What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

中国のプリント基板屋さんである ALLPCB に問い合わせました。今週、中国商務省から日本への輸出禁止の通知を受け取ったそうです。今後、日本の顧客からの注文は受け付けない事も確認しました。

以上、情報共有でした。

日中関係の悪化の影響がここにも…。改善の糸口が見つかるといいなあ😢

1
0
0
0
0
0
0
0
0
0
0
0

あのダウンジャケットの女性の写真、構図も決まってたから警戒していたけど本当にある写真だったのか

ハメネイ師の写真にタバコの火…炎で「イランの抵抗の象徴」作る女性たち : 日本•国際 : ハンギョレ新聞: japan.hani.co.kr/arti/internat

0
0

🍝 날아다니는 스파게티 괴물 님께서 여러분과 함께.
😋 또한 주교의 면발과 함께 하소서.
🍝 기도합시다.

저의 주님, 날아다니는 스파게티 괴물 님 🍝,
제가 주님 앞에 봉사하기에 합당치 못하오나
첫 조상의 타락으로 잃은 불사불멸의 면대를 내게 도로 주시어
영원한 즐거움을 누리게 하소서 😋.

2026-01-13T10:44:24+09:00


0
0
0
0
0
0
0
0
0
0

wavebox.me/wave/chr9bii... 👆️ 우타우 100명 그리기 챌린지에 들어갈 우타우 친구들을 모집합니다! UTAU100キャラチャレンジに描くUTAUキャラを集めています!よろしくお願いいたします!

ラリウのWavebox👋

0

자본시장 선진화는 법과 제도 개선만으로는 완정되지 않습니다. 시장의 체질이 달라지지 않으면 코스피 5천포인트는 얼결에 잠시 도모해 봤으나 예전으로 회귀하는 반환점이 될 수도 있습니다. 한겨레경제사회연구원이 상법 개정 이후 우리 자본시장이 한 단계 도약하기 위한 남은 과제를 짚는 국제포럼을 개최합니다.

코스피 5000이 ‘반환점’이 되지 않으려면

0

I'm listening to the Search Engine episode that birthed the , and I have questions. I'm morbidly curious about the server's configuration, since they handed that over to an AI that apparently neglected to configure them for SSL. But mostly I wonder how long their funding will last, since they're expensing it to their publisher.

Maybe that all gets cleared up later in the episode.

0

윈도우 11을 버리고 리눅스로 갈아탔다, 당신도 그래야 한다
------------------------------
- *윈도우 11의 불안정성과 과도한 데이터 수집* 문제로 인해 주요 PC와 노트북에서 완전히 리눅스로 전환한 경험을 소개
- *텔레메트리와 잦은 시스템 충돌* 이 전환의 주요 계기였으며, 윈도우 업데이트가 리눅스 파티션을 삭제한 사건이 결정적 계기
- 여러 *리눅스 배포판(Mint, Debian, Fedora, Void 등)* 을…
------------------------------
https://news.hada.io/topic?id=25748&utm_source=googlechat&utm_medium=bot&utm_campaign=1834

0
1
0
0

6月に失効する僕のアイデンティティです。次は楕円になれるといいな

$ gpg -k F60960D80B224382CA8D831CB56C20316D6E8279
pub rsa3072 2020-06-24 [SC] [expires: 2026-06-25]
F60960D80B224382CA8D831CB56C20316D6E8279
uid [ultimate] zunda <zundan@gmail.com>
sub rsa3072 2020-06-24 [E] [expires: 2026-06-25]

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0

Say you have two works (a picture, some code, some audio, etc.), one of which was created after seeing the other.

Assuming one is familiar enough with the field to tell novel innovations from genre conventions, is it possible to determine whether the later work takes from the earlier one in a way that would rightly require permission, *just by looking at the works themselves*?

0
0
0
0

Cybersecurity for Network and Information Security by Dietmar P.E. Moller, 2026

This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security. In today’s digital world, a rigorous security approach is central to defend organizations digital systems, networks, and infrastructure resources from malicious threat incidents.


Thus, the book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security. It provides step-by-step guidance on how to analyze organizational processes from a security perspective, while also introducing international security concepts and techniques with their requirements designing security strategies. Hence, this interdisciplinary book is intended for business and technology audiences as a professional book in the context of security trends, principles, methods, techniques, applications and best practices to help the reader mastering the material required defending against malicious threat risk incidents. Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation standards. This international edition covers relevant international security standards for business application sectors and provide security controls and security planning. Security planning includes information security, network and physical security, incident response and metrics, to achieve business continuity, which include data privacy, cloud security, zero trust, secure software requirements and lifecycle, security by design and default, and artificial intelligence in security.
0
0
0