DACBARBOS Brand

@dacbarbos
140 Followers
1,090 Following
2.6K Posts
Happy New Year 2026
RT @[email protected]
You are here #ai #meme

RT @[email protected]

Torvalds takes a stand on social media shaming with kernel development.

https://linux-format.visitlink.me/MelAcT

Re: On community influencing (was Re: [PATCH v8 2/2] rust: add dma coherent allocator abstraction.) - Linus Torvalds

Metalhead (Black Mirror) - Wikipedia

MT @[email protected]
💡 CSS Tip!

Get the screen width and height using a few lines of CSS.
✅ Powered by @​property (Now available in all the browsers)
✅ Unitless values so you can easily use them inside any formula
✅ Updates on screen resize (No need for JS)

@[email protected] demo 👉 https://t.co/WFSUCRxTcR

Screen width/height (CSS-only)

What you see are the screen sizes (width x height) in pixel. No, I am not using JS to get them, it's a CSS-only trick! Online version: https://css-tip...

RT @[email protected]
In Rust We Trust?!?! We now have a working Spectre V1 attack for Rust. Using our Spectre V1 transient execution attack, we are able to force a bounds-checked Rust array to perform an arbitrary buffer overread. I've attached the function that we are attacking with Spectre V1. https://twitter.com/ToddMAustin/status/1730623011903168724
Todd Austin (@ToddMAustin) on X

In Rust We Trust?!?! We now have a working Spectre V1 attack for Rust. Using our Spectre V1 transient execution attack, we are able to force a bounds-checked Rust array to perform an arbitrary buffer overread. I've attached the function that we are attacking with Spectre V1.

X (formerly Twitter)

A lot neat 🍎-bugs patched in macOS 14.1: https://support.apple.com/en-us/HT213984

...but especially intrigued by CVE-2023-41989 (credit: Jewel Lambert):

"An attacker may be able to execute arbitrary code as root from the Lock Screen" ...via Emoji!? Ha 🤔😈 (via @[email protected]) #infosec

About the security content of macOS Sonoma 14.1

This document describes the security content of macOS Sonoma 14.1.

Apple Support