This is an impressive run.
I came for the security info, I stayed for the lulz:
"The russians have a k8s cluster which stuffs creds. They use WinRAR to compress the files they steal." (but with many more words and a lot of official logos)
@fluff I'm probably the last person to look this up, but I found the background story very interesting:
As the de-facto CISO of our small company, I have today received a note that CISA has published a list of "bad practices" to avoid when running critical infrastructure (or other things): https://www.cisa.gov/BadPractices
1. Don't run terribly outdated stuff
2. Change default passwords
"This list is focused and does not include every possible inadvisable cybersecurity practice."
The architect's design
The shipped project
Ahahaha. After ~20 years using a soldering iron, I finally took the time to (remove all the weird looking stuff from the tip and apply flux-solder)^n until the tip was all shiny again. Suddenly, the temperature settings match what the solder maker claims should work and it's actually easy to melt. m(
"I recover the deleted files from the Google Cloud, and reconstruct partial sequences of 13 early epidemic viruses"
is a sentence rated Very Likely To Appear In The Prologue Of A Cyberpunk Zombie Novel
3 coats of instant coffee and 1 coat of epoxy. The whole bathroom will have that look.
A Mastodon instance for info/cyber security-minded people.