Monthly Shaarli

All links of one month in a single page.

January, 2025

2024-10-26 buy payphones and retire
thumbnail
Word Unscrambler - Unscramble Words & Letters Instantly
RSS Advisory Board

RSS Advisory Board announcements, the current specification and Really Simple Syndication news.

There are a number of cool RSS-related tools and resources on this page, which serves as the home of the RSS Advisory Board.

GitHub - tomnomnom/waybackurls: Fetch all the URLs that the Wayback Machine knows about for a domain
thumbnail

Fetch all the URLs that the Wayback Machine knows about for a domain - tomnomnom/waybackurls

Domainr · fast, free, domain name search, short URLs, new gTLDs, whois

Domainr is the only ICANN-accredited domain status API provider.

With direct, privileged access to domain registry data, the Domainr API instantly checks if a domain is available—with no false positives. In milliseconds, your customers will know if a domain is available, premium-priced, or for sale in any major aftermarket.

If you’re a security provider or manage a software supply chain, the Domainr API can help you monitor critical domains, alert you to any changes to their status, and uncover at-risk domains before they change hands.

Etiquette for information providers
Safety & Security Engineer: First Year in Review - The Python Package Index Blog
thumbnail

A look back at the past year as the first Safety & Security Engineer for the Python Package Index.

Custom domains | ʕ ꈍᴥꈍʔ Bear docs
thumbnail

Adding custom domains to your Bear blog

🐻 This includes info on using A or CNAME records for your Bear blog.

It's always DNS.

Astro | Nx
thumbnail

Add Nx to an Astro project

Las redes son nuestras (The networks are ours) | consonni

«Un libro necesario en tiempos de tecnofobia moralista e interesada. El espacio común de Internet, que nació generosamente libre, ha sido ocupado por unicornios monstruosos bajo la mirada cómplice del statu quo. Ha llegado el momento de recuperar lo que es de todxs. Alguien tenía que decirlo». —Simona Levi

python - urllib and "SSL: CERTIFICATE_VERIFY_FAILED" Error - Stack Overflow
thumbnail
/Applications/Python\ 3.11/Install\ Certificates.command

alternately:

uv  pip install --system --upgrade certifi
Google Graveyard - Killed by Google
thumbnail

Killed by Google is the Google Graveyard. A full list of dead products killed by Google in the Google Cemetery.

🔗 See the source.

IR 8374 Rev. 1, Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile | CSRC

Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the public. This Cybersecurity Framework (CSF) 2.0 Community Profile identifies the security objectives from the NIST CSF 2.0 that support governing management of, identifying, protecting against, detecting, responding to, and recovering from ransomware events. The Profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events. This Profile can be leveraged in developing a ransomware countermeasure playbook.

The public comment period on this draft is open.

base64.guru
thumbnail

A virtual teacher who reveals to you the great secrets of Base64

DenCode
thumbnail

Encoding and Decoding site. e.g. HTML Escape / URL Encoding / Base64 / MD5 / SHA-1 / CRC32 / and many other String, Number, DateTime, Color, Hash formats!

2024 Environmental Report - Google Sustainability

Download the 2024 Environmental Report. This report charts our progress and methodology, and shares knowledge and insights for others.

SafeBreach-Labs/CVE-2024-49113: LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113
thumbnail

LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 - SafeBreach-Labs/CVE-2024-49113

Victims of Identity Theft, 2018

This bulletin was prepared by the Bureau of Justice Statistics of the U.S. Department of Justice.

Culture eats policy - Niskanen Center
thumbnail

In the business world, they say that culture eats strategy for breakfast—meaning that the people implementing the strategy, and the skills, attitudes, and assumptions they bring to it, will make more difference than even the most brilliant plan. In government, culture eats policy.

This article is also a story about the importance of domain knowledge and why it's difficult (and risky) to push back against the norms, especially when it's the right thing to do. As I say: the process is not the point.

HTML Is Actually a Programming Language. Fight Me
Noovolari has officially come to an end.
thumbnail

I have always been interested in how folks talk about sunsetting services.

There are seldom technical solutions to behavioral problems

"There are seldom technical solutions to behavioral problems."

  • Ed Crowley
Touching me, touching you: The story behind 'Sweet Caroline' at Pitt - The Pitt News
thumbnail

Just like any great idea Pitt students have, the school’s most beloved tradition of singing “Sweet Caroline” was born at Hemingway’s Cafe.

I have participated in this tradition without knowing the history of it!

Delivering HTTP/2 upload speed improvements
thumbnail

Cloudflare recently shipped improved upload speeds across our network for clients using HTTP/2. This post describes our journey from troubleshooting an issue to fixing it and delivering faster upload speeds to the global Internet.

Magic Links Have Rough Edges, but Passkeys Can Smooth Them Over
thumbnail

Magic links, those emailed one-time login links, are annoying and inconvenient for folks who use a password manager, but they radically accept some fundamental truths about signing in for everyone else. By layering passkeys on top of magic links, websites can provide a seamless authentication experience for all users.

Nikola Plejić: org the ultimate API client
Using uv as your shebang line – Rob Allen
thumbnail
New Supervisor Playbook | GSA
“Context is that which is scarce”
talkback.sh
thumbnail

Talkback is a smart infosec resource aggregator, designed to help security enthusiasts, practitioners and researchers be more productive.

ArchiveReady

An online tool which evaluates if a website will be archived correctly by web archives, such as the Internet Archive.

My List of Awesome Free Software | Popcar's Blog
thumbnail

A personal list of great free software that I use in my daily life

GitHub - jazzband/tablib: Python Module for Tabular Datasets in XLS, CSV, JSON, YAML, &c.
thumbnail

Python Module for Tabular Datasets in XLS, CSV, JSON, YAML, &c. - jazzband/tablib

Favicon Generator for perfect icons on all browsers
thumbnail

The ultimate favicon generator. Design your icons platform per platform and make them look great everywhere. Including in Google results pages.

URL Sentences, by Chris Shiflett
thumbnail
Govee example/turn_on_before_bright.py GitHub
thumbnail

Govee API to control LED light strips and bulbs with LaggAt/python-govee-api

Be the browser’s mentor, not its micromanager. - Build Excellent Websites
thumbnail

Key principles using modern CSS, fluid type, fluid space, flexible layout and progressive enhancement will help you to build better front-ends that work for everyone.

fluffy-code | developer-friendly code rendering library for Python web apps

A developer-friendly code rendering library for Python web applications

Impacket | The Hacker Tools
thumbnail
Apple discontinued the iPod after two decades
thumbnail

For over two decades the iPod was the portable music player, just as big as the Walkman was before it. In 2022 Apple announced that the iPod will be discontinued, this is a trip down memory lane of the most iconic iPods.

Effortless Ansible Installation with Pipx & Pip - Unfriendly Grinch

Installing software can become overwhelming, requiring hours of research and painstaking attention to detail. However, there’s a tool that can make this process not only easier, but also enjoyable. In this article, we will guide you through installing Ansible, a powerful automation tool.

UK floats ransomware payout ban for public sector • The Register
thumbnail

Stronger proposals may also see private sector applying for a payment 'license'

Uv has a killer feature you should know about | Lukas Valatka
uv run --python 3.12 --with pandas python
Link blog in a static site | Redowan's Reflections
thumbnail
The illustrated guide to a Ph.D.
Be aware of the Makefile effect
thumbnail
Critical Infrastructure Protection: Additional Federal Coordination Is Needed to Enhance K-12 Cybersecurity | U.S. GAO
thumbnail

U.S. schools rely on information technology for many operations. But cybersecurity incidents, like ransomware attacks, could significantly affect...

What is Brain Cipher? The Ransomware that Took Down the Indonesian National Data Center
thumbnail

The Indonesian National Data Center was hit by a significant ransomware attack with the ransomware identified as Brain Cipher, a new variant of LockBit 3.0.

Attribution of the December 2024 Rhode Island ransomware incident was linked to this group.

Pennsylvania - HB 1201 (2023-2024 legislative session) - FastDemocracy
thumbnail

An Act providing for consumer data privacy, for duties of controllers and for duties of processors; and imposing penalties.

Pennsylvania Consumer Data Privacy Act

How and why algorithms discriminate - AlgorithmWatch
thumbnail

Automated decision-making systems contain hidden discriminatory prejudices. We’ll explain the causes, possible consequences, and the reasons why existing laws do not provide sufficient protection against algorithmic discrimination.

How to Utilize Your Red Team for Privacy | USENIX

While this an interesting idea, note the source.

GitHub - PrefectHQ/marvin: ✨ Build AI interfaces that spark joy
thumbnail

✨ Build AI interfaces that spark joy.

Oncall: An Equal-Opportunity Waste of Time
thumbnail

At best, making oncall the exclusive responsibility of an elite SRE class increases our tolerance for complexity.

See Simplicity.

Oncall is a form of toil – it needs to be done but it doesn’t leave our systems in a better state.

Stakeholders see high-profile incident response/oncall happening, and don’t demand clarity on what other work the group is undertaking.

To go further – incident command and management is a specific set of skills that you can definitely be good at, and where the business really, really needs a consistent and competent response, every time. At Twilio, we have a specific team that manages all incidents, follow-up actions, and operational insights around incidents company-wide. We’ve found that making sure that the data and insights around incidents and their followup flows back into the business is a full-time job. Relying on a rotation of variably interested volunteers to ensure this happens will get you mixed results.

It will be useful to have Chapter 11 (Being On-Call) from Google's SRE book available (it's one in a series).

How To Acquire a Let's Encrypt Certificate Using DNS Validation with acme-dns-certbot on Ubuntu 18.04 | DigitalOcean

DNS validation allows for certificate issuance requests to be verified using DNS records, rather than by serving content over HTTP. The acme-dns-certbot tool…

PyPI Data

This project makes it easy to analyze the Python ecosystem by providing of all the code ever published to PyPI via git, parquet datasets with file metadata, and a set of tools to help analyze the data.

Thanks to the power of git the contents of PyPI takes up only 439.4 GB on disk, and thanks to tools like libcst every Python file can be analysed on a consumer-grade laptop in a few hours.

GitHub - xnl-h4ck3r/waymore: Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan & VirusTotal!
thumbnail

Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan & VirusTotal! - xnl-h4ck3r/waymore

https://simpleicons.org/
Semantic Versioning 2.0.0 | Semantic Versioning

Semantic Versioning spec and website

Keep a Changelog

Don’t let your friends dump git logs into changelogs.

Meta Tags Toolkit
thumbnail

Preview, Edit, and Generate

GitHub - ossf/wg-securing-software-repos: OpenSSF Working Group on Securing Software Repositories
thumbnail

OpenSSF Working Group on Securing Software Repositories - ossf/wg-securing-software-repos

the tech utopia fantasy is over | ava's blog
thumbnail

i talk about how the idea of a humanity-saving tech revolution from the usual tech suspects is dead (for me).

MQTT-Client-Examples/mqtt-client-Python3/pub_sub_tls.py at master · emqx/MQTT-Client-Examples · GitHub
thumbnail

MQTT Client Examples. Contribute to emqx/MQTT-Client-Examples development by creating an account on GitHub.

GitHub - timelinize/timelinize: Store your data from all your accounts and devices in a single cohesive timeline on your own computer
thumbnail

Store your data from all your accounts and devices in a single cohesive timeline on your own computer - timelinize/timelinize

Be polite, say goodbye! – Edvin Lindén
thumbnail

Offboard your visitors the right way, say goodbye or thank them for their visit.

Python 3.11, pip and (breaking) system packages - Louis-Philippe Véronneau

As we get closer to Debian Bookworm's release, I thought I'd share one change in Python 3.11 that will surely affect many people.

Python 3.11 implements the new PEP 668, Marking Python base environments as “externally managed”<sup id="fnref:kudos"><a class="footnote-ref" href="https://veronneau.org/python-311-pip-and-breaking-system-packages.html#fn:kudos">1</a></sup>.

Can I change my Social Security number?| Frequently Asked Questions| SSA

Yes.

Building The Perfect Testimonial | Jonathan Stark
thumbnail

Jonathan Stark teaches solo consultants how to make more and work less without hiring

HOWTO: Change your behavior

Changing one's behavior is not easy. There are some simple, universal truths. This article does a good job of walking through many of them.

Doing the best you can – with the resources you have, with the circumstances you’re in and with the mind you’ve inherited – at that moment is all you can ever do anyway.

  • The 3-4-50 Framework suggesting that three behaviors contribute to 4 conditions that cause ~50 percent of deaths.
    • 3️⃣ behaviors: tobacco use, poor diet, sedentary lifestyle
    • 4️⃣ conditions: cancer, cardiovascular disease, chronic lower respiratory disease, diabetes
  • The article references the six phases of change in the transtheoretical model of behavior change.
  • The importance and impact of self-forgiveness and self-compassion are mentioned and supported in this article.
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack
thumbnail

The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia's temporary National Data Center.

The FBI on Ransomware
Privacy Rights Clearinghouse on Tableau Public
FOREVERdata: Online Ads for Public Records

A scourge.

Hackers seek ransom after getting SSNs, banking info from state gov’t portal - Ars Technica
thumbnail

Rhode Island said it’s being extorted after hack of Deloitte-run benefits system.

Which States Have Consumer Data Privacy Laws?
thumbnail

To date, 20 states have passed data privacy laws in the U.S. Other states have also introduced bills to keep up with the data privacy race.

CCPA (California Consumer Privacy Act) went into effect more than five years ago. I was in grad school when this legislation was signed into law. I distinctly remember being hopeful that it would be a good model that could be adopted at the federal level. Fast forward to 2025 and I am not actually surprised that this remains at the state level and has that classic patchwork approach vibe.

Don’t Talk to People Like They’re Chatbots - Schneier on Security

AI could make our human interactions blander, more biased, or ruder.

A good, quick, interesting read.

HOWTO get RSS feeds from Medium
SQLite Facts

They don’t allow outside contributions.

All of the facts are interesting but the one above was especially of interest to me. 🦖 Fossil (a kinda fun VCS) is based on SQLite.

GoblinTools

goblin.tools is a collection of small, simple, single-task tools, mostly designed to help neurodivergent people with tasks they find overwhelming or difficult.

Truncating really long messages | Slack

😂 Ask me how I know about this!

That single GraphQL issue that you keep missing · Doyensec's Blog

That single GraphQL issue that you keep missing

My approach to running a link blog
thumbnail

This is one of the posts that inspired me to start this site. I'm a fan of Simon's and his description of link blogging resonated with me.

Magic/Tragic Email Links: Don't make them the only option :: Recyclebin.zip
thumbnail

Subscription websites now like to use magic email links for login. They are extremely annoying.

Prompt 01.03 - “No” - Domo Futu

One of the most potentially transformative shifts in mindset is becoming comfortable with the word “no.”


  • View "no" as a redirection (and a continuation of the conversation).