All Activity

This stream auto-updates   

  1. Today
  2. I am subscribed to a number of YouTube channels, and I am sharing them with you SgtPepper Channel - https://www.youtube.com/channel/UCAZZwDyOoSG32tIpMjQ-EKA Sid Meier’s Civilization - https://www.youtube.com/channel/UCWj7XnnfbKHGVnZ8iSoETSQ Sixty Symbols - https://www.youtube.com/channel/UCvBqzzvUBLCs8Y7Axb-jZew Smarter Every Day - https://www.youtube.com/channel/UC6107grRI4m0o2-emgoDnAA Space Frontier Foundation - https://www.youtube.com/channel/UCe_aC8RselByR6B2UMnprQA Streamin’ Freedom - https://www.youtube.com/channel/UCEl_3AAj2pA-GvkxTS7-mxg Suibhne - https://www.youtube.com/channel/UCQD-0MjUbDBwm2UTVYr0Dag Talk More Talk - https://www.youtube.com/channel/UC7rNO8_kPBH-caQH9vzNe8A The Beatles - https://www.youtube.com/channel/UCc4K7bAqpdBP8jh1j9XZAww The Economist - https://www.youtube.com/channel/UC0p5jTq6Xx_DosDFxVXnWaQ The Extraordinary Universe - https://www.youtube.com/channel/UC_2MM6tCMKWCj-AnvjIhJtw The Great War - https://www.youtube.com/channel/UCUcyEsEjhPEDf69RRVhRh4A The Planetary Society - https://www.youtube.com/channel/UCi0TZmFfgS4oQPcRQ6-KRXg The Saxy Gamer - https://www.youtube.com/channel/UCJCY4j5zSuV1TFN2VQGeD0Q Totally Trailer - https://www.youtube.com/channel/UCuMYtpUa2kaPaG4tBlJAZOA Trailer Life DIY - https://www.youtube.com/channel/UCMmzjxJREn4kDK-ypq9oA7w Veritasium - https://www.youtube.com/channel/UCHnyfMqiRRG1u-2MsSQLbXA Vintage space - https://www.youtube.com/channel/UCw95T_TgbGHhTml4xZ9yIqg Vlogbrothers - https://www.youtube.com/channel/UCGaVdbSav8xWuFWTadK6loA https://www.palain.com/ View the full article
  3. Yesterday
  4. Have you been cyber bullied or cyber stalked? -Find out if your boyfriend, girlfriend or spouse is cheating -Need ammo for a divorce -Tracking -Track a stolen computer -Track a stolen iPhone or Android phone -Track a person -Passwords -Did you forget your password? -Email cracking -Windows and Apple Password -Cracking -Website Password Cracking -Database Password Cracking -Has your Facebook, Twitter or Google+ account been #Tools: Crypters Angler Exploit Kit Bind softwares Crackers Checkers DDos tools Different Ebooks Email creators File Pumpers Google's SE Pack Java drive By's Proxy checkers Proxy goblin RAR file hider SQL Injection Stealers Keyloggers Vpn's Vulcan tools Password Checkers Youtube bot Adfly bots Remote Access Trojans (RATs) Shell - Always bring result and good for scampages Mailer - Tested and Delivered Smtp - Delivering Ok Cpanel - Good to host scampage hacked? -Do you want to install spyware on a cellphone or computer? -Do you want to know if you have spyware on your computer? -Remove A Link -Mugshot Picture Removed -Blog Link Removed -Google Link Removed -Locate Missing People -SSN Trace -Address History -7-Year National Criminal Database Search -Courthouse Verification of Criminal Database Records -National Sex Offender Registry Check At Grey-hat hackers community, we bring the best out of you Contact Details : skype ID : gray hathackin Email : grayhathackin@gmail.com ICQ: 659 839 138 whatsapp : +1 682 302 5207
  5. NEW 'Off The Hook' ONLINE Posted 25 Apr, 2019 4:24:05 UTC The new edition of Off The Hook from 24/04/2019 has been archived and is now available online. "Off The Hook" - 24/04/2019 Download the torrent here!!!! View the full article
  6. intro 1.1 brian in ohio 1.2 out from under my rock motivation 2.1 ken fallon bootloader episode hpr 2660 burned many bootloaders used usbtiny programmer putting together a programmer would be a good learning experience 2.2 still use arduino easy to check out a new piece of hardware boards are cheap and easy to find boards are robust 2.3 need to run an arduino board at lower frequency developing a data logger write code in c using the avr open source tool chain prototype on arduino board needed supplies 3.1 arduino ide get from your distro’s repository slackbuilds i used the version that repackages the binaries, the little a arduino read this good information https://www.arduino.cc/en/Tutorial/ArduinoISP 3.2 avrdude use it to test the programmer outside of the arduino environment part of the gnu avr toolchain 3.3 arduino nano clone - un assembled look for the boards that have the unpoplated icsp header make sure its a nano and not a pro-mini 3.4 3 leds 3mm or smaller optional but are useful, especially the heartbeat led 3.5 3 resistors 200 ohm - small if you install the led’s 3.6 1 5-10 uF electrolytic capacitor 3.7 3-4 inch long jumper wire 3.8 2x3 female header 3.9 some way to cut wire 3.10 soldering supplies howto 4.1 upload arduino isp sketch to nano File→Examples→11.ArduinoISP→ArduinoISP i modified the sketch changing where the led’s are placed i put the led’s at digital 9, 7, and 5 for spacing #define RESET 10 // Use pin 10 to reset the target rather than SS #define LED_HB 9 // No change define LED_ERR 7 // changed define #LED_PMODE 5 // changed upload the sketch 4.2 solder on led’s solder the anode leg to the apropriate digital pin on the board add a resistor to the cathode leg of the led (usually the shorter leg) solder the resistor attached to the cathode to ground pin of the board i started with pin 9 you can test each led before moving on to the next led my soldering ended up messy but it gets the job done 4.3 modify sketch and test leds you can modify the sketch change the heartbeat pin to whatever led you just soldered upload the modified sketch the led you just soldered should pulse 4.4 clip jumper wire and attach pin 10 used the hole on the end of the board as strain relief 4.5 add capacitor watch polarity no more auto reset if you want to program with arduino ide, you need to push the reset button 4.6 2x3 header MISO -|o o|-+Vcc SCK -|o o|-MOSI Do not attach-Reset-|o o|-Gnd ----- remove reset connecter south-west connector solder the remaining 5 pins the header is soldered on the bottom of the board how to use 5.1 plug usb cable into programmer and your computer 5.2 start the arduino ide 5.3 plug programmer onto target board remember to plug the wire into the reset pin of the target 5.4 in the tools folder of the ide make sure your usb port is selected Tools→Port"/dev/ttyUSBx"→/dev/ttyUSBx 5.5 and that in the programmer section you select arduino as isp not arduinoisp Tools→Programmer→Arduino as ISP 5.6 at this point you can burn a bootloader as Ken described 5.7 upload a program 5.7.1 bring up the blink example sketch 5.7.2 under tools make sure your target board type is selected Tools→Boards 5.7.3 under the sketch menu you’ll see upload using a programmer Sketch→Upload Using Programer 5.7.4 when you select that the blink sketch will be compiled and uploaded at the command line 6.1 check functionallity bash-4.3$ avrdude -p m328p -c arduino -P /dev/ttyUSB0 -b 19200 6.2 output avrdude: AVR device initialized and ready to accept instructions Reading | ################################################## | 100% 0.01s avrdude: Device signature = 0x1e950f (probably m328p) avrdude: safemode: Fuses OK (E:FD, H:DE, L:FF) avrdude done. Thank you. things to look out for 7.1 permissions issues - arch wiki gentoo 7.2 when you upload this way you overwrite bootloader 7.3 arduino ide boards.txt has some fuse errors 7.4 avrdude version 6.2 will not work 7.5 baud rate using avrdude command line 7.6 capacitor is non-optional, but makes uploading to that board non-trivial conclusion 8.1 upload via icsp vs usb serial 8.2 do you need a bootloader? 8.3 challenge to max out any 8bit microcontroller if you need to do one or two things use a microcontroller i.e. arduino if you need to do many things use a linux single board computer i.e. raspberry pi View the full article
  7. Last week
  8. We've finally gotten around to uploading and processing The Circle of HOPE videos for YouTube. They sure didn't make it easy. Even the tiniest snippet of something that Google's system flagged needed to be dealt with. That's why there are occasional audio and/or visual gaps to keep videos from being blocked entirely. For the most part, you can now relive the speaker sections of our most recent conference. For the completely untouched versions, we offer downloads, flash drives, and DVDs. While working on this project, we discovered yet another level of judgment we were subjected to by Google. A number of our videos were deemed "not suitable for most advertisers." Let's be clear: we only monetize our videos so we can learn more about how their system works. In reality, we make next to nothing from their ads, just like nearly everyone else on YouTube. (They really don't like it when people reveal this, but it happens to be the truth.) So with the information we've gained here, we can get a sense as to what Google's algorithm finds to be "objectionable" content. While this is a handy tool in discovering what are probably the better videos in our collection, it also serves as a reminder that, while advertising may be what's blocked today, the actual content could be blocked in the future. That's how labeling and censorship tends to work. We've added text to each affected video's description as a badge of honor, and we're also listing them below. So far we've found that the videos Google doesn't like are ones with curse words in the title, any mention of terrorism or drugs, and, for some reason, a number of privacy talks. A bunch of talks with "hack" in the title were flagged, but not all of them. In addition, any talk that deals with sex was flagged, including one that Google decided to forbid for anyone under 18 (without notifying us). So we see that the actual blocking of content referenced above is already being undertaken. And we suspect the flagging is also triggered by actual content, not simply the titles. There are also some true mysteries. We have no idea why the second half of Steve Wozniak's keynote address was flagged, nor do we have a clue as to what was objectionable about a talk dealing with depression in the geek community. In total, we were flagged 66 times. We've linked to each of the "advertiser-unfriendly" talks below and extend our congratulations to the presenters for reaching this milestone. We can make this a fun project and try and figure out together just what it was that triggered Google in each of these talks. Please send your comments to our letters section. And don't forget to enjoy the videos! HOPE'S Hall of Google Shame The Circle of HOPE (2018) Sex Worker Rights and Internet Freedom - Maggie Mayhem Four Arguments on Why State Hacking is Bad - Luca Follis Hackers and Shamans - Travelers of the Black Box - danae valentina Hacking Extradition: Fighting the Long Arm of U.S. Law - Nathan Fuller, Grace North, Lauri Love, Barrett Brown The Sex Geek Returns: Hacking Plus Human Sexuality AMA - Kit Stubbs The Enron Email Corpus: Where the Bodies Are Buried? - David Noever Help! My Toaster's Attacking Me!' and Other 911 Calls of the Future - Harley Geiger, Amie Stepanovich Online Monitoring of the Alt-Right - Caroline Sinders, Freddy Martinez OpenOversight: XKEYSCORE for Cops -Tracking/Surveilling Your Local Police - Jennifer Helsby, Camille Fassett Updates on I-Star Organizations from the Bullshit Police - Amelia Andersdotter, Mehwish Ansari, Avri Doria, Mallory Knodel Life Before 1337: The Hacker's Illustrated Guide to Script Kiddie History - John Dunlap, Alex Ivanov The Eleventh HOPE (2016) Go Hack Yourself! - Michael Hernandez How to Torrent a Pharmaceutical Drug - Michael Swan Laufer What the Fuck Are You Talking About? Storytelling for Hackers - Johannes Grenzfurthner Hacking Sex: Toys, Tools, and Tips for Empowerment and Pleasure - Kit Stubbs (blocked entirely by Google for anyone under 18) Medical Devices: Pwnage and Honeypots - Scott Erven, Adam Brand Bringing Down the Great Cryptowall - Weston Hecker F*ck it, We'll Do It Live: Eight Years of Radio Statler! - Beaches, Nikgod, Tech Darko, Bunni3burn, Johnny Xmas, Stoppay, XioNYC HOPE X (2014) Elevator Hacking: From the Pit to the Penthouse - Deviant Ollam, Howard Payne Vigilante Justice: Masks, Guns, and Networks - Zimmer Barnes Bringing Down the Biological System: How Poisons Hack the Body - Jennifer Ortiz The Sex Geek as Culture Hacker - Kristen Stubbs Art under Mass Surveillance - !Mediengruppe Bitnik HTTP Must Die - Yan Zhu, Parker Higgins Social Engineering - Emmanuel Goldstein and friends SSL++: Tales of Transport-Layer Security at Twitter - @jimio The Hacker Wars - A Conversation with NSA Whistleblower Thomas Drake - Thomas Drake, Vivien Lesnik Weisman Barrett Brown and Anonymous: Persecution of Information Activists - Kevin Gallagher, Ahmed Ghappour, Gabriella Coleman HOPE Number Nine (2012) Hack the Law - Brendan O'Connor Advancements in Botnet Attacks and Malware Distribution - Aditya K. Sood Messing with Nmap Through Smoke and Mirrors - Dan "AltF4" Petro Hackers and Media Hype or Big Hacks That Never Really Happened - Space Rogue Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance - Lisa Shay, Greg Conti Geeks and Depression - Robin DeBates, Mitch Altman, Meredith L. Patterson, Jimmie Rodgers, Daravinne Privacy - A Postmortem (Part 1) - Steven Rambam Privacy - A Postmortem (Part 2) - Steven Rambam The Next HOPE (2010) Unscheduled Track: Sexucation Extravaganza - C4bl3Fl4m3 Surf's Up! Exploring CSRF through Social Network Exploitation - Daniel McCarney Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself - Johannes Grenzfurthner The Last HOPE (2008) Evil Interfaces: Violating the User - Gregory Conti The Emperor is Naked - Michael Kemp No-Tech Hacking - Johnny Long What and Who is "Anonymous"? - (Anonymous) A Convergence of Communities - John Strauchs Hacking the Mind, Hacking the Body: Pleasure (Part 1) - C4bl3FL4m3 Hacking the Mind, Hacking the Body: Pleasure (Part 2) - C4bl3FL4m3 Hacker Space Design Patterns - Jens Ohlig The Intersection of Culture Jamming, Hacking, and Hacktivism (Part 2) - Pan, Phineas Narco, Tim Maloney, %20, Fred Church, Steev Hise, Ricardo Dominguez, Bernardo Attias, Mark Hosler HOPE Number Six (2006) Hack the Palate! How to Set Up a Kitchen Hack Lab - Gweeds VoIP Unlocking - TProphet Bin Laden, National Intelligence, How NOT to Spend the Taxpayer's Treasure - Robert Steele Europe Has Hackers Too - mc.fly, Frank Rieger, Rop Gonggrijp The Fifth HOPE (2004) Terrorism and Hackers - Greg Newby Hacking More of the Invisible World - Bernie S., Barry "The Key" Wels Keynote - Steve Wozniak (2 of 2) Security, Liberties, and Trade-Offs in the War on Terrorism - Bruce Schneier H2K2 (2002) Protection for the Masses - Rop Gonggrijp The Argument Against Security Through Obscurity - Greg Newby Abuse of Authority - Bernie S., ShapeShifter, Alex Urbelis Making Money on the Internet While Still Saying "Fuck" - Pud The Vanished Art of Human Intelligence - Mike Levine Fucking Up the Internet at ICANN: Global Control Through the Domain Name System - Andy Mueller-Maguhn H2K (2000) Hacktivism - Terrorism or A New Hope? - Reid Fleming, Oxblood, and Shapeshifter Beyond HOPE (1997) Prisoners - Emmanuel Goldstein, Bernie S., Phiber Optik Dangerous Legislation - Bernie S., Steve Barber, Shabbir Safdar Hackers On Planet Earth (1994) Fun with Pagers - Thomas Icom View the full article
  9. NEW 'Off The Wall' ONLINE Posted 24 Apr, 2019 1:10:50 UTC The new edition of Off The Wall from 23/04/2019 has been archived and is now available online. "Off The Wall" - 23/04/2019 Download the torrent here!!!! View the full article
  10. In a car rant I think back to the early days of podcasting and how the ambience and vision of podcasting was far from the mainstream media approach from today. Have we all sold out ? View the full article
  11. We just uncovered an old tape that was lying around which contains a bit of a treasure. (Thanks to listener Brandon from Cincinnati who sent this to us over ten years ago.) Back in 2008, our weekly radio show was also broadcast on shortwave station WBCQ in Monticello, Maine. Now you can hear what our January 9, 2008 show sounded like on shortwave. This will likely only appeal to people who appreciate the history of shortwave, but we wanted to give everyone the opportunity to hear this. Click on this link to stream or download this show. View the full article
  12. So far we have been concentrating on separate pieces of the game. Now it’s time to put some of them together as a simulation. Overview of simulation Simulation is done in discrete steps. Each step is roughly 1 earth month (completely arbitrary decision). Shorter than that and there might not be enough happening during turns to keep things interesting. Much longer than that and player might not have enough control on how to react things. In any case, current time is stored in database in table time. There should be only one row in that table at any given time. And that row has only one value, current time. Time is stored as integer as I didn’t want to deal with problems that you get when adding fractions to a float time after time. So current time (March 2019) would be 2019.3 in game terms and stored as 20193 in database. Main processing is done in function called processTurn that is shown below. It advances time for one decimal month, removes all expired statuses as explained in episode 2768 and then loads all factions. After that, various steps of the simulation are carried out for all loaded factions. These include handling special events as explained in episode 2748 and doing observations and report writing in manner described episode 2703. processTurn :: (BaseBackend backend ~ SqlBackend, BackendCompatible SqlBackend backend, PersistUniqueRead backend, PersistQueryWrite backend, PersistQueryRead backend, PersistStoreWrite backend, MonadIO m) => ReaderT backend m Time processTurn = do newTime <- advanceTime _ <- removeExpiredStatuses newTime factions <- selectList [] [ Asc FactionId ] _ <- mapM (handleFactionEvents newTime) factions mapM_ handleFactionFood factions mapM_ (handleFactionConstruction newTime) factions _ <- mapM (addSpecialEvents newTime) factions -- Doing observations should always be done last to ensure players have -- recent reports of property they have full control, ie. planets. -- Otherwise it's possible that they'll receive reports that are one -- turn out of sync. mapM_ (handleFactionObservations newTime) factions return newTime More mapping Remember map and fmap that are used to run a function to each element in a list or general structure? mapM works in a similar way, but is used in monadic context. In processTurn function, we’re dealing with input and output and have IO monad present to allow us to do that (MonadIO m part of the type signature). If you step back a bit and squint a bit, then map :: (a -> b) -> [a] -> and fmap :: (a -> b) -> f a -> f b and mapM :: Monad m => (a -> m b) -> t a -> m (t b) look pretty similar. Each take a function, structure and produce a new structure which values were created by running the given function for each element of the original structure. The difference is that map works only for lists, fmap works for functors (that were covered in episode 2778) and mapM works for structures in monadic context. Best way to contact me nowadays is either by email or through fediverse where I’m tuturto@mastodon.social. View the full article
  13. Grey-hat hackers we are specialize in hacking services stated below and more please come with your hacking project for only serious mind. no free jobs hack fb,twitter accounts and paypal 1.)take control of pc of victim without him knowing 2.)the same with the phone 3.)create virus trojan for work and hide,bind,crypt it in any file (undetectable) 4.)spy on pc and android phone 5.)hack fb,twitter accounts and paypal 6.)website attacks to steal database's 7.) [whatsapp hacker] [snapchat hacker] 8.)Clients based Customization and clearn criminal records from all site 9.)Hacking Iphone ss| SSN | Android based | ip | spying 10). i will teach you about Bank Hacking Credit Card Hacking in Details 11)Contact me for Western Uninon Transfer Dumps Fullz Bank Logins Paypals ? Credit Cards Loading (Only USA & UK & CANADA "CC's) No time wasters am here for real business Contact Detail: whatsapp : +1 682 302 5207 Discord ID: holyhck#1248 Please Add Mail : Sami.hacking @ gmail . com
  14. Links https://darknetdiaries.com/episode/26/ https://clark.com/personal-finance-credit/credit-freeze-and-thaw-guide/ https://clark.com/personal-finance-credit/free-credit-freezes/ https://clark.com/consumer-issues-id-theft/opting-out-of-assorted-junk-mailings/ https://www.youtube.com/watch?v=zWVoyrzqRbU DROP HOE! View the full article
  15. Well, before they decided to make everything private, we were in a discussion of me getting ISDN PRI service and then with my Meridian 1, Option 11C, host a conference bridge. I just placed the order again since I had to suspend the original order over 6 months ago due to personal reasons and so, hopefully, I'll be able to host a TDM-based conference bridge. https://www.dslreports.com/forum/r32095630-Getting-ISDN-PRI-20-DIDs-installed-in-Houston-Texas
  16. sup inovox.. good to see you here...lucidphreak from reddit.
  17. andrew - yea someone on the "weird numbers" reddit said he got banned as well.... very odd....
  18. lets bring that shit back.. or - are there any other decent chats around ?
  19. this sucks...
  20. Grey-hat hackers we are specialize in hacking services stated below and more please come with your hacking project for only serious mind. no free jobs hack fb,twitter accounts and paypal 1.)take control of pc of victim without him knowing 2.)the same with the phone 3.)create virus trojan for work and hide,bind,crypt it in any file (undetectable) 4.)spy on pc and android phone 5.)hack fb,twitter accounts and paypal 6.)website attacks to steal database's 7.) [whatsapp hacker] [snapchat hacker] 8.)Clients based Customization and clearn criminal records from all site 9.)Hacking Iphone ss| SSN | Android based | ip | spying 10). i will teach you about Bank Hacking Credit Card Hacking in Details 11)Contact me for Western Uninon Transfer Dumps Fullz Bank Logins Paypals ? Credit Cards Loading (Only USA & UK & CANADA "CC's) No time wasters am here for real business Contact Detail: whatsapp : +1 682 302 5207 Discord ID: holyhck#1248 Please Add Mail : Sami.hacking @ gmail . com
  21. Grey-hat hackers we are specialize in hacking services stated below and more please come with your hacking project for only serious mind. no free jobs hack fb,twitter accounts and paypal 1.)take control of pc of victim without him knowing 2.)the same with the phone 3.)create virus trojan for work and hide,bind,crypt it in any file (undetectable) 4.)spy on pc and android phone 5.)hack fb,twitter accounts and paypal 6.)website attacks to steal database's 7.) [whatsapp hacker] [snapchat hacker] 8.)Clients based Customization and clearn criminal records from all site 9.)Hacking Iphone ss| SSN | Android based | ip | spying 10). i will teach you about Bank Hacking Credit Card Hacking in Details 11)Contact me for Western Uninon Transfer Dumps Fullz Bank Logins Paypals ? Credit Cards Loading (Only USA & UK & CANADA "CC's) No time wasters am here for real business Contact Detail: whatsapp : +1 682 302 5207 Discord ID: holyhck#1248 Please Add Mail : Sami.hacking @ gmail . com
  22. Earlier
  23. Full shownotes are on mixedsignals.ml You can download Klaatu's update revision of the game materials here: https://mixedsignals.ml/download/deadearth-bundle-gfdl.7z View the full article
  24. Grey-hat hackers we are specialize in hacking services stated below and more please come with your hacking project for only serious mind. no free jobs hack fb,twitter accounts and paypal 1.)take control of pc of victim without him knowing 2.)the same with the phone 3.)create virus trojan for work and hide,bind,crypt it in any file (undetectable) 4.)spy on pc and android phone 5.)hack fb,twitter accounts and paypal 6.)website attacks to steal database's 7.) [whatsapp hacker] [snapchat hacker] 8.)Clients based Customization and clearn criminal records from all site 9.)Hacking Iphone ss| SSN | Android based | ip | spying 10). i will teach you about Bank Hacking Credit Card Hacking in Details 11)Contact me for Western Uninon Transfer Dumps Fullz Bank Logins Paypals ? Credit Cards Loading (Only USA & UK & CANADA "CC's) No time wasters am here for real business Contact Detail: whatsapp : +1 682 302 5207 Discord ID: holyhck#1248 Please Add Mail : Sami.hacking @ gmail . com
  25. NEW 'Off The Hook' ONLINE Posted 18 Apr, 2019 3:57:34 UTC The new edition of Off The Hook from 17/04/2019 has been archived and is now available online. "Off The Hook" - 17/04/2019 Download the torrent here!!!! View the full article
  26. Ubuntu, MATE. Two words which, taken separately, refer to great products. On one side, Ubuntu, one of the most popular, if not the most popular, linux distribution. On the other side, the MATE desktop environment, also very popular. One person took those two elements and combined them together to make Ubuntu MATE. That person is Martin Wimpress, and he joined me on the 21st of March to talk about the past, present, and future of the project. View the full article
  27. Grey-hat hackers we are specialize in hacking services stated below and more please come with your hacking project for only serious mind. no free jobs hack fb,twitter accounts and paypal 1.)take control of pc of victim without him knowing 2.)the same with the phone 3.)create virus trojan for work and hide,bind,crypt it in any file (undetectable) 4.)spy on pc and android phone 5.)hack fb,twitter accounts and paypal 6.)website attacks to steal database's 7.) [whatsapp hacker] [snapchat hacker] 8.)Clients based Customization and clearn criminal records from all site 9.)Hacking Iphone ss| SSN | Android based | ip | spying 10). i will teach you about Bank Hacking Credit Card Hacking in Details 11)Contact me for Western Uninon Transfer Dumps Fullz Bank Logins Paypals ? Credit Cards Loading (Only USA & UK & CANADA "CC's) No time wasters am here for real business Contact Detail: whatsapp : +1 682 302 5207 Discord ID: holyhck#1248 Please Add Mail : Sami.hacking @ gmail . com
  28. NEW 'Off The Wall' ONLINE Posted 17 Apr, 2019 0:43:06 UTC The new edition of Off The Wall from 16/04/2019 has been archived and is now available online. "Off The Wall" - 16/04/2019 Download the torrent here!!!! View the full article
  29. If you want the full manuscript, that’s at gitlab: hpr2793_bash_coproc_manuscript.adoc. It’s almost a transcript, but I added spontaneous commentary while reading the examples, so that’s not in the manuscript. Episode errata: Command substitution with $() is perfectly valid according to POSIX, and is accepted both by dash and by bash --posix. It’s not to be considered a bashism. I fumbled the pronunciation of the printf format string in one place and said "parenthesis" instead of "percentage sign". I tried to say "space" every time there’s a space, but I know I forgot it in a few places. But you probably need to look at the show notes to really make sense of the commands anyway. Example #1: $ echo $(echo hacker public radio) hacker public radio $ $(echo echo hacker public radio) # It can even supply the command itself, not just parameters. Note the word splitting. hacker public radio $ "$(echo echo hacker public radio)" # Counteract word splitting by putting the command substitution in quotes. bash: echo hacker public radio: command not found $ `echo echo hacker public radio` # Old-style command substitution hacker public radio More on command substitution in Dave’s hpr1903: Some further Bash tips. Example #2: $ echo <(echo hacker public radio) /dev/fd/63 $ cat <(echo hacker public radio) hacker public radio You can also combine process substitution with redirection. Example #3: $ echo hacker public radio > >(sed -e 's/$/!/') # You need the space between the greater-thans here! hacker public radio! More on process substitution in Dave’s hpr2045: Some other Bash tips. For a description of a hack for creating bidirectional anonymous pipes in bash, see my Fediverse post on this, and I owe you a show. A coprocess in bash is a subshell to which you have access to two file descriptors: Its stdin and its stdout. The two file descriptors will be put in a bash array. To learn more about arrays, check out Dave’s series within the bash series, a whopping five-part quadrology including hpr2709, hpr2719, hpr2729, hpr2739 and hpr2756. You create a coprocess using the coproc keyword, brand spanking new since bash 4 from 2009. I am filing issues to pygments and GNU src-highlite to support it. There are two ways to call coproc. The first way is to give coproc a simple command. Example #4: $ coproc :; declare -p COPROC [1] 25155 declare -a COPROC=([0]="63" [1]="60") [1]+ Done coproc COPROC : The other way is to give coproc an explicit name and a Command Grouping. Example #5: $ coproc HPR (:); declare -p HPR [1] 25469 declare -a HPR=([0]="63" [1]="60") [1]+ Done coproc HPR ( : ) Slightly less contrived example #6: $ coproc GREP (grep --line-buffered pub); printf '%s\n' hacker public radio >&${GREP[1]}; cat <&${GREP[0]} [1] 25627 public ^C $ kill %1 [1]+ Terminated coproc GREP ( grep --color=auto --line-buffered pub ) Here grep and cat wait forever for more input, so we have to kill them to continue our lesson. But we know that GREP will only return one line, so we can just read that one line. And when we are done feeding it lines, we can close our side of its stdin, and it will notice this and exit gracefully. I’m glad I stumbled over that {YOURVARIABLE}>&- syntax for having a dereferenced variable as the left FD of a redirection. Originally I used an ugly eval. Example #7: $ coproc GREP (grep --line-buffered pub); printf '%s\n' hacker public radio >&${GREP[1]}; head -n1 <&${GREP[0]}; exec {GREP[1]}>&- [1] 25706 public [1]+ Done coproc GREP ( grep --color=auto --line-buffered pub ) There we go! Not the most brilliant example, but it shows all the relevant moving parts, and we covered a couple of caveats. Now go out and play with this and come back with an example on how this is actually useful in the real world, and submit a show! View the full article
  1. Load more activity