Category: hacking

Stuff and Things...

Forget easy-to-use design. Choose something hard instead

VIM: Forget easy-to-use design. Choose something hard instead

This is a great article about the mentality that allows you to use VIM even when it is “hard” There is a computer program called Vim, based on software created in the 1970s. It is famously difficult. Computer programmers have endless jokes about how much of a challenge it is just to exit the program. It…
Read more

The Story Behind DOOM’s Cheat Codes

Man, I loved this game and this video brings back all the feels! Thank you Codex! If you want to support the development of this series, and check out the extended interview with Dave Taylor, consider subscribing on Patreon! https://www.patreon.com/codexshow The first episode of Codex takes a look at the story behind DOOM’s cheat codes,…
Read more

Commonly used grep was written overnight, but why and how did it get its name? Professor Brian Kernighan explains.

Where GREP Came From

I use ‘grep’ on a daily basis and completely take for granted the code that is behind it. Here is the amazing explanation of what/how ‘grep’ is.

Politicians Concerned Crypto can Influence Elections – Should Focus on Firing Politicians Instead

Politicians Concerned Crypto can Influence Elections – Should Focus on Firing Politicians Instead

There are many great arguments here posted hee brings up some great ideas. what do you think? 100% via (decentralized tv) Politicians Concerned Crypto can Influence Elections – Should Focus on Firing Politicians Instead  

Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

Researcher Mathy Vanhoef of imec-DistriNet hax found a critical flaw in the current WPA2 protocol. We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to…
Read more

Tractor Hacking

Tractor Hacking

Motherboard takes a look into the now common practice that many of America’s farmers are getting into, Tractor Hacking. To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America’s heartland have started hacking their equipment with firmware that’s cracked in Eastern Europe and traded on invite-only, paid online…
Read more