty: How Twitter’s Android App Leaked User Location
A Silent Broadcast That Let Any App Spy on You Without Asking
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/560-bounty-how-twitters-android-app-leaked- … ⌘ Read more
IP-Cores: Qualcomm kauft Alphawave Semi für 2,4 Milliarden US-Dollar
Qualcomm lobt die IP-Cores von Alphawave Semi, zuletzt das Chiplet AlphaCHIP1600-IO. Die Übernahme hatte zwei Monate Vorlauf. ( Qualcomm, Cloud Computing)
萬字總結 NIO 多路複用技術,深入解析 NIO 的實現原理!
什麼是 NIO NIO 是 Java 提供的一種基於 Channel 和 Buffer 的 IO 操作方式,即:利用內存映射文件方式處理輸入和輸出。NIO 具有更加強大和靈活的 IO 操作能力,提供了非阻塞 IO、多路複用等特性,特別適合需要處理大量連接的網絡編程場景在 JDK1.4 時提出了 NIO(New I/O),在 BIO 模型 (Blocking IO) 的基礎上,增加了 NIO 模型 ⌘ Read more
Mexican Police kill 4 gunmen, cross into Guatemala in dramatic border shootout. ⌘ Read more
Illicit tobacco crop worth $4.4m discovered near Shepparton after tip-off
Authorities seize a 20-tonne crop of mature tobacco being grown on 2.4 hectares, an area equivalent to more than 450 tennis courts, in Victoria’s north. ⌘ Read more
50 Command Line Tools You Wish You Knew Sooner
Master the terminal with these essential commands that will transform your Linux experience from novice to power user.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/50-command-line-tools-you-wis … ⌘ Read more
My Laptop Died, So I Hacked with My Phone. No Excuse ⌘ Read more
ToolHive Tutorial: Securely Deploy and Manage MCP Servers ⌘ Read more
**️ Deloitte Virtual Internship Cyber Sim Victory ** ⌘ Read more
Nintendo Switch 2 Hacked in 48 Hours — But Here’s Why It’s Just the Beginning
A harmless green line on the screen may have just opened the floodgates for hackers — inside the first real exploit on Nintendo’ … ⌘ Read more
When you play the Game of RBAC, You either validate, or the world denies your existence — like a King behind the wall.
OIDC: The Digitally signed Pinky Swear “It’s Me” (Part I)
Whenever an Elbow-Shake Protocol is being established, there’s always Users try to communicate safely during Corona pandemic!
[Continue reading on InfoSec Write-ups »](https://infosecwrit … ⌘ Read more
WebSocket Wizardry: How a Forgotten Channel Let Me Sniff Private Chats in Real-Time ️♂️
Hey there!😁
[Continue reading on InfoSec Write-ups »]( … ⌘ Read more
Dortmund agree £31m deal to sign Sunderland’s Bellingham
Borussia Dortmund agree a deal with Sunderland to sign Jobe Bellingham for an initial 32m euros (£26.96m) plus 5m euros (£4.2m) in add-ons. ⌘ Read more
I went out with my friends last night and came back late. My cat missed me and proceeded to cuddle for 4 hours ⌘ Read more
‘Extraordinary dismissal!’ - Charles nutmegs himself to lose wicket
Johnson Charles’ attempt at a scoop shot goes wrong as the batsman directs the ball through his legs and onto the stumps to leave West Indies on 117-4 in the second T20 International against England in Bristol. ⌘ Read more
** Stinky **
This morning I set up our new composter. This entailed shoveling a lot of compost from the old one into the new so that it can actually finish cooking. Shoveling 4 years worth of mostly kitchen scrap compost is a very very stinky endeavor. Despite wearing gloves I don’t know if my hands will ever not smell again. ⌘ Read more
Amazon Has Low Prices on AirTag ($22.98), Powerbeats Pro 2 ($199.95), and More This Weekend
Amazon this weekend has a few discounts on Apple accessories including AirTag, Apple Pencil Pro, and Beats headphones. If you’re shopping for AirPods, Amazon still has low prices across the AirPods Pro 2 and AirPods 4 right now.
Rethinking the guest network to improve my home network security ⌘ Read more
Business logic allows any user to be blocked from creating an account
FREE READ
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/business-logic-allows-any-user-to-be-blocked-from-creating- … ⌘ Read more
Understanding Misconfiguration Exploits: A Beginner’s Guide to Offensive Security Thinking.
Misconfigurations are among the most common — and most dangerous — vulnerabiliti … ⌘ Read more
Cracking JWTs: A Bug Bounty Hunting Guide [Part 5] ⌘ Read more
**Abuse-ception: How I Turned the Abuse Report Feature Into a Mass Email Spammer **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/abuse-ception-how-i-turned-the- … ⌘ Read more
$1,000 Bug: Firefox Account Deletion Without 2FA or Authorization
How a Missing Backend Check Let Attackers Nuke Accounts With Just a Password
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/1-000-bu … ⌘ Read more
The 5 Cybersecurity Roles That Will Disappear First
Think your job is safe from AI? Think again. These are the first cybersecurity roles AI will eat.”
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/the-5-cybersecurity-role … ⌘ Read more
Four rescued by helicopter from Hoskyn Island after boat begins to sink
The Australian Maritime Safety Authority says it detected a distress beacon from the recreational boat near the remote island about 4:30am. ⌘ Read more
Living Off The Land: The Stealth Art of Red Team Operations ⌘ Read more
21 Secret Linux Commands Hackers and Sysadmins Don’t Want You to Know About
Not your usual ‘ls’ and ‘pwd’ — these are the real tools used by professionals.
[Continue reading on InfoSec Write-ups »](https://info … ⌘ Read more
From Classic SOC to Autonomous SOC: The Future of Cyber Defense
Modernize your SOC into an Autonomous Security Operations (ASO) model. what it means, why it matters, and how to prepare your team.
[Continue reading on InfoS … ⌘ Read more
** Race Condition Rumble: How I Bought 100 Products for the Price of One ️️** ⌘ Read more
How I Captured a Password with One Command
Many beginner-friendly sites or older web applications still use HTTP, which transmits data without encryption.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/why-htt … ⌘ Read more
$7,500 Bug: Exposing Any HackerOne User’s Email via Private Program Invite
How One GraphQL Query Turned Private Invites into Public Data Leaks
[Continue reading on InfoSec Write-ups »](https://infosecwrite … ⌘ Read more
How to Set Up a VPN with Tailscale: Overcoming CGNAT Challenges ⌘ Read more
OIDC: Integrate Kubernetes authentication with Azure AD via OIDC (Part IV)
You want to authenticate Kubernetes users by integrating it with Azure AD using OIDC. This setup involves configuring the following … ⌘ Read more
Deals: AirPods Pro 2 for $169, AirPods 4 for $99, Apple Watch 10 for $299
Father’s Day is coming up, so perhaps you’re shopping for that, or shopping for yourself. In any event, don’t miss these great deals from Amazon, whether you’re getting a gift for yourself or a loved one. With great deals on the latest iPad mini, MacBook Air, AirPods, AirPods Pro with Hearing Aid functionality, Apple Watch, … [Read More](https://osxdaily.com/2025/06/06/deals-airpods-pro-2-for … ⌘ Read more
4 IDF soldiers killed, 5 wounded after booby-trapped south Gaza building collapses ⌘ Read more
SuSE Linux 6.4 and Arachne on DOS also work (with Windows 2000 as a call target):
Create own Hacking SERVER Instead of Portswigger exploit server
This article describes about to create your own server that helps to exploit CORS vulnerability or more.
[Continue reading on InfoSec Write-ups »](https://i … ⌘ Read more
OIDC: The Fellowship of the Token (Part III)
One token to rule them all, one token to find them, One token to bring them all, and in the cluster spawn them (I meant the pods.).
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/oidc-the-fellowsh … ⌘ Read more
How I Hacked 100+ Accounts Using Just XSS
One Small Flaw, 100+ Accounts Stolen — Here’s How It Happened
Part 3: How to Become a Pentester in 2025:Practical Practice: Labs & CTFs ⌘ Read more
** The “Unlimited Leave” Hack I Found at My College** ⌘ Read more
How Simple RECON Earned Me ₹XX,000 at Zerodha ⌘ Read more
This might be the end
How a Welcome Email Can Be Used for Malicious Redirection
Free Article Link: Click for free!
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-a-welcome-email-can-be-used-for-malicious-redirection-fd833ec71550? … ⌘ Read more
A Step-by-Step Plan to Secure Web Backends with XAMPP (Part 1/3)
Installing and Configuring XAMPP
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/a-step-by-step-plan-to-secure-web-backends-with-xampp-p … ⌘ Read more
** Broken Object Fiesta: How I Used IDOR, No Auth, and a Little Luck to Pull User Data **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/broken-object-fiest … ⌘ Read more
️ Inside the 160-Comment Fight to Fix SnakeYAML’s RCE Default ⌘ Read more
The day I found my cat abandoned on the side of the road in a carrier 4 years ago vs Now ⌘ Read more
When Open Source Isn’t: How OpenRewrite Lost Its Way ⌘ Read more
Sunwater directed to start work on $4.4 billion Paradise Dam rebuild
Farmers in Queensland’s Bundaberg region are cautiously optimistic after the government ordered Sunwater to start early works rebuilding a beleaguered water source. ⌘ Read more
{CyberDefenders Write-up} Yellow RAT ⌘ Read more
How Hackers Help NASA Stay Secure: Inside the NASA VDP ⌘ Read more
**☠️ CORS of Destruction: How Misconfigured Origins Let Me Read Everything **
Free Link 🎈
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/%EF%B8%8F-cors-of-destruction-how-m … ⌘ Read more
OSCP Fail? Use TJ Null List & HTB Labs to Pass Your Retake ⌘ Read more
Cracking JWTs: A Bug Bounty Hunting Guide [Part 4] ⌘ Read more
** Cookie Attributes — More Than Just Name & Value**
Understanding the Security & Scope Behind Every Cookie
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/cookie-attributes-more-than-just-name-value-a95591be6fba?source=rss—-7b722bfd1b8d—4 … ⌘ Read more
Atomic Red Team Setup on Windows for ATT&CK-Based Adversary Simulation ⌘ Read more