techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#useful

2 posts2 participants0 posts today
Newzzy<p>Why is Online Safety And Digital Literacy is Important for Senior Citizens? 2025 Report<br><a href="https://thenewzzy.com/why-online-safety-is-important-for-senior-citizens/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thenewzzy.com/why-online-safet</span><span class="invisible">y-is-important-for-senior-citizens/</span></a><br><a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/globalnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>globalnews</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/awareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>awareness</span></a> <a href="https://mastodon.social/tags/financialtips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>financialtips</span></a> <a href="https://mastodon.social/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://mastodon.social/tags/guide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guide</span></a> <a href="https://mastodon.social/tags/selfawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfawareness</span></a> <a href="https://mastodon.social/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.social/tags/guidelines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guidelines</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Xerz 💗<p>I feel like by the point the industry has managed to convince governments that millions of property rights were worthless because AI is a more profitable and <a class="hashtag" href="https://fedi.xerz.one/tag/useful" rel="nofollow noopener" target="_blank">#useful</a> goal, that battle was already lost<span class="quote-inline"><br><br>RE: <a href="https://mastodon.derg.nz/@anthropy/114975700920581718" rel="nofollow noopener" target="_blank">https://mastodon.derg.nz/@anthropy/114975700920581718</a></span></p>
Richard Rathe<p><span class="h-card" translate="no"><a href="https://velocipederider.com/@ruari" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ruari</span></a></span> </p><p>Ever wonder why we sometimes <a href="https://c.im/tags/count" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>count</span></a> things by the <a href="https://c.im/tags/dozen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dozen</span></a>, or why there are 60 minutes in an hour? We may have the ancient Babylonians (or earlier societies) to thank. They came up with this ingenious way to keep track of large numbers using only their two hands. There are variations on this theme, but it becomes pretty obvious if you have a hand with four fingers, with three bones each, and a thumb.</p><p><a href="https://mdpaths.com/rrr/history/counting_by_twelves/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mdpaths.com/rrr/history/counti</span><span class="invisible">ng_by_twelves/index.html</span></a></p><p><a href="https://c.im/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a> <a href="https://c.im/tags/time" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>time</span></a> <a href="https://c.im/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a></p>
gram<p>A police officer I know taught me this trick <a href="https://mastodon.social/tags/safetyfirst" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>safetyfirst</span></a> <a href="https://mastodon.social/tags/safety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>safety</span></a> <a href="https://mastodon.social/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.social/tags/momhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>momhacks</span></a><br>Best hacks for mom 2025 <a href="https://clapperapp.com/video/Z2E9z1X0kgkp6nDW?is_invite=1&amp;r=V6AEgwQY6p&amp;c=sh&amp;m=mo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">clapperapp.com/video/Z2E9z1X0k</span><span class="invisible">gkp6nDW?is_invite=1&amp;r=V6AEgwQY6p&amp;c=sh&amp;m=mo</span></a></p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/red_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>red_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/tool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tool</span></a></p><p>LoaderGate (<a href="https://github.com/casp3r0x0/LoaderGate" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/casp3r0x0/LoaderGate</span><span class="invisible"></span></a>) — загрузчик shellcode на C# автором, специализирующийся на обходе EDR-систем, таких как Palo Alto Cortex XDR и Sophos EDR. Загружает вредоносный код напрямую в память процесса, избегая стандартных механизмов защиты и детектирования, что позволяет незаметно выполнять payload. </p><p>RAITrigger (<a href="https://github.com/rtecCyberSec/RAITrigger/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rtecCyberSec/RAITri</span><span class="invisible">gger/</span></a>) — утилита на C# для запуска аутентификации от имени SYSTEM локально, чтобы затем использовать эти креды для NTLM relay-атак внутри инфраструктуры Active Directory.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/red_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>red_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/tool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tool</span></a></p><p>Ebyte-Go-Morpher (<a href="https://github.com/EvilBytecode/Ebyte-Go-Morpher" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/EvilBytecode/Ebyte-</span><span class="invisible">Go-Morpher</span></a>) — инструмент для модификации исполняемых файлов на Go с целью обхода антивирусов и систем обнаружения. Автоматически переименовывает функции, вставляет мусорные инструкции (NOPs), меняет структуру кода и сборку, не затрагивая логику исполнения. В результате создается функционально тот же EXE, но с другой сигнатурой.</p><p>Unicorn_PE (<a href="https://github.com/hzqst/unicorn_pe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/hzqst/unicorn_pe</span><span class="invisible"></span></a>) — фреймворк на базе эмулятора Unicorn Engine для анализа Windows PE‑файлов. Позволяет загружать PE в память, эмулировать его исполнение, выводить дизассемблированные инструкции, обрабатывать исключения, восстанавливать импортную таблицу и строки, зашифрованные через VMProtect, а затем сохранять исправленный бинарник. Крутой инструмент для реверса и разбора защищенных Windows‑исполняемых файлов.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/red_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>red_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/tool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tool</span></a></p><p>EvilReplay (<a href="https://github.com/EgeBalci/evilreplay" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/EgeBalci/evilreplay</span><span class="invisible"></span></a>) — инструмент для перехвата, модификации и повторной отправки NetNTLM аутентификационных запросов в сетевых протоколах Windows (например, SMB, HTTP, LDAP), с целью проведения атак типа NTLM relay или Pass-the-Hash. Работает как MITM-прокси и позволяет захватывать хэши NetNTLMv1/v2, модифицировать их или перенаправлять на другую цель для получения доступа без знания пароля.</p><p>SoaPy (<a href="https://github.com/logangoins/SoaPy" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/logangoins/SoaPy</span><span class="invisible"></span></a>) — фреймворк на Python для анализа, подделки и эксплуатации SOAP (Simple Object Access Protocol) веб-сервисов. Позволяет автоматически извлекать и парсить WSDL, генерировать SOAP-запросы, изменять параметры (в т.ч. для fuzzing) и анализировать ответы. Помогает тестировать SOAP-сервисы, в том числе на предмет ошибок авторизации, инъекций, логических уязвимостей и неправильной обработки XML.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/vendetect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vendetect</span></a> <a href="https://mastodon.ml/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a> <a href="https://mastodon.ml/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.ml/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a></p><p>- Vendetect (<a href="https://blog.trailofbits.com/2025/07/21/detecting-code-copying-at-scale-with-vendetect/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.trailofbits.com/2025/07/2</span><span class="invisible">1/detecting-code-copying-at-scale-with-vendetect/</span></a>) — инструмент от Trail of Bits, позволяющий массово обнаруживать скопированный или vendored код между репозиториями. Используя семантическое представление кода, он находит совпадения даже при изменении имен переменных или удалении комментариев. Vendetect учитывает историю версионного контроля, что позволяет точно сопоставлять куски кода с оригинальным коммитом-источником на Git и выявлять случаи копирования или повторного использования кода в открытых и коммерческих проектах.</p><p>- Awesome MCP Servers (<a href="https://github.com/punkpeye/awesome-mcp-servers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/punkpeye/awesome-mc</span><span class="invisible">p-servers</span></a>) — подборка самых интересных и полезных MCP-серверов. Удобная справочная платформа для специалистов, создающих ИИ‑ассистентов с расширенными возможностями взаимодействия с внешними ресурсами. Есть раздел с Security-focused MCP.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a> <a href="https://mastodon.ml/tags/kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kubernetes</span></a> <a href="https://mastodon.ml/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a></p><p>- SecurityAura (<a href="https://github.com/SecurityAura/DE-TH-Aura/blob/main/Microsoft%20Sentinel/Potential%20secretsdump%20remoteSSMethod%20-%20SAM%2C%20SECURITY%20and%20SYSTEM%20Accessed%20Remotely.md" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/SecurityAura/DE-TH-</span><span class="invisible">Aura/blob/main/Microsoft%20Sentinel/Potential%20secretsdump%20remoteSSMethod%20-%20SAM%2C%20SECURITY%20and%20SYSTEM%20Accessed%20Remotely.md</span></a>) — Kusto‑запрос `Potential secretsdump remoteSSMethod – SAM, SECURITY and SYSTEM Accessed Remotely`, предназначенный для Microsoft Sentinel. Выявляет подозрительную активность — удаленный доступ к системным реестрам `SAM`, `SECURITY` и `SYSTEM`. Также анализирует события, указывающие на подключение к реестру с IP-адресов, не относящихся к контроллерам домена. Позволяет отследить ранние этапы атаки и возможное извлечение секретов из AD.</p>
Who Let The Dogs Out 🐾<p>Несколько полезных мастридов</p><p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a> <a href="https://mastodon.ml/tags/kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kubernetes</span></a> <a href="https://mastodon.ml/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a> <a href="https://mastodon.ml/tags/hyperv" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hyperv</span></a> <a href="https://mastodon.ml/tags/NovaHypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NovaHypervisor</span></a></p><p>- KubeForenSys (<a href="https://github.com/invictus-ir/KubeForenSys" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/invictus-ir/KubeFor</span><span class="invisible">enSys</span></a>) — Python‑фреймворк для автоматизированного сбора данных с кластеров Kubernetes (в первую очередь AKS) с последующей выгрузкой в Azure Log Analytics. Собирает логи подов, события, историю команд внутри контейнеров, информацию об учетных записях сервисов, RBAC‑конфигурации, cronjob, сетевые политики, а также обнаруживает подозрительные поды, чтобы сформировать сводную временную шкалу инцидентов.</p><p>- NovaHypervisor (<a href="https://github.com/Idov31/NovaHypervisor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Idov31/NovaHypervis</span><span class="invisible">or</span></a>) — экспериментальный x64‑гипервизор для Windows (совместимый с Hyper‑V), написанный на C++ и ассемблере. Служит в качестве защитного уровня, отслеживающего и блокирующего попытки несанкционированного доступа к критическим структурам ядра через EPT-правила и inline‑hook‑механизмы.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a> <a href="https://mastodon.ml/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a> <a href="https://mastodon.ml/tags/easteregg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>easteregg</span></a></p><p>Finding a 27-year-old easter egg in the Power Mac G3 ROM (<a href="https://www.downtowndougbrown.com/2025/06/finding-a-27-year-old-easter-egg-in-the-power-mac-g3-rom/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">downtowndougbrown.com/2025/06/</span><span class="invisible">finding-a-27-year-old-easter-egg-in-the-power-mac-g3-rom/</span></a>) - оживление забавной пасхалки из 90-х. Исследователь Дуг Браун после 27 лет изучения прошивки Power Mac G3 обнаружил идеальный механизм срабатывания давно известного, но недоступного изображения с командой разработчиков, спрятанного в ROM. Используя Hex Fiend и шаблон ROM Fiend он выделил ресурс HPOE (JPEG‑фото команды) и Pascal‑строки (.Edisk, secret ROM image, The Team) в SCSI Manager 4.3. Затем с помощью Ghidra выяснил, что при создании RAM‑диска с именем secret ROM image система копирует туда JPEG как файл The Team.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a></p><p>- SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models (<a href="https://arxiv.org/abs/2506.20415" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2506.20415</span><span class="invisible"></span></a>) — статья на arXiv, авторы которой представили новый подход к верификации безопасности систем с использованием многомодульной системы агентов, основанных на LLM. Авторы представляют SV-LLM как многоагентную систему, в которой специализированные LLM-агенты выполняют различные задачи, например, моделирование угроз или идентификация активов безопасности.</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a></p><p>- Outsourced Trust: How Coinbase's $400M Problem Started in an Indian Call Center (<a href="https://www.reco.ai/blog/coinbase-breach" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">reco.ai/blog/coinbase-breach</span><span class="invisible"></span></a>) — целенаправленная добыча персональных данных (подкуп сотрудников аутсорсингового центра поддержки в Индии). Доступ: имена, адреса, номера телефонов, изображения удостоверений личности, последние четыре цифры SSN и банковские реквизиты. Zero trust должен применяться и к подрядчикам, особенно в BPO/саппорт-цепочках.</p><p>- Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound (<a href="https://specterops.io/blog/2025/06/25/good-fences-make-good-neighbors-new-ad-trusts-attack-paths-in-bloodhound/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">specterops.io/blog/2025/06/25/</span><span class="invisible">good-fences-make-good-neighbors-new-ad-trusts-attack-paths-in-bloodhound/</span></a>) — обновленная модель доверительных отношений в Active Directory для BloodHound (v7.4+), замена TrustedBy-edge на SameForestTrust (интрафорест, трассируемый), CrossForestTrust (межлес, нетрассируемый), AbuseTGTDelegation и SpoofSIDHistory (трассируемые при уязвимых конфигурациях доверия: делегирование TGT или разрешённая история SID).</p>
Who Let The Dogs Out 🐾<p><a href="https://mastodon.ml/tags/blue_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blue_team</span></a> <a href="https://mastodon.ml/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://mastodon.ml/tags/mustread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mustread</span></a></p><p>- NordDragonScan: Quiet Data-Harvester on Windows (<a href="https://www.fortinet.com/blog/threat-research/norddragonscan-quiet-data-harvester-on-windows" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/norddragonscan-quiet-data-harvester-on-windows</span></a>) — анализ новой угрозы для Windows. Представляет собой скрытно работающий инфостилер, внедряемый через HTA‑скрипт и распространяющийся через LNK‑ярлыки и RAR‑архивы. После запуска крадёт системную информацию (WMI, сетевые адаптеры, снимки экрана), выкачивает профили Chrome/Firefox и документы (.docx, .pdf, .xls, .ovpn, .rdp и др.), а затем шифрует и пересылает всё на C2‑сервер kpuszkiev.com по HTTPS.</p><p>- Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack (<a href="https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">unit42.paloaltonetworks.com/ap</span><span class="invisible">ache-cve-2025-24813-cve-2025-27636-cve-2025-29891/</span></a>) — подробный разбор трёх критических уязвимости RCE в Apache: CVE‑2025‑24813 в Tomcat (ошибка при обработке partial PUT и сессионного хранения), а также CVE‑2025‑27636 вместе с CVE‑2025‑29891 в Apache Camel (недостаточная фильтрация HTTP‑заголовков и параметров). Баги активно эксплуатируются — зафиксированы тысячи сканирований и попыток атак.</p>
aproitz<p><span class="h-card" translate="no"><a href="https://mastodonapp.uk/@MarkHoltom" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MarkHoltom</span></a></span> </p><p>Bitte we truly should and need to <a href="https://mastodon.social/tags/warn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>warn</span></a> about <a href="https://mastodon.social/tags/Fascism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fascism</span></a> today more than ever. So this <a href="https://mastodon.social/tags/Poster" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Poster</span></a> is very <a href="https://mastodon.social/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a>.</p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>Satisfies in TypeScript</p><p>This is a post about one of TypeScript’s less common features: the satisfies keyword. It’s occasionally incredibly useful, and knowing how to properly wield it is a valuable trick to have up your sleeve. Let’s take a look!</p><p>🧑‍💻 <a href="https://frontendmasters.com/blog/satisfies-in-typescript/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">frontendmasters.com/blog/satis</span><span class="invisible">fies-in-typescript/</span></a></p><p><a href="https://chaos.social/tags/webdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webdev</span></a> <a href="https://chaos.social/tags/typescript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typescript</span></a> <a href="https://chaos.social/tags/statisfied" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>statisfied</span></a> <a href="https://chaos.social/tags/keyword" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keyword</span></a> <a href="https://chaos.social/tags/ts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ts</span></a> <a href="https://chaos.social/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://chaos.social/tags/js" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>js</span></a> <a href="https://chaos.social/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://chaos.social/tags/code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>code</span></a> <a href="https://chaos.social/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://chaos.social/tags/structural" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>structural</span></a> <a href="https://chaos.social/tags/structure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>structure</span></a> <a href="https://chaos.social/tags/trick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trick</span></a> <a href="https://chaos.social/tags/objectoriented" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>objectoriented</span></a></p>
R.L. Dane :Debian: :OpenBSD: 🍵 :MiraLovesYou:<p>Shell two-liner to watch your phone battery via KDE Connect while charging (or discharging):</p><pre><code>alias kcbatt='qdbus6 org.kde.kdeconnect /modules/kdeconnect/devices/$(grep -Em1 "^\[[0-9a-f_]+\]" ~/.config/kdeconnect/trusted_devices |tr -dc 0-9a-f_)/battery org.kde.kdeconnect.device.battery.charge' ob=0; while b=$(kcbatt); do if ((ob!=b)); then date "+%H:%M $b%%"; ob="$b"; fi; sleep 5; done </code></pre><p><a href="https://polymaths.social/tags/kde" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDE</span></a> <a href="https://polymaths.social/tags/kdeconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KDEConnect</span></a> <a href="https://polymaths.social/tags/shellscripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShellScripting</span></a> <a href="https://polymaths.social/tags/oneliner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OneLiner</span></a> <a href="https://polymaths.social/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Useful</span></a></p>
Steve Dustcircle 🌹<p>10 100-Year-Old <a href="https://masto.ai/tags/LifeHacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LifeHacks</span></a> That Are Surprisingly <a href="https://masto.ai/tags/Useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Useful</span></a> Today </p><p><a href="https://linkiest.com/10-100-year-old-life-hacks-that-are-surprisingly-useful-today/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linkiest.com/10-100-year-old-l</span><span class="invisible">ife-hacks-that-are-surprisingly-useful-today/</span></a></p>
Douglas E. Welch<p>If you are useful, it doesn’t mean you are valued via Better Than Random [Shared]</p><p>As you progress in your career, understanding the difference between being useful and being valued is very important. At first glance, they might look similar because the signals you get are more or less the same: a promotion, a higher than expected bonus, a special stock award. This is why it’s important to dig deeper and try to detect subtler signals.</p><p><a href="https://welchwrite.com/blog/2025/07/12/if-you-are-useful-it-doesnt-mean-you-are-valued-via-better-than-random-shared/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">welchwrite.com/blog/2025/07/12</span><span class="invisible">/if-you-are-useful-it-doesnt-mean-you-are-valued-via-better-than-random-shared/</span></a></p><p><a href="https://nerdculture.de/tags/work" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>work</span></a> <a href="https://nerdculture.de/tags/life" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>life</span></a> <a href="https://nerdculture.de/tags/career" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>career</span></a> <a href="https://nerdculture.de/tags/growth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>growth</span></a> <a href="https://nerdculture.de/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a> <a href="https://nerdculture.de/tags/valued" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valued</span></a> <a href="https://nerdculture.de/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a> <a href="https://nerdculture.de/tags/learning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>learning</span></a> <a href="https://nerdculture.de/tags/shared" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shared</span></a></p>
Robot Diver<p>My brain might be foggy, but I still managed to make this in between big rests today. Our former garden hose lives again. Exterior grade uv graded zip ties instead of adhesive in case we ever need a little bit of hose for something/future upcycling. </p><p>I had considered doing all three hoses as a big outdoor rag rug, but they are so heavy. </p><p>Think I will make three mats like these instead. </p><p><a href="https://starlite.rodeo/tags/upcycling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>upcycling</span></a> <a href="https://starlite.rodeo/tags/gardening" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gardening</span></a> <a href="https://starlite.rodeo/tags/diy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>diy</span></a> <a href="https://starlite.rodeo/tags/useful" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>useful</span></a></p>