modrobert boosted
modrobert boosted

Next on the digitization death march are 3.5" floppies. I've been sent thousands of them over the years. I'm going to just image and scan them and pack them for perm storage.

May I present the first 847.

archive.org/details/2025_01_NO

Floppies read by Applesauce, and the front of the floppies scanned in a flatbed at 600dpi.

I won't be stopping until all my donated floppies are online.

@textfiles What will happen to the 3.5" floppy disks after they are online? I'm looking for cheap DD disks for my Amiga 1200.

modrobert boosted

The FBI is trying to unmask the owner of infamous archiving site Archive.is, according to a subpoena the site posted. No other information given, the site quietly posted the document a few days ago. FBI telling domain registrar to hand over all sorts of ID'ing info
404media.co/fbi-tries-to-unmas

modrobert boosted

If you feel you're not good at your job and it's making you depressed, consider this: the recent investigation into the heist revealed that the password to access the Louvre's video surveillance system was 'Louvre'.

modrobert boosted

in case that was possible.. how would you use #radare2 from inside #vim?

modrobert boosted

A meteor, the Milky Way and Mount Fuji captured by photographer Hayata Suzuki.

@cmconseils No, bottoms that low are not normal, get help from a professional.

modrobert boosted

Back in 1987, Karsten Obarski released Ultimate Soundtracker for Amiga. Soon after, the program was disassembled and reworked by various developers. One of these groups was The Jungle Command. And in March 1988, they released their own reworked SoundTracker II.

It appears that the Jungle Command peeps knew that the code would be further disassembled and hacked by other developers (and it did). Dozens of clones and variations of SoundTracker would appear, and it all kicked off the Amiga tracker scene (which is still very much alive today). Knowing this, the developers hid some code inside the SoundTracker II replay routine.

Earlier today, Heikki "shd" Orsila pointed out some curious code he discovered inside the SoundTracker IV replay routine. It seemed to have some easter egg in it that was cleverly disguised as data. The code would normally not be referenced directly, but a strategically placed eor instruction (exclusive or) would modify the code in a way that the data would get called as a subroutine.

So what does the subroutine do? I disassembled it to find out. If both control key and joystick button are pressed down during playback, the music player code will stop and start displaying a full screen alert message forever:

SoundTracker V2
© The Jungle Command

The fact that this code survived from 1988-03-01 until today (nearly 38 years) is quite remarkable. The code has now been patched away from the replay routine.

- The Ultimate Soundtracker by Karsten Obarski:
en.wikipedia.org/wiki/Ultimate
- SoundTracker II by The Jungle Command:
demozoo.org/productions/221272/
- Reversed easter egg code: gitlab.com/uade-music-player/u
- mod.echoing (classic soundtracker module by Fab) rendered with UADE oscilloscope: zakalwe.fi/uade/oscilloscope/c (original janeway.exotica.org.uk/release)

#demoscene #retrocomputing #trackermusic #hacking

"Critical Android 0-Click Vulnerability in System Component Allows Remote Code Execution Attacks"
cybersecuritynews.com/android-

modrobert boosted
modrobert boosted

@cmconseils ...and being drunk made them all beautiful. ;) I'm old, thinking back to the early 90s and the nights out partying.

@cmconseils Yes, but I wish someone told me this when facing similar experiences rather than trying to comfort.

@mcmullin @ShaulaEvans I've even come across videos of someone reading a manual, it's absurd.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.