‘Dead Drops’ is an anonymous, offline, peer to peer file-sharing network in public space. USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to drop or find files on a dead drop. Plug your laptop to a wall, house or pole to share your favorite files and data. Each dead drop is installed empty except a readme.txt file explaining the project. ‘Dead Drops’ is open to participation. If you want to install a dead drop in your city/neighborhood follow the ‘how to’ instructions and submit the location and pictures.
There's a database of dead drops around the world, with map coordinates, photographs of locations, and instructions for adding your own. Of course, you're sticking a random USB device into your computer, you never know what's going to be on it so be sure you understand the risks before going on an expedition.
The 1.28-inch watch development board uses RP2040 single-chip microcomputer. RP2040 has a pair of ARMCortex-MO+cores with a clock frequency of 133MHz, providing sufficient integer performance. With 264 KB of large RAM and 4 Mbytes of spi-flash on board, users can develop a large number of applications using c or MicroPython.
Basically, it's a smartwatch kit that you can hack. No documentation so you'll have to do your homework to figure it out.
I'm sure that, like me, you were asked to put your USB drive in an unknown device... and then the doubt: What happened to my poor dongle, behind the scene? Stealing my files? Encrypting them? Or just installing a malware? With USBvalve you can spot this out in seconds: built on super cheap off-the-shelf hardware you can quickly test any USB file system activity and understand what is going on before it's too late!
With USBvalve you can have an immediate feedback about what happen to the drive; the screen will show you if the fake filesystem built on the device is accessed, read or written.
IPUMS provides census and survey data from around the world integrated across time and space. IPUMS integration and documentation makes it easy to study change, conduct comparative research, merge information across data types, and analyze individuals within family and community context. Data and services available free of charge.
LOCKSS is based on the idea that communities are in the best position to ensure long-term access to data that is under their control. Since 1999, LOCKSS has provided the foundation for robust digital preservation of all types of digital content for libraries, publishers, and other content providers and stewards. We have done so through research, development, and maintenance of proven technologies built to mitigate a comprehensive threats to data persistence; delivering reliable service and support; and fostering a community of self-determined digital preservation practitioners. We have a long track record of leadership in digital preservation and count as partners many of the world’s leading memory institutions.
Our technical architecture and approach offers protections for stored information that are not provided by other digital preservation systems. We have built the system based on a comprehensive and openly-articulated threat model that critically considers the kinds of threats responsible for the vast incidence of real-world data loss. The rationale for our system design is furthermore elaborated in award-winning and peer-reviewed published research.
Welcome to N1ghtw1re, a sanctuary for the seekers, the rebels, and the dreamers navigating the labyrinth of the modern digital world. We are an anonymous collective dedicated to empowering individuals to reclaim their privacy, autonomy, and freedom in an age dominated by surveillance, algorithms, and corporate control. N1ghtw1re is more than a website—it's a living hypersigil, a digital beacon for those ready to challenge the status quo and embrace the tools of liberation. Through shared knowledge, subversive creativity, and intentional action, we aim to dismantle the systems that seek to exploit us and rebuild a future where technology serves humanity, not the other way around. Join us in forging a new path. Together, we’ll uncover hidden truths, defy expectations, and reimagine what it means to be free in the digital age.
Openverse is a tool that allows openly licensed and public domain works to be discovered and used by everyone.
Openverse searches across more than 800 million images and audio tracks from open APIs and the Common Crawl dataset. We aggregate works from multiple public repositories, and facilitate reuse through features like one-click attribution.
Currently Openverse only searches images and audio tracks, with search for video provided through External Sources. We plan to add additional media types such as open texts and 3D models, with the ultimate goal of providing access to the estimated 2.5 billion CC licensed and public domain works on the web. All of our code is open source and can be accessed at the Openverse GitHub repository. We welcome community contribution. You can see what we’re currently working on.
Openverse is the successor to CC Search which was launched by Creative Commons in 2019, after its migration to WordPress in 2021. You can read more about this transition in the official announcements from Creative Commons and WordPress. We remain committed to our goal of tackling discoverability and accessibility of open access media.
Openverse does not verify licensing information for individual works, or whether the generated attribution is accurate or complete. Please independently verify the licensing status and attribution information before reusing the content.
A self-hosted RSS and ATOM feed reader. Written in PHP, uses MySQL as its back-end. Specifically works well with Apache and Nginx. Can use Elasticsearch as a search engine. Even tells you how to set up cronjobs to run timed tasks and how to update it.
They don't make 'em like this anymore.
The LGBTQ+ Bar was founded over thirty years ago by a small group of family law practitioners at the height of the HIV/AIDS crisis. In 1987, the idea of creating a gay and lesbian bar association was formally introduced at the Lesbian & Gay March on Washington. The first Lavender Law® Conference took place the following year at the Golden Gate University in San Francisco. In 1989, at the American Bar Association’s Mid-Year meeting, bylaws were presented, and a nonprofit board of directors was formalized. At the second board meeting in 1989 in Boston, the LGBTQ+ Bar, then known as the National Lesbian and Gay Law Association (NLGLA), had 293 paid members, and initiated a campaign to ask the ABA to include protection based on sexual orientation to its revision of the Model Code of Judicial Conduct for Judges. In 1992, the LGBTQ+ Bar became an official affiliate of the American Bar Association and it now works closely with the ABA’s Section on Individual Rights and Responsibilities and its Committee on Sexual Orientation and Gender Identity.
Bootstrap/386 is a Bootstrap v2/3/4/5(in progress) theme to make webpages look like they are from the gentler, less distracting time of the 1980s. Does a great job of making a website look like an MS-DOS application running on a somewhat slow PC. Resembles the Borland Turbo UI in many ways. The Javascript even looks fairly configurable.
Piet is a programming language in which programs look like abstract paintings. The language is named after Piet Mondrian, who pioneered the field of geometric abstract art. I would have liked to call the language Mondrian, but someone beat me to it with a rather mundane-looking scripting language.
I wrote the Piet specification a long time ago, and the language has taken on a bit of a life of its own, with a small community of coders writing Piet programs, interpreters, IDEs, and even compilers. I have not written any "authoritative" interpreter, and the different ones available sometimes interpret the specification slightly differently.
Piet uses a stack for storage of all data values. Data values exist only as integers, though they may be read in or printed as Unicode character values with appropriate commands. The stack is notionally infinitely deep, but implementations may elect to provide a finite maximum stack size. If a finite stack overflows, it should be treated as a runtime error, and handling this will be implementation dependent.
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others. In addition, tinc offers encryption, authentication, compression, automatic mesh routing, NAT traversal, and network bridging. Supports IPv6, too.
Git: https://www.tinc-vpn.org/git/browse?p=tinc
In the AUR.
Our local volunteers pick-up excess healthy food from local food donors and deliver it directly to local social service agencies that feed the food insecure.
Food Rescue US was founded in Fairfield County in 2011 when our founders, Jeff Schacher and Kevin Mullins, recognized that two growing challenges facing their community and the nation, food insecurity and food waste, could be solved with innovative technology, volunteers, and a direct-transfer model. Together, they founded Community Plates and created a unique model of food rescue that is simple, sustainable, and scalable. The organization quickly received vast support from volunteer rescuers, food donors, and social service agencies, and by 2014, the organization had rescued more than 6 million meals and was serving not only Fairfield County but also Albuquerque and Columbus.
In the following years, we continued to expand in order to meet the needs of more communities. In 2017, the organization changed its name to Food Rescue US in recognition of our expanding national presence and simultaneously launched a new version of our app, which we continue to upgrade.
Since our founding, we have provided 166 million meals and kept 199 million pounds of excess food out of landfills. Food Rescue US is now in 39 locations and constantly growing.
I'm Simone, pronounced like see-mow-nay
on the internet my nick name is usually syx. I was born in Taranto (Italy) where I lived most of my life. I moved to Dublin (Ireland) 8 years ago where I currently work as a software engineer. I have a degree in computer science from University of Bari.
In my free time I like to practice inline skating and roam around the streets of Dublin on my Rollerblades. Being Ireland such a great hiking location I enjoy exploring the countryside and hike the amazing Wicklow mountains.
I'm passionate about retrocomputing, when I get the chance I collect old computers from the 80s. I try to learn old programming languages and paradigms, imagining what life was like before the slick miniaturized fancy tech we use today. I'm also really fond of skeuomorphic design of 90s and early 2000s UIs.
There's some fun stuff going on here.
Evil is an extensible vi layer for Emacs. It emulates the main features of Vim, and provides facilities for writing custom extensions.
A modular 3d-printable mini rack system. Perfect for organizing SBCs, mini PCs, small switches, power hubs, etc. Fully customizable in OpenSCAD. Everything, from the dimensions of the rack, to the roundness of the corners, can be modified with a simple code change. Designed to be printed at home with conventional FDM printers. Requires minimal supports when printing, and final assembly needs only a few easy-to-source parts. No cage nuts. Sliding hex nut design for the front rails allows one to easily mount items, without dealing with cage nuts. Individual racks can be easily stacked and fastened together. Mix and match different color and design combinations!
This chart shows national and regional trends of wastewater viral activity levels of SARS-COV-2.
Datasets can be downloaded as CSV files.
Self-hosting the things you used to put on the cloud might be appealing for you. Problem is, you'd like to be able to access your devices from anywhere. The solution is a virtual private network, or VPN. If you work remotely, you almost certainly are familiar with the process of connecting to a VPN to access your organization's network assets. Individuals can set up the same.
There are plenty of commercial implementations of Wireguard. Probably the best-known (and best-regarded) is Tailscale. And Tailscale is indeed fantastic! But in the spirit of owning as much of our stack as possible, I'm going to show you how to implement a Wireguard-based network from scratch, without third-party tools.
The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec.
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.