Harpoom: of course the Apple Network Server can be hacked into running Doom
Of course you can run Doom on a $10,000+ Apple server running IBM AIX. Of course you can. Well, you can now. Now, let’s go ahead and get the grumbling out of the way. No, the ANS is not running Linux or NetBSD. No, this is not a backport of NCommander’s AIX Doom, because that runs on AIX 4.3. The Apple Network Server could run no version of AIX later than 4.1.5 and there are substan … ⌘ Read more
“My experience with Canonical’s interview process”
A short while ago, we talked about the hellish hiring process at a Silicon Valley startup, and today we’ve got another one. Apparently, it’s an open secret that the hiring process at Canonical is a complete dumpster fire. I left Google in April 2024, and have thus been casually looking for a new job during 2024. A good friend of mine is currently working at Canonical, and he told me that it’s quite a nice company with a great working … ⌘ Read more
Snick is just chilling ⌘ Read more
WhisperD: linux voice-to-text using OpenAI whisper-1 transcription
I wrote this as an exercise to learn how to use ioctl & input devices, but I like how it turned out! It does have a hard dependency on pipewire though.
EU ambassador on Ukrainian operation targeting aircraft in Russia: Ukraine has cards ⌘ Read more
Ballerina Cappuccina. Tadan! ⌘ Read more
She always makes sure I’m not working alone ⌘ Read more
Wild videos capture fiery scenes from a massive Ukrainian drone attack on Russian bombers shielded by tires ⌘ Read more
Maybe she was expecting a big nomnom, what would this be? ⌘ Read more
Ukraine’s special operation “Spiderweb” that damaged 41 Russian bomber plans costed Russia $7 billion ⌘ Read more
Who said I love cats? ⌘ Read more
Dårlig dag for Mobilepay ⌘ Read more
Trump reportedly wasn’t informed in advance about Ukraine’s drone strike on Russian bombers ⌘ Read more
Ukraine’s Security Service head sums up results of operation to destroy Russian strategic jets ⌘ Read more
Tools and datasets to support, sustain, and secure critical digital infrastructure
Comments ⌘ Read more
‘Now The War Has Reached Us Too,’ Russians Far From Ukraine Say After Drone Attacks ⌘ Read more
CPU - Cat Petting Unit ⌘ Read more
What are you doing this week?
What are you doing this week? Feel free to share!
Keep in mind it’s OK to do nothing at all, too. ⌘ Read more
If you are useful, it doesn’t mean you are valued
Article URL: https://betterthanrandom.substack.com/p/if-you-are-useful-it-doesnt-mean
Comments URL: https://news.ycombinator.com/item?id=44156935
Points: 503
# Comments: 236 ⌘ Read more
Ukraine’s drone attack the latest in a series of daring David versus Goliath hits against Russian targets ⌘ Read more
My new kitten and I 🖤 ⌘ Read more
Ukrainian delegation arrives in Istanbul for talks with Russia ⌘ Read more
China accuses Trump of violation, threatens “forceful measures” ⌘ Read more
10 Tantalizing Stories About Money
In the early 21st century, money has become such a fundamental part of everyone’s life. Even though we’re moving more and more to electronic transactions and digital currencies, stories about money in all of its forms, including bills and coins, still thrill and fascinate us. In 1987, one of the most popular films about money, […]
The post 10 Tantalizing Stories About Money appeared first on … ⌘ Read more
10 Unusual Things Famous Historical Figures Did for Love
Everyone has their own opinion about what love and relationships should be like, but one thing is certain: they can make people do some strange things. Even some of the past’s most famous figures approached the tasks of finding and holding onto lovers in ways that seem very unusual today. Some were merely following the […]
The post [10 Unusual Things Famous Historical Figures Did for Love](https://listverse.com/2025/06 … ⌘ Read more
OSWE Web Hacking Tips (IPPSEC): My Study Journey href=”https://we.loveprivacy.club/search?q=%231”>#1** ⌘ Read more
Learning YARA: A Beginner SOC Analyst’s Notes
Learn how to build a YARA-powered malware detection and automation system using n8n, GPT, and hybrid analysis tools. This hands-on guide…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/learnin … ⌘ Read more
Tilde Games: Exploiting 8.3 Shortnames on IIS Servers ⌘ Read more
$540 Bounty: How a Misconfigured Warning Endpoint in Apache Airflow Exposed DAG Secrets
CVE-2023–42780: An Improper Access Control Bug That Let Low-Privileged Users View DAG Impo … ⌘ Read more
**From Forgot Password to Forgot Validation: A Broken Flow That Let Me Take Over Accounts **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/from … ⌘ Read more
** From alert(1) to Real-world Impact: Hunting XSS Where Others Don’t Look** ⌘ Read more
Bug Bounty from Scratch | Everything You Need to Know About Bug Bounty
📌Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/bug-bounty-from-scratch-everything-you-need-to-know … ⌘ Read more
My First P1 ⌘ Read more
Wazuh: The Free and Open Source SIEM/XDR Platform ⌘ Read more
Anthropic CEO says AI will kill half of white collar entry-level jobs for Gen Z ⌘ Read more
My cat is waiting for at least one olive to fall to him. ⌘ Read more