TL;DR summary of stories on the internet
The ldd utility, commonly used by programmers and system administrators, is more vulnerable than it appears. In this article, the author uncovers a way to create an executable that can run arbitrary code when examined by ldd. They also present a social engineering scenario to trick a sysadmin into unknowingly handing over their privileges. The […]
Read more »
Vastum, a death metal band, has gained attention for their unique and controversial lyrics that address eroticism and sexuality. Their lyrics, which can be challenging to interpret at first, have a distinct poetic quality and are reminiscent of the style used by other death metal bands. Death Metal English, as it is called, is characterized […]
Welcome to X.com, where banking and investing have been revolutionized. With no minimums, no fees, and no hassle, you have complete control over your money. Our platform allows you to move your money freely and securely whenever and wherever you want, all for free. We even offer free and instant online auction payments and the […]
llama2.c provides a code that allows users to inference a baby Llama 2 model in pure C. The code trains the Llama 2 LLM architecture in PyTorch, saves the weights to a binary file, and then loads it into a simple C file (_run.c_) for inference. The code currently supports fp32 inference and performs well […]
I am excited to share that Debian riscv64 is now an official architecture! This accomplishment marks the beginning of a new journey for us. We still have a lot of work ahead, including rebootstrapping the port in the official archive, reinstalling build daemons, and fixing numerous bugs. If everything goes smoothly, we hope to release […]
The author acknowledges the difficulty of getting valuable information from talks and likens it to being thrown off a horse. They introduce the “Three Things” exercise as a way to overcome this challenge and get more out of seminars. The goal is to have three specific takeaways from each talk, such as a definition, theorem, […]
Plane offers a simple and easy-to-use user experience, allowing users to get started within minutes. It functions as a basic task tracking tool but provides the flexibility to customize workflows based on various stages of completion. Users can easily switch between different views such as List, Kanban, or Calendar, according to their preferences. One unique […]
Most standard texture compression formats, such as BCn, ETC/EAC, and ASTC, use algorithmic vector quantization to determine codebook entries based on the encoded block. The contents of the encoded blocks are divided into three categories: header/mode bits, endpoints that represent colors in the block, and indices for selecting colors from a palette. The encoding process […]
Before March 2023, the author struggled to understand the complexity of the AWS VPC dashboard. They found the scrolling bar on the left-hand panel to be overwhelming. To gain a better grasp of the networking resources involved, they read the book “AWS Networking Fundamentals” by Toni Pasanen. After finishing it, they realized that the multitude […]
The author reflects on the current state of passwords and the shift towards alternative methods of authentication such as two-factor authentication (2FA) and risk-based authentication. They question the purpose of passwords if additional steps are always required for login, and criticize the concept of “remember this device” as a fallacy. The author also mentions the […]