What show do you find relaxing even tho its weird it makes you feel that way?
HiddenLayer555 @ HiddenLayer555 @lemmy.ml Posts 434Comments 1,789Joined 1 yr. ago
Permanently Deleted
Book Recommendations: The Latest Developments in Socialist Theory and Analysis - Hakim
Lebanese Cabinet approves a draft law to return funds wiped out with the 2019 collapse of banks
Trump wants to bring Japan's 'cute' tiny cars to America — but it may not be easy
Trump wants to bring Japan's 'cute' tiny cars to America — but it may not be easy
People online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?
People online say old computers are prime candidates for repurposing into routers, is that actually a good idea security wise?
What's the "proper" way to share a single Wireguard connection for all devices on the local network?
Potential project idea I want your feedback on: Fictional Lemmy threads that take place in my world?
Potential project idea I want your feedback on: Fictional Lemmy threads that take place in my world?
Potential project idea I want your feedback on: Fictional Lemmy threads that take place in my world?
Do you think Chinese companies will pick up the slack when it comes to consumer RAM and SSDs?
A new analysis shows that increased immigration enforcement is reducing labor in the child care workforce. The ripple effect is impacting mothers with young children
An experiment in flavouring apples different things, including cinnamon, blueberry, bubblegum, and bacon - Nile Blue
How's my network privacy? Should I switch from a commercial router to PFsense or something?
Malware analysis and deobfuscation videos. Sometimes I just like to look at code but have someone else do all the thinking for me. Malware is also often obfuscated using a lot of esoteric features of different scripting languages, things you either know exist but likely have never had a reason to use in legitimate software development, or you'll learn about an interesting feature that you can use in your own code. The way seemingly complete nonsense slowly comes together into a readable script is really satisfying. It's also something I would never personally do because I don't want to accidentally infect myself or someone else with it, so it's cool to watch an actual cybersecurity expert do it.
Shoutout to John Hammond on YouTube.