nym

Zero-JS Hypermedia Browser

avatar
nym
nym@primal.net
npub1hn4z...htl5

Notes (8)

This nostr:note1z9fa86cprs0fu6qdazmajxh634vmjjx375mxyud37f5ar7dz3z6q02d6ag
2025-01-25 05:55:13 from 1 relay(s) View Thread →
Snowdrop OS - my operating system from scratch, in assembly language http://sebastianmihai.com/snowdrop/ Snowdrop OS was born of my childhood curiosity around what happens when a PC is turned on, the mysteries of bootable disks, and the hidden aspects of operating systems. It is a 16-bit real mode operating system for the IBM PC architecture. I designed and developed this homebrew OS from scratch, using only x86 assembly language. I have created and included a number of utilities, including a file manager, text editor, graphical applications, BASIC interpreter, x86 assembler and debugger. I also ported one of my DOS games to it. After all, what kind of an operating system doesn't have games? The Snowdrop OS and the apps are distributed as both a floppy disk (1.44Mb) image, as well as a CD-ROM image. The images contain the following, all programmed from scratch: - a boot loader which loads the kernel into memory - a kernel which sets up interrupt vectors to be used by user apps, and then loads the startup app - user apps, including a shell (command line interface), utilities, test apps, and aSMtris, my Tetris clone Snowdrop OS can also be installed to a hard disk - prompting the user to do so during boot - if it detects one. I hope that Snowdrop can serve other programmers who are looking to get a basic understanding of operating system functions. Like my other projects, the source code is fully available, without any restrictions on its usage and modification. ![](https://m.stacker.news/74559) ![](https://m.stacker.news/74558) originally posted at https://stacker.news/items/862821
2025-01-24 22:57:55 from 1 relay(s) View Thread →
Google's official URL shortcut is compromised https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4 g.co, Google's official URL shortcut (update: or Google Workspace's domain verification, see bottom), is compromised. People are actively having their Google accounts stolen. Someone just tried the most sophisticated phishing attack I've ever seen. I almost fell for it. My mind is a little blown. - Someone named "Chloe" called me from 650-203-0000 with Caller ID saying "Google". She sounded like a real engineer, the connection was super clear, and she had an American accent. Screenshot. - They said that they were from Google Workspace and someone had recently gained access to my account, which they had blocked. They asked me if I had recently logged in from Frankfurt, Germany and I said no. - I asked if they can confirm this is Google calling by emailing me from a Google email and they said sure and sent me this email and told me to look for a case number in it, which I saw in the email string. I asked why it said important.g.co and she said it was an internal Google subnet. ![](https://m.stacker.news/74489) OK, so that can't be from a google.com email, right? It must be a spoofed email using g.co, which doesn't have DKIM / SPF turned on - right? Nope. ![](https://m.stacker.news/74490) ![](https://m.stacker.news/74491) originally posted at https://stacker.news/items/862671
2025-01-24 20:17:42 from 1 relay(s) View Thread →
nostr:npub1jk9h2jsa8hjmtm9qlcca942473gnyhuynz5rmgve0dlu6hpeazxqc3lqz7 v2 image
2025-01-24 19:48:32 from 1 relay(s) View Thread →