@thias

I can only recommend to use #notepadpp and the little option at the top that makes non ASCII visible as coloured blocks with the name of that char within it e.g. <CR><LF>

All text editors and IDEs should have that option enabled and enable it by default.

That would effectively prevent these issues here...

#coding #unicode #texteditor #toolchain #computersecurity

The basic underlying problem is that coders and their tooling assume that code is mostly ASCII, when in reality it is Unicode, which most tools don't handle properly.

I'm just waiting for Bidi-injection toolchain injections…

#coding #unicode #texteditor #toolchain #computersecurity

https://www.aikido.dev/blog/glassworm-returns-unicode-attack-github-npm-vscode

Glassworm Returns: Invisible Unicode Malware Found in 150+ GitHub Repositories

The Glassworm supply chain attack is back. Researchers uncovered malware hidden in invisible Unicode characters across 150+ GitHub repositories, plus npm packages and VS Code extensions.

Unethical Software Engineering by Cesare Pautasso is free with a Leanpub Reader membership! Or you can buy it for $19.00! https://leanpub.com/unethical-software-engineering [email protected] #Software #DigitalTransformation #Philosophy #ComputerSecurity #EthicsTechnology
Unethical Software Engineering

Unethical Software Engineering exposes how to manipulate, exploit, and profit at users' expense. From covert email trackers and fake reviewers to cybersquatters and bot pretenders, this eye-opening book collects 22 dark patterns eroding accountability, trust, truth, transparency and privacy.

A beginner's guide to improving your digital security
"This 8 item to-do list will help you improve your security, understand why you should do each task, the limitations of these tools, and what not to do."

#OnlineSafety #ComputerSecurity #email #Signal #Privacy #HowTo

A beginner's guide to improving your digital security

This 8 item to-do list will help you improve your security, understand why you should do each task, the limitations of these tools, and what not to do.

hashman.ca
Linux DevOps eBook Bundle

Welcome to this comprehensive collection of essential tech guides. Each book in this bundle serves as a stepping stone into the vast world of technology, from the foundational layers of Linux systems to the nuanced art of infrastructure management with Terraform. Whether you're a seasoned professional or a passionate enthusiast looking to expand your horizons, this bundle caters to your thirst for knowledge without overwhelming you. By selecting this bundle, you're not just acquiring texts; you're embarking on a journey. A journey that has been charted by someone who believes in the power of sharing knowledge, the importance of understanding core principles, and the joy of learning. Thank you for allowing these works to be a part of your educational journey. Dive in, explore, and let the world of technology unfold before you. Suggested order of reading the books would be: 1. Introduction to Linux:  -  Provides foundational knowledge on which many of the other topics will be built upon, especially for those who are new to the Linux environment. 2. Introduction to Bash Scripting:  -  After gaining familiarity with the Linux environment, users can delve into automating tasks within that environment using Bash scripting. 3. Introduction to Git and GitHub:  -  Version control is essential for any serious coding or infrastructure project. Knowing Git and GitHub early will be beneficial as the reader progresses to other topics. 4. Introduction to SQL:  -  Databases are ubiquitous in software and system design. SQL is foundational for understanding how to interact with relational databases. 5. Introduction to Docker:  -  With a foundation in Linux, scripting, version control, and databases, readers can move on to understanding containerization, a key concept in modern development and deployment practices. 6. Introduction to Terraform:  -  After grasping the basics of Docker, users can further their knowledge in infrastructure automation and Infrastructure as Code (IaC) with Terraform. If you're into DevOps, you'll love DevOps Daily: it has free bite-sized exercises, tools, and guides to level up fast.

Unethical Software Engineering by Cesare Pautasso is free with a Leanpub Reader membership! Or you can buy it for $19.00! https://leanpub.com/unethical-software-engineering [email protected] #Software #DigitalTransformation #Philosophy #ComputerSecurity #EthicsTechnology
Unethical Software Engineering

Unethical Software Engineering exposes how to manipulate, exploit, and profit at users' expense. From covert email trackers and fake reviewers to cybersquatters and bot pretenders, this eye-opening book collects 22 dark patterns eroding accountability, trust, truth, transparency and privacy.

We're meeting this Friday (6th March) at #Glasgow #hackerspace - @thegamerclub at 153 Bath Lane from 6pm 'til late - all welcome!

Hackers, crackers, geeks, hats of any colour, technology enthusiasts, hacktivists, and other like-minded folks are most welcome. We do not judge anyone and everyone has something to contribute, no matter their level of expertise!

Also join us in Matrix at #2600:glasgow.social (invite link: https://glasgow.social/matrix)

#infosec #hacker #computersecurity

You're invited to talk on Matrix

You're invited to talk on Matrix

Memory Dump Analysis Anthology, Revised Edition: The First 5 Volumes

This reference bundle consists of revised, edited, cross-referenced, and thematically organized articles from the Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, software trace and log analysis written from August 2006 to October 2010. In addition to various corrections, this major revision updates relevant links and removes obsolete references. Some articles are preserved for historical reasons. Most of the content, especially memory analysis and trace and log analysis pattern languages, is still relevant today and for the foreseeable future. The output of WinDbg commands is also remastered to include color highlighting. Crash dump analysis pattern names are also corrected to reflect the continued expansion of the catalog. The primary audience for Memory Dump Analysis Anthology reference volumes is: software engineers developing and maintaining products on Windows platforms, technical support, escalation, and site reliability engineers dealing with complex software issues, quality assurance engineers testing software on Windows platforms, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts. Trace and log analysis articles may be of interest to users of other platforms.

Coming up: Capture the Flag for beginners, 2026-02-26 12:00

Learn to think like a hacker! A "Capture the Flag" (#CTF) is an ethical game for learning and practising #computersecurity skills in a legal environment. We will play the #OverTheWire Bandit game, which teaches #Linux fundamentals needed for succeeding with more advanced CTFs.

Open for all, no registration needed. Bring a friend!

More info: https://www.uu.se/en/department/information-technology/events/archive/2026-02-26-cyberrisklab-capture-the-flag-for-beginners

CyberRiskLab: Capture the Flag for beginners – Department of Information Technology – Uppsala University

Unethical Software Engineering by Cesare Pautasso is free with a Leanpub Reader membership! Or you can buy it for $19.00! https://leanpub.com/unethical-software-engineering [email protected] #Software #DigitalTransformation #Philosophy #ComputerSecurity #EthicsTechnology
Unethical Software Engineering

Unethical Software Engineering exposes how to manipulate, exploit, and profit at users' expense. From covert email trackers and fake reviewers to cybersquatters and bot pretenders, this eye-opening book collects 22 dark patterns eroding accountability, trust, truth, transparency and privacy.