UP | HOME

Internet Collections

Table of Contents

1. 一些(个人)博客收集

        _                                                  ___
 /\    /   _  ._ _|_  _. o ._    |\/|  _.  _  o  _  _. |    |  ._   _|  _
/--\   \_ (/_ |   |_ (_| | | |   |  | (_| (_| | (_ (_| |   _|_ | | (_| (/_ ><
                                           _|

1.2. qiusir   rssub

1.3. XahLee

Marisa_Kirisame_emacs_magic.png

1.4. 王垠

1.5. 阮一峰   rssub

1.6. 黑客技术   hack

really good website, butt, no rss

1.7. Bryan Ford

leads the Decentralized/Distributed Systems (DEDIS) lab

Two Principles of Deadlines:

  1. All deadlines converge on the same day—Deadline Day.
  2. Every day is Deadline Day.

1.9. floooh(The Brain Dump)   c

07 年开始, cpu emulator

1.9.2. Modern C for C++ Peeps

Modern C is not a subset of C++

1.10. Core Dumped   rust lowlevel emacs

all 7 article are of high quality

1.13. 这可太刑了

学习通事件相关

1.14. 写着写着就懂了   elixir

elixir/erlang大佬, 公众号: HelloElixir

1.15. lujun9972   emacs rssub

超~~~多emacs

1.15.1. emacs document

1.16. 文辉的烂笔头   lowlevel

CPU, IC, ARM

第一次查过的问题,就应该记下来 !
第二次再查的问题,就必须记下来 !

1.16.2. 解决Org-Mode表格不对齐问题

更纱黑体 使中文恰好为英文宽度两倍, 使用字体比 valign 更通用, 但是不好看

1.17. scinart   lisp

13年最后更新

1.18. bozhang   rssable

05 年开始, 天文学

1.20. IceGuye

1.23. 第 N 个质数   c algorithm

看不懂, 先收藏着

1.24. mrxn   hack

网安, data-leak

1.25. include-yy   c lisp emacs

许多东方的图诶

1.25.2. 由(λ(x)(x x))看elisp与scheme之区别

这个问题其实就是 Lisp-1 和 Lisp-2 的区别导致的
Lisp-1 的变量命名空间和函数命名空间是统一的,而在 Lisp-2 中两者是分开的

  1. Xah Lee Lisp-1 vs Lisp-2

1.27. keep coding   rust c lowlevel backend

写代码的西瓜

1.27.1. EmacsTalk

1.27.2. 现代化 C   c

1.28. Tomas Petricek   rssub

F#, M1(r0$0f+, very high quality

1.29. 弦外之音   c lowlevel

源码分析

1.30. TODO lightless blog   hack

1.31. The State of GPGPU in Rust   rust lowlevel

1.33. Xe Iaso   rssub

1.33.1. series: V

  1. V for Vaporware

    经典永流传~

1.33.2. Nim and Tup

1.33.3. OpenSSL gave everyone alarm fatigue

funny byte

--- a/crypto/punycode.c
+++ b/crypto/punycode.c
@@ -181,7 +181,7 @@ int ossl_punycode_decode(const char *pEncoded, const size_t enc_len,
         n = n + i / (written_out + 1);
         i %= (written_out + 1);

-        if (written_out > max_out)
+        if (written_out >= max_out)
             return 0;

         memmove(pDecoded + i + 1, pDecoded + i,

1.35. UlyC   python

1.35.2. 2021年, 用更现代的方法使用PGP

同样是非对称算法, 为什么PGP的私钥就长这么多呢?
因为他们用的算法不同, 比特币默认使用的是ECDSA的 secp256k1算法, 该算法只是用来签名和认证, 并不用来加密
(signify 只用于签名认证, age 只用于加密, 所以密钥也比较短)

  1. 震惊! 竟然有人在 GitHub 上冒充我的身份!

1.36. kernal

Welcome to the darkest dungeon of kernal

1.36.1. Dumping Linuxfx customers   fun

A Windows-like distro including the spyware and activation

1.37. vimacs

Written with Vim and Emacs. A member of Linux Club of Peking University.
with cat-v-like sidebar style

1.39. Nyxt: Why should I care about Gopher?   gopher

By making something a little bit more inaccessible, we are inadvertently putting a filter on what is being posted.

This makes it a great way to avoid a lot of the low effort noise published on popular/accessible platforms.
As a result, Gopher is full of interesting, enriching, high quality content.
The authors are posting out of passion, and with great commitment.
Don't get me wrong, there's nonsense on Gopher too, but far less of it.

1.39.1. 社区本地人与永恒的九月(Eternal September)

几乎所有大众互联网社区都难逃此宿命。要想避免永恒九月,社区必须要足够克制,有节奏地引导新人加入。
但是过去20年互联网行业大发展的基本模式就是吸引大量用户、获取大平台地位、取得超额收益。
用户量是商业成功的互联网平台所必须追求的第一目标。要想获得商业成功,永恒九月来得越早越凶猛越好。

Internet_is_Full_-_Go_Away_t-shirt.jpg

1.40. TODO Peter 's Homepage   rssub

GE d@ s: a C++$ UBL+++$ P++(–)$ L++(-)$ !E W+++(-)$ !N !o K–? w !O !M !V PS++ PE- Y+ PGP+ t+ 5+++ X+ R tv b+ DI D+ G e++ h r+++ y+++*

1.40.1. Gopher? Gopher.

1.42. phenix3443   c emacs

刘尚亮

1.43. julienblanchard/typed-hole   plan9

1.43.1. pmikkelsen

1.45. 金步国作品集   lowlevel linux

kernel, LFS

1.51. B

1.51.1. yanemame

猴哥推荐的

1.51.2. 我不会编程

EvanMeek
B站: 美味的樱桃菌

1.51.3. CC   linux

B站: 称呼我C先生

1.51.4. lunaixsky   c lowlevel

1.51.5. EndlessPeak   linux

1.52. ZhiHu

1.52.2. 倔强的程序员

编! 译! 原! 理!

1.52.3. 专栏: 技术考古   plan9

plan9

1.52.4. 专栏: 嘶吼RoarTalk   hack

回归最本质的信息安全

1.52.6. 如何解读EVA

人需不需要存在的意义
人需不需要互相之间完全理解
自我封闭是否是应对外界压力的合理方式

1.52.7. linuxcn: 少年黑客对自由软件的自由漫谈

linuxcn 里唯一一个让我感觉很有必要把链接放在这的文章

1.52.8. Z-library 域名被扣押,应急访问办法

use the power of tor:
  http://zlibrary24tuxziyiyfr7zd46ytefdqbqd2axkmxm4o5374ptpc52fad.onion
  http://loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion
  http://loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion

1.53. shenjack/HWS/fri3nds

1.53.1. 老网虫

1.53.2. yang-qwq

1.53.3. zhanganzhi

1.53.4. 芒果快评

今年的新博客, 友链有踏浪

2. YouTube 收集(没有账号, 这就是我的收藏夹)

2.1. Computer Science

2.1.1. tsoding

  1. helloworld in c
  2. virtual machine in C , some notes
  3. irc client in ocaml

    0:50 List.fold_left faster than fold_right, but haskell is opposite
    1:00 I like ocaml, that's how python should look like,
    but ocaml itself is not ideal, you have to take ocaml and throw O away, and that's perfect
    1:03 to be fair p___hub is more interesting than this, that's for sure, so let's use Makefile (instead of dune)
    1:50 sexplib?
    2:14 "how many american server you have already hacked" - "I don't count them I'm sorry"

  4. Parsing Java Bytecode with Python

    0:05 look how TINY Java code is
    0:06 nonono all the opensource are controlled by coporation actually,
    they create a text editor plugin and sell the free code for $10 a month

  5. Hacking TCC compiler

    If we allowed `.` being treated automagically as `->` in C when used on pointers to structs,
    how much existing C code would be broken?

2.6. ?

2.6.3. Why I'm Suing YouTube.

a story about YouTube’s intentional efforts to undermine the United States of America in collusion with the Russian government.
It’s also a story about copyright infringement
— and YouTube’s willful blindness to bad actors who openly admit
to filing patently fraudulent DMCA counter-notifications to avoid the termination of their accounts.

2.6.5. Beating 5 Scam Arcade Games with Science

街机科学家~

3. r

4. Mail

4.1. GNU C Language Intro and Reference Manual

To any NSA and FBI agents reading my email: please consider
whether defending the US Constitution against all enemies,
foreign or domestic, requires you to follow Snowden's example.

5. Other

5.1. Python-5

from tsoding's first porth video, (he is using debian, 37:00 copilot xd)

5.2. cat -v

not only harmful stuff <3

5.3. fediverse wiki

The Fediverse is a giant Network of social media platforms

5.3.1. there's another thing webmention which I found from Xe's blog

5.5. Adequacy: Is Your Son a Computer Hacker?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system,
invented by a Soviet computer hacker named Linyos Torovoltos.

5.7. oxygenos

his final year project in high school, 2008
a webos using oxygen visual design

5.9. gccemacs

5.14. OldLinux.org

Author: dongdigua

Date: 2022-06-05 日 00:00

Build: 2022-12-03 六 22:45

LICENCE: CC BY-NC-SA

If you have any idea, please contact me! I may add your comment