May 31, 2024
May 31, 2024
SIREN 1: you absolutely cannot make them do it again
— Oliver Darkshire 🌈 (@deathbybadger) May 28, 2024
SIREN 2: I really can i'll do it right now
SIREN 3: is this a nice thing to be doing
SIREN 1: wtf stephanie
SIREN 2: this is our culture
SIREN 1: fuck you stephanie seriously
SIREN 2: its a billionaire steph its not a person https://t.co/aAAeoift9z
Excellent intro series on virtualization and internals of various solutions (QEMU, Xen and VMWare) by @LordNoteworthy
— 0xor0ne (@0xor0ne) May 30, 2024
Intro: https://t.co/kuDRlu1fnm
VMWare: https://t.co/OlqHuul7df
Xen: https://t.co/VFTqEqfEeY
QEMU: https://t.co/v0IVKiuHEv#infosec pic.twitter.com/7fMYy5JxNu
‘Operation Endgame’ Hits Malware Delivery Platforms
‘Operation Endgame’ Hits Malware Delivery Platforms – Krebs on Security
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed "the largest ever operation against botnets," the international effort…
The Gentlemen Hackers interview: @thegrugq https://t.co/NmFIkKb41g pic.twitter.com/uWeiiEqrr3
— @mikko (@mikko) May 30, 2024
"China's resources for this are on a different scale. A Western intelligence official estimates China has around 600,000 people working on intelligence and security, more than any other state in the world." https://t.co/dC8uG1oYzf
— Shashank Joshi (@shashj) May 30, 2024
In my recent exploration of V8 vulnerability research and exploitation, I've delved into the V8 sandbox, a critical component designed to enhance security by isolating V8’s heap memory. This topic is about fuzzing V8 Sandbox, criticism and suggestions are welcome! https://t.co/b5HGoO2VHP
— xvonfers (@xvonfers) May 29, 2024
Trump has been found guilty on all 34 felony charges. Google 'Trump Rule 34' for more information on this shocking verdict
— the prince with a thousand enemies ♂️ (@jaketropolis) May 30, 2024
✍️ How did I approach making linux LKM rootkit, “reveng_rtkit” by @reveng007 https://t.co/uxq1S5xNaIhttps://t.co/uCDKp59pHc pic.twitter.com/PR6SyWQo61
— Alex Plaskett (@alexjplaskett) May 30, 2024
Runnable x86_64 /bin/sh shellcode using only words that pass English spell check (GNU aspell) pic.twitter.com/Rmuz3utSVh
— cts 🌸 (@gf_256) May 31, 2024
A crazy experience — I lost my earbuds in a remote town in Chile, so tried buying a new pair at the airport before flying out. But the new wired, iPhone, lightning-cable headphones didn't work. Strange.
— Josh Whiton (@joshwhiton) May 30, 2024
So I went back and swapped them for another pair, from a different brand.…
Leaked Documents Reveal How Google Search Gatekeeps the Internet
Leaked Documents Reveal How Google Search Gatekeeps the Internet
SEO experts say a massive leak of 14,000 ranking features exposes the blueprint for how Google secretly curates the Internet.
Secrets from the Algorithm: Google Search’s Internal Engineering Documentation Has Leaked
https://ipullrank.com/google-algo-leakfeat: Automated regeneration of ContentWarehouse client (#11021) · yoshi-code-bot/elixir-google-api@d7a637f
feat: Automated regeneration of ContentWarehouse client (#11021) · yoshi-code-bot/elixir-google-api@d7a637f · GitHub
Auto-created at 2024-03-13 03:02:08 +0000 using the toys pull request generator.
Early Computer Art in the 50’s & 60’s
Early Computer Art in the 50’s & 60’s — Amy Goodchild
A deep dive on the early days of creative computing coming to life. Punch cards, plotters, light pens and lots more.
Picked up a new dad trick:
— Corey Quinn (@QuinnyPig) May 30, 2024
Every time I tell my child I'll explain something to her when she's older, I write it down. On her 18th birthday I will painstakingly explain every item on this list to her.
"In 2028 I made a joke about 'golden showers.' That means--"
"I KNOW!"