so.cl

Rascals are always sociable, and the chief sign that a man has any nobility in his character is the little pleasure he takes in others company. Arthur Schopenhauer


We are haunted by visions of the future that were created in the past.

Mankind has a tendency to not accept what it cannot control. Our politicians and virologists often said something along the lines: “we need to do X to keep control of the situation”. In the end we never were in control of the situation but people cannot accept that.

Most of the measures we took were nothing more than modern day rain dances. Feeble attempts by humans arrogant enough to think they could defeat or control a natural phenomenon that is well beyond ours to control.

All in all, we have found CoinHelper bundled with over 2,700 different games, utilities, applications, security programs, and operating system images. Since the beginning of 2020, we have seen more than 220,000 attempts to infect Avast users with CoinHelper. The most-attacked country we saw was Russia which accounted for 83,000, or 38% of the attacks. Ukraine was the second most attacked country, with 42,000 or 19% of the attacks. CoinHelper hides in repackaged installers of software, Windows 11, games, and antivirus

On Windows operating systems, svchost.exe manages the services and services are actually running under svchost.exe’s as threads. Phant0m targets the Event Log service and finding the process responsible for the Event Log service, it detects and kills the threads responsible for the Event Log service. Thus, while the Event Log service appears to be running in the system (because Phant0m didn’t kill process), it does not actually run (because Phant0m killed threads) and the system does not collect logs. Phant0m | Windows Event Log Killer

→ in reply to @so.cl

Moral of the story being: if you do the crime, don’t visit USA.

According to court documents, Grichishkin was a founder and leader of a bulletproof hosting organization that rented internet protocol (IP) addresses, servers, and domains to cybercriminal clients who employed this technical infrastructure to disseminate malware that allowed them to gain access to victims’ computers, form botnets, and steal banking credentials for use in frauds. Malware hosted by the organization included Zeus, SpyEye, Citadel, and the Blackhole Exploit Kit, which attacked U.S. companies and financial institutions between 2009 and 2015 and caused or attempted to cause millions of dollars in losses to U.S. victims. Russian Man Sentenced for Providing ‘Bulletproof Hosting’ for Cybercriminals

→ in reply to @twittersafety

Twitter will not allow sharing of images without subject’s consent. If that’s good or bad, I’ll let you decide.

As seen on 4ch:

// just call a fucking function to draw text using some low level
// graphics api
font = create_font("Arial", 16);
draw_text(x, y, font, "hello");

Modern programmers:

GraphicsFactory gf = new GraphicsFactory();
Graphics g = gf.CreateGraphics();
FontRegistry fr = new FontRegistry;
fr.DownloadFont("www.google.com/Arial");
fr.SetSize(16);
WebBrowser w = new WebBrowser();
w.SetGraphics(g);
w.CreateHtml("<a font={}">hello</a>, fr.GetFont("Arial"));
w.Render();
// aah, much better.
→ in reply to @jack

It looks as if Jack Dorsey resigned from Twitter - Good riddance, I guess, take that steaming pile of shit that is Twitter with you, will you, Jack?

When you pirate MP3s, you’re downloading COMMUNISM!

It is with a heavy heart that I bring you this bad news: GitHub was down once again.

I suggest that the government adopt a policy of vaccinating everyone that is arrested (in the absence of medical reasons not to). - Richard Stallman

Oh, Richard Richard … you really should just shut the fuck up sometimes. Did you forget what the F stands for?

Web Development is bloated as fuck and that might be ok, but it can get annoying and demoralizing at times.

Twitter is a honeypot for assholes.