Somehow, I don't think that 2024's richest man in the world, who also is an immigrant, would ever think of using his money to create something like this.
https://www.npr.org/2013/08/01/207272849/how-andrew-carnegie-turned-his-fortune-into-a-library-legacy
Currently trying to repair this device. Can you deduct or guess what it is? #NameThatWare
As always, hide your replies behind a CW to not spoil others.
Tired of using outdated languages for #Ghidra scripting or a REPL that you can't even properly paste into? @tmr232 and I wrote a plugin to embed a #Jupyter #Kotlin kernel for a full Notebook environment alongside your GUI.
https://github.com/GhidraJupyter/ghidra-jupyter-kotlin
Internet Archive breached again through exposed access tokens https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-exposed-access-tokens/?utm_source=dlvr.it&utm_medium=mastodon ( :-{ฤฑโ
I have no idea how many of my readers even remember what a Z80 is (the very first computer I used had one), anyway here's a font for you:
โThis font converts sequences of hexadecimal lowercase characters into disassembled Z80 instructions, by making extensive use of OpenType's Glyph Substitution Table (GSUB) and Glyph Positioning Table (GPOS).โ
Iโm a software developer with a bunch of industry experience. Iโm also a comp sci professor, and whenever a CS alum working in industry comes to talk to the students, I always like to ask, โWhat do you wish youโd taken more of in college?โ
Almost without exception, they answer, โWriting.โ
One of them said, โI do more writing at Google now than I did when I was in college.โ
I am therefore begging, begging you to listen to @stephstephking: https://mstdn.social/@stephstephking/113336270193370876
It's interesting to think that "my browser doesn't work with this website" used to mean "my browser is out of date". Now it means "someone intentionally broke this website for my browser because it supports ad blocking"
In combination with the research published yesterday by ETHZ into IBPB implementation vulnerabilities on some Intel and AMD CPUs (https://comsec.ethz.ch/research/microarch/breaking-the-barrier/), Johannes Wikner has published a detailed walkthrough of the first cross-process Spectre exploit against a real target, an attack he developed in part during his internship with us last year.
Check it out here: https://grsecurity.net/cross_process_spectre_exploitation
The first ever end-to-end cross-process Spectre exploit? I worked on this during an internship with @grsecurity! An in-depth write-up here:
https://grsecurity.net/cross_process_spectre_exploitation
We're excited to announce dtrace.conf(24), the premier unconference for all things DTrace! ๐
๐
Date: December 11th, 2024
๐ Location: Emeryville, CA
As an unconference, the agenda is driven by attendees. Come ready to actively participate!
Free System/36 in SoCal. Today only. Please repost. #retrocomputing
๐จ We're hiring! ๐จ
HackSys Inc. is looking for a full-time Vulnerability Researcher (Windows/Android/Browser) based in India! ๐ก๏ธ
๐ Skills:
- Vulnerability classes, C/C++/ASM
- Exploited n-day on Windows/Android/Browser
- Reverse Engineering (WinDbg, IDA, Ghidra)
- Passionate about VR ๐ฅ
Interested? DM @hacksysteam on Discord or Twitter for more details! #Hiring #VulnerabilityResearch #CyberSecurity