What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

2
3
3
1
0

The Z80 port of my minimal BASIC interpreter is now successfully running minesweeper and all the other example programs on a real CP/M system (RC2014). There are still a few minor bugs to iron out, but most of the work is done.
Total size (so far): about 4200 lines of assembly language and a 6KB binary.
Provides plenty (7.5KB) of program memory on a system with 16KB of TPA.

0
0
0
2
3
0

์ถ˜์ฒœ ๋“ฑ ๊ฐ•์› 4๊ณณ ๋Œ€์„ค์ฃผ์˜๋ณด ํ•ด์ œ
(์ถ˜์ฒœ=์—ฐํ•ฉ๋‰ด์Šค) ๊ธฐ์ƒ์ฒญ์€ ์ถ˜์ฒœยท์ธ์ œ๊ตฐํ‰์ง€ยทํ™์ฒœ๊ตฐํ‰์ง€ยท๊ฐ•์›๋ถ๋ถ€์‚ฐ์ง€์— ๋‚ด๋ ธ๋˜ ๋Œ€์„ค์ฃผ์˜๋ณด๋ฅผ 23์ผ ์˜คํ›„ 9์‹œ 30๋ถ„์„ ๊ธฐํ•ด ํ•ด์ œํ•œ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.
yna.co.kr/view/AKR202512231626

0
3
2
3
3

์ด์œ ๋ฅผ ์ƒ๊ฐํ•˜๊ฑฐ๋‚˜ ์„ค๋ช…ํ•  ์‚ฌ๊ณ ๋ฅผ ์ ˆ์•ฝํ•˜์ž๊ณ  '์‹ ์ด ๊ทธ๋Ÿฌ๋žฌ์Œ ์‹ ์€ ํŒŒ์ด๋„์ด๋ฏ€๋กœ ๊ทธ๋ž˜์•ผ ํ•จ' ์œผ๋กœ ํ‰์ณ๋ฒ„๋ฉด ๋จธ๋ฆฟ์†์€ ํŽธํ•˜๊ฒ ์ง€๋งŒ ๊ทธ ๊ฒŒ์œผ๋ฆ„์˜ ๋Œ“๊ฐ€๋Š” ๊ฐœ์ธ ๋ ˆ๋ฒจ์—์„œ๋Š” ๋ชจ์ˆœ๋œ ํ–‰๋™์œผ๋กœ, ์‚ฌํšŒ ๋ ˆ๋ฒจ์—์„œ๋Š” ์ถฉ๋Œ์ด๋ผ๋Š” ๋น„์šฉ์œผ๋กœ ๋Œ์•„์˜ค๊ฒŒ ๋งˆ๋ จ: ๋™์„œ์–‘ ๋ง‰๋ก ํ•˜๊ณ  ์ ˆ๋Œ€๋ก ์  ๋‹น์œ„์˜ ์ˆ์ปท์„ ์ด์œ ๋กœ ์‚ฌ๋žŒ๋“ค ๋ชฉ์ด ๋‚ ์•„๊ฐ€๊ณ  ํ”ผ๊ฐ€ ํ˜๋ €๋‹ค๋Š” ์—ญ์‚ฌ๊ฐ€ ๋ฐ˜์ฆํ•œ๋‹ค.

0
3
0
0
0
0
1
0
0
0
4
4

ใฉใ†ใ—ใฆ4ๆžšใชใ‚“ใ ใ„๏ผŸใ“ใ“ใชใ‚‰่ฒผใ‚Œใ‚‹ใ ใ‚ใƒƒโ€ฆโ€ฆ๏ผ๏ผ้ธในโ€ฆโ€ฆโ€ฆโ€ฆ16ๆžšใƒƒโ€ฆโ€ฆ๏ผใƒ•ใƒซใซใƒƒโ€ฆโ€ฆ๏ผ๏ผ๏ผ๏ผ๏ผ

2
0
1
2
1

์‹ ์•™์€ by definition์œผ๋กœ ๊ฐ€์น˜ํŒ๋‹จ์˜ ์ค€๊ฑฐ๋ฅผ ์™ธ์ฃผํ•˜๋Š” ์ผ์ด๊ณ  ๋‚˜๋Š” ๊ทธ๊ฑธ ์–ด๋–ค ์ด์œ ๋กœ๋„ ์„ฑ์ˆ™ํ•œ ๋ฌธ๋ช…์ธ์ด ๋”ฐ๋ผ๊ฐˆ ๊ธธ์ด๋ผ๊ณ  ์ƒ๊ฐํ•˜์ง€ ์•Š์Œ - ๋นˆ๊ณคํ•œ ์ •์‹ ์„ธ๊ณ„๊ฐ€ ๊ณง์ž˜ ๋น ์ง€๋Š” ๊ธธ์ด๊ธฐ์— ๊ทธ ์‹œ์Šคํ…œ ์•ˆ์˜ ๊ฐœ์ธ์ด ๋„๋•์ ์œผ๋กœ ํŒŒํƒ„๋‚œ ๋ชจ์Šต์ด ๋นˆ๋ฒˆํžˆ ๊ด€์ธก๋˜๋Š” ๊ฑด ํ†ต๊ณ„์  ํ•„์—ฐ์ด๋ผ๊ณ  ๋ณธ๋‹ค. ์ด์›ƒ์„ ์‚ฌ๋ž‘ํ•˜๋Š” ๊ฑด ์ข‹์€ ์ผ์ด๋‹ค (์ผ๋‹จ ์ด ์ž์ฒด๋ฅผ questioningํ•˜๋Š” ๋‹จ๊ณ„๋Š” ์Šคํ‚ตํ•˜์ž) ์–ด๋–ค ์‚ฌ๋žŒ์ด ์ด์›ƒ์„ ์‚ฌ๋ž‘ํ•˜๋Š” ์ด์œ ๊ฐ€ ์‹ ์ด ๊ทธ๋Ÿฌ๋ž˜์„œ ๊ทธ๋žฌ์–ด์š”๋ฉด ๊ทธ ์‚ฌ๋žŒ ์ž์‹ ์ด ์ข‹์€ ์‚ฌ๋žŒ์ผ ์ˆ˜๊ฐ€ ์—†์Œ - ๋ฝํ•ด์•ผ ๊ทธ๊ฐ€ ์ƒ์ƒํ•˜๋Š” ์‹ ์ด ์ข‹์€ ๊ตฌ์„์ด ์žˆ๋Š” ์ •๋„์ผ ๊ฒƒ.

0
0
0
1

์›์‹  ์บ๋ฆญํ„ฐ ํ•˜๋‚˜๋งŒ ๋” ๊ทธ๋ ค๋ณด๊ณ  ๊ทธ๋‹ค์Œ์— ๋งˆ๋น„๋…ธ๊ธฐ ์บ๋ฆญํ„ฐ ๊ทธ๋ ค๋ณผ๋“ฏ ํ•ฉ๋‹ˆ๋‹ค. ์ œ ๊ธฐ์–ต์†์— ๋งˆ๋น„๋…ธ๊ธฐ๋Š” 2005~2008๋…„ ์‚ฌ์ด์— ์žˆ๋Š” ์ด๋ฏธ์ง€ ์ด๊ธฐ ๋•Œ๋ฌธ์— ๊ทธ๋•Œ ์ข‹์•„ํ–ˆ๋˜ ์บ๋ฆญํ„ฐ๋ฅผ ๊ทธ๋ ค๋ณผ๋“ฏํ•˜๋„ค์š”.

0
3
0

ใ—ใฐใ‚‰ใๅ‰ใฎใ‚ขใƒƒใƒ—ใƒ‡ใƒผใƒˆใ‹ใ‚‰่กจ็คบใ•ใ‚Œใ‚‹ใ‚ˆใ†ใซใชใฃใŸใƒ‰ใƒฉใ‚คใƒ–ใฎใ€Œใ‚‚ใฃใจ่ฆ‹ใ‚‹ใ€ใƒœใ‚ฟใƒณ
ใ“ใ‚ŒๆŠผใ•ใชใ„ใจๆฌกใซ้€ฒใ‚“ใงใใ‚Œใชใ„ใ‹ใ‚‰้กใ‚ใ†ใจใ™ใ‚‹ใจใ‹ใชใ‚Šใคใ‚‰ใ„
โ€‹:blobcat_hutyou:โ€‹
ไปฅๅ‰ใชใ‚‰Endใ‚ญใƒผๆŠผใ—ใฃๆ”พใ—ใซใ—ใฆใ‚Œใฐใ‚ˆใ‹ใฃใŸใ‚“ใ ใ‘ใฉโ€ฆ
ใ‹ใจใ„ใฃใฆใ‚ฝใƒผใƒˆใ‚’ๆ˜‡้ †ใซใ™ใ‚‹ใจๆœ€ๅˆใซ่กจ็คบใ•ใ‚ŒใŸๅˆ†ไปฅ้™ใซ้€ฒใพใชใใชใ‚‹ใ—ใ€ใ‚ˆใใ‚ใ‹ใ‚‰ใฌ
โ€‹:blobcat_zehhutyou:โ€‹

2
0
0
0
2
1
0
0

"Have you been on a plane during severe turbulence, fearing that the shaking aircraft is about to fall apart and tumble down? Brief moments of weightlessness stop your breath; perhaps you whisper prayers and remember everyone you love.

Thatโ€™s the feeling you get during a Russian air raid in Kyiv, Ukraine โ€“ and there have been more than 1,800 of them since Russiaโ€™s full-scale invasion began in 2022."
1/
Mansur Mirovalev



0

Private Israeli firms support a global industry of surveillance, hacking, and espionage tools that are now deployed in more than half of the worldโ€™s countries, including states that present themselves as democracies. These technologies are used for everything from digital monitoring to practices tied to repression and serious violations of privacy.

Their deployment grants users sweeping access to vast amounts of personal data through unlawful methods such as hacking and covert spying. In many cases, this is not limited to targeting individuals, but expands into mass population surveillance, as seen most clearly in Palestine.

1/3

0
1
0
0
0
1

็ตๆœˆใ‚†ใ‹ใ‚Šใ•ใ‚“ใ€็ดฒๆ˜Ÿใ‚ใ‹ใ‚Šใ•ใ‚“ใ€ใŠ่ช•็”Ÿๆ—ฅใŠใ‚ใงใจใ†ใ”ใ–ใ„ใพใ™ใ€‚๏ผˆ้…ๅˆป๏ผ‰

1

Private Israeli firms support a global industry of surveillance, hacking, and espionage tools that are now deployed in more than half of the worldโ€™s countries, including states that present themselves as democracies. These technologies are used for everything from digital monitoring to practices tied to repression and serious violations of privacy.

Their deployment grants users sweeping access to vast amounts of personal data through unlawful methods such as hacking and covert spying. In many cases, this is not limited to targeting individuals, but expands into mass population surveillance, as seen most clearly in Palestine.

1/3

0
0
1
1