What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

Feast your eyes on one dazzling bird: the Golden Pheasant (Chrysolophus pictus)! Males of the species have an eye-popping array of plumage that includes a golden-yellow crest, a bright red belly, and patches of green and blue throughout their bodies. Although it's capable of short trips through the air, this bird isn’t a strong flier and tends to stay grounded.

via amnhnyc



Image Description
A close-up photo of a Golden Pheasant. The bird has long golden feathers on the crown of its head, orangey feathers with black markings on its neck, blueish feathers near its back, and crimson feathers on its underbelly.

 It can be found in the mountainous forests of western China, where it spends most of its time in the shaded forest floor, which helps protect its vibrant colors from fading in the sunlight.

Photo: glenn_qy, CC BY-NC 4.0, iNaturalist
0

Sto scrivendo la bozza di un messaggio ai condomini per un condominio di Pisa, per fare una nursery nei suoi orti condominiali abbandonati. 🌱

La cosa divertente è che lo sto facendo su una macchina da scrivere Olivetti Studio 44 e, nel messaggio, appare la dicitura "handle di Telegram". E niente mi piace questa specie di errore di timeline.

una macchina da scrivere Olivetti studio 44 con un foglio A5 scritto innestato nel carrello
0
0
0
1
0

The more I research passkeys the more I realize I want to be adopting TOTP everywhere. Every time I hit a wall with passkeys I'm like "okay, so what the passkey board *should* have done was—" and then I realize TOTP has the properties I wanted passkeys to have had. Maybe I should have just been using TOTP this whole time instead of waiting for passkeys. Maybe that was the good thing.

0
0
0
0
2

On a related note, a reminder of the timeline of 2020:

Things didn’t turn chaotic and violent immediately after the police murdered George Floyd.

Things didn’t turn chaotic and violent when the video became public.

Things didn’t turn chaotic and violent when the protests started.

Things turned chaotic and violent when they brought charges against Chauvin, and the police flipped out and went on a rage-fueled bender of mass tear-gassing the peaceful protests.

0
0
0

Stefano Marinelli (@stefano@bsd.cafe)

A few days ago, a client’s data center "vanished" overnight. My monitoring showed that all devices were unreachable. Not even the ISP routers responded, so I assumed a sudden connectivity drop. The strange part? Not even via 4G. I then suspected a power failure, but the UPS should have sent an alert. The office was closed for the holidays, but I contacted the IT manager anyway. He was home sick with a serious family issue, but he got moving. To make a long story short: the company deals in gold and precious metals. They have an underground bunker with two-meter thick walls. They were targeted by a professional gang. They used a tactic seen in similar hits: they identify the main power line, tamper with it at night, and send a massive voltage spike through it. The goal is to fry all alarm and surveillance systems. Even if battery-backed, they rarely survive a surge like that. Thieves count on the fact that during holidays, owners are away and fried systems can't send alerts. Monitoring companies often have reduced staff and might not notice the "silence" immediately. That is exactly what happened here. But there is a "but": they didn't account for my Uptime Kuma instance monitoring their MikroTik router, installed just weeks ago. Since it is an external check, it flagged the lack of response from all IPs without needing an internal alert to be triggered from the inside. The team rushed to the site and found the mess. Luckily, they found an emergency electrical crew to bypass the damage and restore the cameras and alarms. They swapped the fried server UPS with a spare and everything came back up. The police warned that the chances of the crew returning the next night to "finish" the job were high, though seeing the systems back online would likely make them move on. They also warned that thieves sometimes break in just to destroy servers to wipe any video evidence. Nothing happened in the end. But in the meantime, I had to sync all their data off-site (thankfully they have dual 1Gbps FTTH), set up an emergency cluster, and ensure everything was redundant. Never rely only on internal monitoring. Never. #IT #SysAdmin #HorrorStories #ITHorrorStories #Monitoring

mastodon.bsd.cafe · BSD.cafe Mastodon Portal

0

Stefano Marinelli (@stefano@bsd.cafe)

A few days ago, a client’s data center "vanished" overnight. My monitoring showed that all devices were unreachable. Not even the ISP routers responded, so I assumed a sudden connectivity drop. The strange part? Not even via 4G. I then suspected a power failure, but the UPS should have sent an alert. The office was closed for the holidays, but I contacted the IT manager anyway. He was home sick with a serious family issue, but he got moving. To make a long story short: the company deals in gold and precious metals. They have an underground bunker with two-meter thick walls. They were targeted by a professional gang. They used a tactic seen in similar hits: they identify the main power line, tamper with it at night, and send a massive voltage spike through it. The goal is to fry all alarm and surveillance systems. Even if battery-backed, they rarely survive a surge like that. Thieves count on the fact that during holidays, owners are away and fried systems can't send alerts. Monitoring companies often have reduced staff and might not notice the "silence" immediately. That is exactly what happened here. But there is a "but": they didn't account for my Uptime Kuma instance monitoring their MikroTik router, installed just weeks ago. Since it is an external check, it flagged the lack of response from all IPs without needing an internal alert to be triggered from the inside. The team rushed to the site and found the mess. Luckily, they found an emergency electrical crew to bypass the damage and restore the cameras and alarms. They swapped the fried server UPS with a spare and everything came back up. The police warned that the chances of the crew returning the next night to "finish" the job were high, though seeing the systems back online would likely make them move on. They also warned that thieves sometimes break in just to destroy servers to wipe any video evidence. Nothing happened in the end. But in the meantime, I had to sync all their data off-site (thankfully they have dual 1Gbps FTTH), set up an emergency cluster, and ensure everything was redundant. Never rely only on internal monitoring. Never. #IT #SysAdmin #HorrorStories #ITHorrorStories #Monitoring

mastodon.bsd.cafe · BSD.cafe Mastodon Portal

0
0
0
1

This from @gooba42Urzl is a very good question. My own educated guess is that ICE has been compiling a “future harassment” list, rather than already having a “kill list;” the former makes far more sense in the context of their behavior here and Good’s history.

Regardless of the answer, it is a •very• good question. If Congress had a spine, they’d be marching DHS in front of them to answer it.

mastodon.social/@gooba42/11586

0
0
1

Golden snub-nosed monkey (Rhinopithecus roxellana)

During the winter, this highly social animal gathers in units of 20 to 30 individuals. When spring comes, it regroups to form larger troops of 200 or more. This species can be found in the mountains and forests of China, where snow cover can last for months. In fact, the golden snub-nosed monkey is known for tolerating the coldest average temperatures of any primate other than humans.

via amnhnyc


Image Description
A photo of two golden snub-nosed monkeys huddled together. They have gold colored fur and blueish skin on their faces.
0
0
0
0
0
0

ok - couldn’t get my DJM to work properly with Linux after all but now my Focusrite Scarlett arrived and nothing stands inbetween me and full-linux djing* anymore!

*if you ignore the windows vm that solely exists to interact with rekordbox for track analysis and USB export

0
0
0

많이들 불평하지만 언어모델 혹은 AI 발전이 상대적으로 느린것이 그나마 다행일수도 있음 난 감사하게 생각하는데 갑자기 아무런 환각 없이 잘하면 정말 그때부턴 큰일나는것임 ㅎㅎ 그나마 사람이 장기기억을 아직까진 언어모델보단 잘하는것이 유일하게 장점인것 같긴함;; 근데 사실 사람도 환각이라고 해야하나 디테일한건 잘 모르는 경우가 많고 헷갈리는것도 많고 심지어 언어모델마저도 못한 사람도 많긴함 모두 다 정확하게 기억하려면 머리가 못버티니까 그런것 같고...

0
0
0
1
0
0
0
0

현재 과학이 정의하는 "주의력(Pay of attention)"에 대한 소개와, 이에 따른 숏폼 비디오의 주의력 저하 효과에 대한 영상. 대체로 숏폼 비디오 그 자체보다는 그것을 무제한적으로 스와이프하는 경우에 "주의력" 저하가 관찰되었다고. 놀랍게도 트위터도 스크롤링이지만 해당하지 않았다고 한다. 영상 내에서도 언급하지만 뇌를 오토파일럿 모드로 만드는 것이 영향의 주된 원인이라고. What the actual science says about "brain rot" youtu.be/tdIUMkXxtHg?...

What the actual science says a...

0

@bwellerBecca @mwymanMichael Wyman I live in Minneapolis, and no, it is not already here. This is a dangerous misstatement.

Right now, we have a bunch of meatheads who are basically Biff’s sidekicks from Back to the Future running around with tear gas and handguns and a sense of impunity — which is of course •extremely• dangerous. But we do not have tanks in the streets pointing their turrets at protestors. We do not have marines conducting abductions, or fighter jets bombing civilians.

•That• is what the Trump admin wants. They’re trying (and so far failing) to create a context where that can actually happen.

As bad as this is, it can get so so so much worse.

0

a few years ago i mentioned that i wrote a book about the exciting, awkward and embarrassing experiences of growing up with computers and video games in the 80s and 90s.

i wanted to remember what it felt like being the only dorky computer kid at school. or what it was like to hear my first modem handshake sound. or starting the first flamewar on the school's national FirstClass BBS in the macintosh lab over the lunch-hour

it was originally something i wrote only for my family and friends who were there at the time.

and then i met all of you folks when i started my first masto instance 4 years ago. i had no idea there were so many hardcore retrocomputing and gaming nerds out there; unix and mac and ms-dos folks alike.

so i mentioned it casually. i was surprised by the interest in the book.

so i spent the better part of the past 3 years rewriting the book for *you* fellow mastodon dorkus malorkuses. the book is a celebration of all of the best (and worst) parts of a kid growing up in the digital age.

we're all busy old tired stressed folks now. so every memory and cringetacular story is short enough to read on a 5 minute bus/metro/toilet ride. they're weaved together into an arc that starts at my family's first Tandy TRS-80 and ends at my school's Mac LC II and building my first Pentium 133.

it's finally published, and i'm super proud of what it became thanks to everyone here nerding out for years.

enjoy the book. i wrote it just for you. ❤️

paperback edition: mybook.to/EDuUf

DRM-free ebook (EPUB format) and chapter samples here:
tomotama.itch.io/mages-modems

The front cover of Mages & Modems: A Childhood Well-Wasted in the Golden Age of Personal Computers, Games & Internet Piracy - a confessional by vga256.

It shows a collage of computer and tech paraphernalia stacked on top of each other like a junk pile: a bright red telephone handset, a pile of 5.25 and 3.5-inch floppy disks, a mouse, a cocktail napkin from lefty's bar, two RAM simms.The rear cover of the book, showing a Carmen Sandiego-style letter from the ACME Detective agency. The letter has a picture of a spazzing out kid wearing a Just Do It sweater.

The letter reads:

ACME Detective Agency

Dear Detective #0294,

As discussed, I have enclosed a hardcopy of VGA256's journals discussed at the departmental briefing. The journal entries are chronological, and document the suspect's computing and gaming activities from the early 1980s to late 1990s - his childhood and adolescent years.

Each vignette is an introspection into the suspect's self-described obsessions, including but not limited to:

* IBM PC, Amiga, Apple ][, Macintosh, Tandy 

* MS-DOS, MacOS, Windows 3.1 & 95, UNIX 

* NES, GameBoy, Sega Genesis, TI-85 

* Modems, BBSes, CompuServe, Prodigy, ISPs 

* Warez, FTP, Usenet, IRC, Shell Accounts 

* Origin Systems, LucasArts, and Sierra On-Line

... and so on. The stories are a treasure trove of immoral and illicit activities that made him the dysfunctional adult he is now. I hope these will be of value in building your dossier on this delinquent.  
I expect a report on my desk by Friday.

Deputy Chief Conover

Brat & Punk Division
0
0
0
0
0
0

We're an AI first company. Our mission is to streamline your experience and let you turn ideas into execution at the speed of thought. To join our team make PDFs out of your cv and cover letter, upload the PDFs, then retype all the text in the PDFs into more textboxes. Copy/paste is disabled. A question that is illegal to ask is mandatory. <>[]{},%#$ characters forbidden. Accents forbidden. The back button breaks everything. You have been logged out for inactivity. Click here to restart.

0
0
0
0
0
0

A new @iftas report brings insights from fediverse moderators, administrators, and community managers: worsening mod-to-user ratio, spam, burnout, lack of tools.

"Moderators are the backbone of a safer social web – but most are unpaid, under-supported, and under constant strain. If we want a future for decentralised platforms that respects user agency, civil speech, and community autonomy, we need to support the infrastructure that keeps it safe."

about.iftas.org/2026/01/08/the

0
0
1
0
0
0
0
0

Every day, thousands of women and children are victimized by people on X using the Grok chatbot to generate scantily clad and naked photos of them.

It’s time for governments to take action. Elon Musk’s X should have been banned long ago. They don’t have an excuse to delay any longer.

disconnect.blog/elon-musks-x-m

0
0
1
0
0
0
0