What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0
0
0

i have a very silly python script that replaces the following words in the mastodon UI:

  • toot, post -> shit
  • boost -> yeet
  • publish -> toot (no, i don't know why this is here. it doesn't seem to have an effect.)

if you're thinking this sounds drastically unfunny, you'd be right. it stopped being funny a few days after i implemented it circa 2021. however, i keep it around because paradoxically, the less funny and more immature it seems, and the more it annoys me, the more i find it "meta-funny", in a "ha-ha, i'm annoying myself on purpose" kind of way.

with all of that in mind: the script predates the quote toot feature. what should i rename "quote" to in the UI?

(i am NOT going to rename it "quit" as a portmanteau of quote + shit for obvious reasons)

0
0
0
0
0
0

I've been secretly working on getting this dead VIC-20 working, I've been fault finding and I think I have narrowed it down to one thing. Updates on the coming week, fingers crossed 🤞
I've never used a VIC-20 before, so I look forward to giving it a whirl! 😊

0
0
0

RE: varese.social/@emanuelecariati

André Menrath (@linosAndré Menrath) did a great talk called [Interoperability of Events in the Fediverse] that I only just now got a chance to watch. This is an area of the that really doesn't get enough attention, and the work that André is doing with event-federation.eu is super excellent.

Anyway watch the presentation here vimeo.com/1137648835 and let's get events fully federating with all their depth and nuance intact!

A video still of André Menrath presenting the issues with federated events at SFCON
0
0
0

🚀 New Changelog interview!

Damien Tanner (founder of Pusher, now building Layercode) is back for a reunion 17 years in the making. Damien officially returns to The Changelog to discuss the seismic shift happening in software development. From the first sponsor of the podcast to frontline builder in the AI agent era, Damien shares his insights on why SaaS is dying, why code review is a bottleneck (and non-existent for some), and how small teams can now ...

👉 changelog.fm/673

0
0
0
0

sui mention

Maybe I'm on my own bullshit about this because while reading through booster arguments the other day, I happened to land on someone arguing that the applications to software development are so profound that it's worth driving teenagers to suicide, and today I've seen people citing other arguments made by the exact same booster as evidence that it's OK to use AI.

I don't know that this shit is dangerous, but it sure as fuck *appears* to be, and that in and of itself is concerning.

0

TORONTO!! Hwæt!!!

Do you like RIAN JOHNSON do you like the idea of RIAN JOHNSON DOING A MYSTERY because in TWO AND A HALF HOURS, at 6:30 TODAY, the Revue is showing Johnson's first and best film, Brick

revuecinema.ca/films/brick/

It is a noir story in a shitty SoCal high school. It's so weird and so incredible, the structure is so interesting and twisty, the cinematography makes ordinary objects cryptic and beautiful, it moves so quickly from "this makes no sense" to "this makes so much sense"

A girl standing in the opening of a drainage culvert
0
0
0
0
0
0
0
0
0
0
0
0

예전에는 CPU 버그가 드물었지만, 최근에는 복잡성의 증가로 많이 흔해졌다는 이야기로 시작하는 CPU 버그에 대한 좋은 마스토돈 포스팅. 버그가 어떤 식으로 발생하고 여기에 어떤 식으로 준비/대처하는지에 대해 자세히 이야기를 해준다. 습관적으로 마스토돈에 들어갔다가 상당히 흥미롭고 깊이있는 이야기를 발견해서 기뻤다. 주소는 여기

예전에 lwn.net 에서 본 What every programmer should know about memory가 생각났다. Static RAM 과 Dynamic RAM 의 속도차이는 왜 어떻게 발생하는 것일까에 대해 아주 오랫동안 궁금해하던 것을, 회로도를 통해서 직관적으로 이해할 수 있게 해줘서 굉장히 (...인생에서 가장 기뻤던 순간 중 손에 꼽을 정도였다.) 기뻤던 기억이 아직도 난다.

로우레벨 컴퓨팅에 대한 이야기는 내 정신 저 밑바닥에 있는 "아니 그러니까 왜냐고?!" 의 욕망을 크게 해결해주는 경향이 있어서 좋아한다.

그리고 마스토돈의 기본 웹 클라이언트는 브라우저들이 번역을 정말 잘 못한다-_-; 웹페이지의 기본 언어가 브라우저 언어로 맞추어져 보여지고, 그래서 번역할 필요가 없다고 브라우저가 판단해서 그런 것 같다고 이해하고 있는데 이 문제 어떻게 해결할 방법이 없을까 흠 ' -' ...

0
0

Imagine a stranger spreads lies about you. They tell people you're doing horrible depraved crimes. Would you just block them?

What happens when other people don't block them? When other people believe the lies and share them?

What if this turns into real life abuse and violence against you and your family?

This is what vulnerable groups face from bigots. Bigoted accounts need to be shut down, servers which refuse to remove bigots should be defederated.

"Just block them" doesn't work.

0
0
0

Telnet is a remote login protocol that became obsolete in 1995 when SSH became available because SSH offers transport encryption while telnet does not.

Those who kept a telnetd running for whatever reason (and did not hide it behind a firewall) have had a root backdoor for the last ten years.

GNU InetUtils Security Advisory: remote authentication by-pass in telnet

The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.

If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.

This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.

Severity: High

Vulnerable versions: GNU InetUtils since version 1.9.3 up to and including version 2.7.

History

The bug was introduced in the following commit made on 2015 March 19 […]

Recommendation

Do not run a telnetd server at all. Restrict network access to the telnet port to trusted clients.

Source (including exploit code not reproduced here): lists.gnu.org/archive/html/bug

0
0
0
0
0
0

Hello, meine Firma hat mir nach 11 Jahren gekündigt. Jetzt such ich nach einem neuen Job als Software Entwickler. Ich geh auch gern ins Büro solangs in Nürnberg und Umgebung ist aber genau so gern mach ichs auch Remote.
CPP, Python, Go, Delphi sind so Späße die ich kann. Generell auch Datenbanken, Docker, CI/CD, ein bisschen Netwerk, Server, alles was man als Nerd halt so macht.
Wenn ihr was habt oder was wisst haut mich gern an und auch gern

0
0
0

Telnet is a remote login protocol that became obsolete in 1995 when SSH became available because SSH offers transport encryption while telnet does not.

Those who kept a telnetd running for whatever reason (and did not hide it behind a firewall) have had a root backdoor for the last ten years.

GNU InetUtils Security Advisory: remote authentication by-pass in telnet

The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.

If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.

This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.

Severity: High

Vulnerable versions: GNU InetUtils since version 1.9.3 up to and including version 2.7.

History

The bug was introduced in the following commit made on 2015 March 19 […]

Recommendation

Do not run a telnetd server at all. Restrict network access to the telnet port to trusted clients.

Source (including exploit code not reproduced here): lists.gnu.org/archive/html/bug

0
0
0
0
0
들뢰즈의 마르코프 체인에 대한 이야기는 잘 모르겠지만
영상 매체라면 A장면이 B장면 C장면에 모두 영향을 준다는 의미가 아닐까?
A 장면에서 영향을 안받은 것 같은 B,C장면이 나오더라도 마르코프 체인 통계 안에서 구성된다는 이야기 아닐까?
라고 빨래 널면서 생각해 봅니다.
0
0
0
0

Aus aktuellem Anlass:

When they kick at your front door
How you gonna come?
With your hands on your head
Or on the trigger of your gun

When the law break in
How you gonna go?
Shot down on the pavement
Or waiting in death row

The Clash - Guns of Brixton
youtu.be/gVVqUuNG1ZI

0
0

In the early days of personal computing CPU bugs were so rare as to be newsworthy. The infamous Pentium FDIV bug is remembered by many, and even earlier CPUs had their own issues (the 6502 comes to mind). Nowadays they've become so common that I encounter them routinely while triaging crash reports sent from Firefox users. Given the nature of CPUs you might wonder how these bugs arise, how they manifest and what can and can't be done about them. 🧵 1/31

0
0
1