Critical Cache Poisoning Vulnerability in Dnsmasq
[Dnsmasq-discuss] [Security Report] Critical Cache Poisoning Vulnerability in Dnsmasq 苗发生 mfs24 at mails.tsinghua.edu.cn Tue Aug 19 12:17:19 UTC 2025 Dear Dnsmasq Security Team, We would like to responsibly disclose a critical cache poisoning vulnerability affecting the Dnsmasq DNS software. The issue allows attackers to inject arbitrary malicious DNS resource records and poison domain names without […]
Vim Macros for Beancount

Here I try to describe performing a niche Beancount data manipulation by building up complex Vim Macros from basic Vim Motions. I am a long time user of vim: still a novice frustrated that I still opt to use the hjkl movement keys to navigate around without going deeper by committing the more sophisticated motion […]
Apple has not destroyed Steve Jobs’ vision for iPad

There’s been a lot of discussion since iPadOS 26 was introduced in June about how Apple has finally moved the iPad away from Steve Jobs’ original vision, transforming it from a simple content consumption device into something more computer-like. Some celebrate this evolution, falsely pointing to features like windowed apps and sophisticated multitasking as some […]
Launch HN: Uplift (YC S25) – Voice models for under-served languages
Hi HN, we are Zaid, Muhammad and Hammad, the co-founders of Uplift AI (https://upliftai.org). We build models that speak underserved languages — today: Urdu, Sindhi, and Balochi. A billion people worldwide can’t read. In countries like Pakistan – the 5th most populous country – 42% of adults are illiterate. This holds back the entire economy: […]
UK drops demand for backdoor into Apple encryption

Opening the door for Apple to bring ADP iCloud encryption back to the UK. Opening the door for Apple to bring ADP iCloud encryption back to the UK. by Jess Weatherbed Aug 19, 2025, 9:11 AM UTC Jess Weatherbed is a news writer focused on creative industries, computing, and internet culture. Jess started her career […]
PyPI Preventing Domain Resurrection Attacks

security Summary PyPI now checks for expired domains to prevent domain resurrection attacks, a type of supply-chain attack where someone buys an expired domain and uses it to take over PyPI accounts through password resets. These changes improve PyPI’s overall account security posture, making it harder for attackers to exploit expired domain names to gain […]
Custom telescope mount using harmonic drives and ESP32

TL;DR → The Spark Early Orion Nebula capture A few years back, I developed an interest in astrophotography thanks to YouTubers like Nebula Photos. Armed with an OM System OM-5 and a 15-140mm Olympus lens, I managed some decent shots of the Orion Nebula from a tripod by taking 300 pictures with a 2-second exposure […]
Prime Number Grid
Start Rows Cols « » · t JavaScript must be enabled for this page to function. Home Links About GitHub Mastodon
How to Build a Medieval Castle

Sometimes it takes a village to raise a window. Between 2015 and 2017, skilled masons meticulously carved and beveled arches and four-lobed flourishes for a Gothic-style stone window frame in Guédelon Castle’s ornate Chapel Tower. All that remained was to install some glass. But there was a problem, and the carpenters, painters, blacksmiths, basket weavers, […]
Starting game development in JavaScript with no experience

It’s been a while since I started making web games in JavaScript. In this post, I’d like to share tips that would be helpful for beginners wanting to do the same. Learn JavaScript Outside of Game Development Alongside HTML and CSS This might sound obvious, but I really recommend learning to program before learning game […]