Takeover.sh – Wipe and reinstall a running Linux system via SSH without reboot
README.mdA script to completely take over a running Linux system remotely, allowing you to log into an in-memory rescue environment, unmount the original root filesystem, and do anything you want, all...
View ArticleHigh radiation readings at Fukushima’s No. 2 reactor complicate robot probe
The high radiation estimates in the No. 2 reactor of the stricken Fukushima No. 1 nuclear plant will probably force a rethink of the nationalized utility’s robot-based strategy for locating its molten...
View ArticleRogue Amoeba – Making More Outside the App Store
Posted By Paul Kafasis on February 10th, 2017Kapeli, makers of the developer tool Dash, recently posted about what happened when their app left Apple’s App Store. You may recall hearing about Dash due...
View ArticleFalling Home Prices Could Be a Good Thing
Another big problem: High rent and home prices prevent Americans from moving to cities where jobs and wages are booming. That hampers economic growth, makes income inequality worse and keeps people...
View ArticleHelp Rebuild Habitat, the World's First MMO
The 1st MMO & Avatars ReturnIn 1986 the first Avatars in a graphical MMO were premiered in Lucasfilm's Habitat. 30 years later Museum of Art and Digital Entertainment (The MADE) is bringing it back...
View ArticleSignal-cli: command-line and dbus interface to Signal
README.mdsignal-cli is a commandline interface for libsignal-service-java. It supports registering, verifying, sending and receiving messages. To be able to receive messages signal-cli uses a patched...
View ArticleThe True Cost of Bitcoin Transactions
It seems the Bitcoin community is not correctly tallying the true cost of Bitcoin transactions.The belief is that Cost = Miner Fee. We’ll show why this is wrong, but the fee is of course part of the...
View ArticleAn Unusually Well-Disguised Malware Scam on Upwork
The following is a copy of a post I made on Reddit.Usually, I try to keep my main Reddit account separate from anything with my real name on it. But the truth is, this is something I wanted other...
View ArticleFour of Iceland's main volcanoes all preparing for eruption
Hekla, Grímsvötn, Bárðarbunga and Katla are all preparing for eruption. mbl.is/Ómar ÓskarssonAccording to geophysicist Páll Einarsson, four of Iceland's volcanoes are showing increased amounts of...
View ArticleIntel Gets Serious About Neuromorphic, Cognitive Computing Future
February 11, 2017Nicole HemsothLike all hardware device makers eager to meet the newest market opportunity, Intel is placing multiple bets on the future of machine learning hardware. The chipmaker has...
View ArticleThrill – Big Data Processing with C++
Yesterday, I discovered an experimental Big Data processing framework written in C++ called Thrill. As most of you surely know, the well-known frameworks of this kind are mostly based on JVM, like...
View ArticleShow HN: Beehive – An open source IFTTT powered by Go's templating engine
README.mdBeehive is an event and agent system, which allows you to create your own agents that perform automated tasks triggered by events and filters. It is modular, flexible and really easy to...
View ArticleDouble life as a KGB agent
On a chilly morning in December 1988, computer analyst Jack Barsky embarked on his usual morning commute to his office on Madison Avenue in Manhattan, leaving his wife and baby daughter at home in...
View ArticleDesigning a Business Card in LaTeX
In 2017, I will graduate from Ghent University. This means starting a professional career, either in academia or in industry. One of the first things that came to mind was that I needed a good...
View ArticleFacebook Has No First Amendment Right to Send Unauthorized Texts, Says Court
Mauro Grigollo Westend61/Newscom"Today is Jim Stewart's birthday. Reply to post a wish on his Timeline or reply with 1 to post 'Happy Birthday!'" That's the text, from Facebook to Colin Brickman, that...
View ArticleThe CIA Is Sharing Declassified Maps
As much as James Bond is defined by his outlandish gadgets, one of the most important tools for real-life spies is actually much less flashy: maps. Whether used to gather information or plan an attack,...
View ArticleRaymond Smullyan has died
And he was fond of his philosophical, if silly, sayings, such as, “Why should I worry about dying? It’s not going to happen in my lifetime!”Melvin Fitting, a retired professor of mathematics,...
View ArticleShow HN: s3-lambda – Lambda functions over S3 objects; each, map, reduce, filter
README.mds3-lambdas3-lambda enables you to run lambda functions over a context of S3 objects. It has a stateless architecture with concurrency control, allowing you to process a large number of files...
View ArticleThe call center as a site of control and resistance
Jamie Woodcock is a Fellow at the London School of Economics and author of Working the Phones: Control and Resistance in Call Centres. The book is based on Jamie’s PhD project, in which he worked...
View ArticleMkfile(8) is severely syscall limited on OS X
When I got my brand-new MacBook Pro (late 2016), I was interested in testing out the phenomenal SSD performance I had been reading about, reportedly around 2GB/s. Unix geek that I am, I opened a...
View Article