-

Twitter avatar for @JamieDobson
Jamie Dobson @JamieDobson
An old program tape with two clearly visible patches, on sections 250 and 260.

The punch card's error, as manifested by the punches, was patched in just the same way a bike tire is patched.

This is why we call it patching when we fix existing software.

Image

-

Twitter avatar for @b0rk
🔎Julia Evans🔍 @b0rk
bases
<img class="tweet-photo" src="https://pbs.substack.com/media/Fp_Rlv0WYAQElWt.jpg" alt="title: bases

we usually write numbers in base

2503 = 2000 + 500 + 0 + 3

(picture of a bunch of powers of 10 being added up to make 2503 -- 1000s, 100s, 10s, 0s)

but you can write numbers in any base

here's 10 in base 2:

1 0 0 1 0

16 + 0 + 0 + 2 + 0 = 18

(picture of a bunch of powers of 2 being added up to make 18: 16, 8, 4, 2, 1)

we use 4 bases with computers

  • base 2 (binary)
  • base 8 (octal)
  • base 10 (decimal)
  • base 16 (hexadecimal)

octal is the least common by far

how to convert from base 10 to base 20

Let's convert 19! we'll start at the end and move left

  1. divide by 2: 19 / 2 = 9 remainder 1
  2. write the remainder (1) below and 9 on the left
  3. repeat

(picture of 19 -> 9 -> 4 -> 2 -> 1 , with the remainders 1, 0, 0, 1, 1)

the answer is 10011! " loading="lazy">

-

Twitter avatar for @gf_256
cts @gf_256
credit: dippedrust @ kolektiva dot social (Elon plz dont ban me) https://t.co/XmvLhP9bFt
Image

-

Twitter avatar for @ilove2pwn_
Austin Hudson @ilove2pwn_
BOOTLICKER: A continuation of my original bootdoor replication, extended to inject a usermode shellcode into the target process.

Works fine, but I won't be showing how to modify it for usage. Have fun. Mostly intended to be readable. Adding x86 is easy

-

Twitter avatar for @FuzzySec
b33f | 🇺🇦✊ @FuzzySec
Twitter avatar for @FuzzySec
b33f | 🇺🇦✊ @FuzzySec
For science and profit I wrote an exploit for CVE-2022-21882. It works on 10 and 11. It's a really good case-study on win32k callbacks, more details in thread 🧵

https://t.co/XPCTRRsgNY

-

Twitter avatar for @MisterTechBlog
Lup Yuen Lee 李立源 @MisterTechBlog
Image

-

Twitter avatar for @josephfcox
Joseph Cox @josephfcox
New: found that top professional fighters were advertising Exclu, an encrypted phone network allegedly used by organized crime, and which Dutch authorities recently hacked and then shut down. Shows the sort of pitch these companies go for
Twitter avatar for @josephfcox
Joseph Cox @josephfcox
Here is Exclu's promotional video showing the professional fighters. Their kickboxing league, Glory, told me it wasn't aware of its fighters' endorsement of Exlcu until we showed them

-

Twitter avatar for @ahonen_anneli
Anneli Ahonen @ahonen_anneli
Image

-

Twitter avatar for @electrospaces
Electrospaces @electrospaces
Image

-

Twitter avatar for @qDot
qdot @qDot
Presenting the newest ADHD meme: The Awareness Gap

"I forgot about the appointment because there was an awareness gap between my executive function and linear time"

"I didn't do dishes because of the awareness gap between me and the kitchen sink"

Image

-

-

The problem with physicists is that they tend to cheat in order to get results.

The problem with mathematicians is that they tend to work on toy problems in order to get results.

The problem with program verifiers is that they tend to cheat at toy problems in order to get results.

Chinese defence boffins ponder microwaving Starlink satellites to stop surveillance

The thrust of the paper is simple: Starlink's already huge constellation of satellites means it has occupied plenty of orbital and spectrum resources without detailing the disposition of its fleet, and China needs to get its own satellites up there ASAP if it wants to enjoy the same strategic advantages the USA derives from having SpaceX based on its soil.

https://www.theregister.com/2023/02/27/china_defence_research_starlink_countermeasures/?td=rt-3a

-

-

Using HDMI radio interference for high-speed data transfer

-

Don't miss what's next. Subscribe to the grugq's newsletter: