@pancake @bagder Probably GenAI scraping, this might help: https://github.com/TecharoHQ/anubis
@peterdrake Looks painful.
Do you like 68000 assembly source code? Then here is some..
Next on the digitization death march are 3.5" floppies. I've been sent thousands of them over the years. I'm going to just image and scan them and pack them for perm storage.
May I present the first 847.
https://archive.org/details/2025_01_NOOKS_AND_CRANNIES
Floppies read by Applesauce, and the front of the floppies scanned in a flatbed at 600dpi.
I won't be stopping until all my donated floppies are online.
@textfiles What will happen to the 3.5" floppy disks after they are online? I'm looking for cheap DD disks for my Amiga 1200.
The FBI is trying to unmask the owner of infamous archiving site Archive.is, according to a subpoena the site posted. No other information given, the site quietly posted the document a few days ago. FBI telling domain registrar to hand over all sorts of ID'ing info
https://www.404media.co/fbi-tries-to-unmask-owner-of-infamous-archive-is-site/
@condret @radareorg Perhaps something similar to how 'xxd' is used: https://vi.stackexchange.com/questions/2232/how-can-i-use-vim-as-a-hex-editor
@arstechnica There seems to be no limit to the AI insanity.
@cmconseils No, bottoms that low are not normal, get help from a professional.
Back in 1987, Karsten Obarski released Ultimate Soundtracker for Amiga. Soon after, the program was disassembled and reworked by various developers. One of these groups was The Jungle Command. And in March 1988, they released their own reworked SoundTracker II.
It appears that the Jungle Command peeps knew that the code would be further disassembled and hacked by other developers (and it did). Dozens of clones and variations of SoundTracker would appear, and it all kicked off the Amiga tracker scene (which is still very much alive today). Knowing this, the developers hid some code inside the SoundTracker II replay routine.
Earlier today, Heikki "shd" Orsila pointed out some curious code he discovered inside the SoundTracker IV replay routine. It seemed to have some easter egg in it that was cleverly disguised as data. The code would normally not be referenced directly, but a strategically placed eor instruction (exclusive or) would modify the code in a way that the data would get called as a subroutine.
So what does the subroutine do? I disassembled it to find out. If both control key and joystick button are pressed down during playback, the music player code will stop and start displaying a full screen alert message forever:
SoundTracker V2
© The Jungle Command
The fact that this code survived from 1988-03-01 until today (nearly 38 years) is quite remarkable. The code has now been patched away from the replay routine.
- The Ultimate Soundtracker by Karsten Obarski:
https://en.wikipedia.org/wiki/Ultimate_Soundtracker
- SoundTracker II by The Jungle Command:
https://demozoo.org/productions/221272/
- Reversed easter egg code: https://gitlab.com/uade-music-player/uade/-/merge_requests/67#note_2867819662
- mod.echoing (classic soundtracker module by Fab) rendered with UADE oscilloscope: https://zakalwe.fi/uade/oscilloscope/chip/mod15/mod.echoing.mp4 (original https://janeway.exotica.org.uk/release.php?id=59992)
"Critical Android 0-Click Vulnerability in System Component Allows Remote Code Execution Attacks"
https://cybersecuritynews.com/android-0-click-rce-vulnerability/
@cmconseils Hang in there.
@cmconseils ...and being drunk made them all beautiful. ;) I'm old, thinking back to the early 90s and the nights out partying.
@cmconseils Yes, but I wish someone told me this when facing similar experiences rather than trying to comfort.
@mcmullin @ShaulaEvans I've even come across videos of someone reading a manual, it's absurd.
-"When the going gets weird, the weird turn pro..."