Hacker Newsnew | past | comments | ask | show | jobs | submit | fennec-posix's commentslogin

Now this is WHY I love UNIX and UNIX-likes, the fact you can chop and change core components like the Kernel, Userspace, Init, etc. and (within compatibility limits i.e. MUSL/GLIBC) run a hybrid system like Chimera.

Would I run Chimera as a daily-drive? Probably not. Is it cool that someone can? Absolutely!


When I last looked a few years ago, there were some efforts and successes in the far East doing "chimera Windows", mostly based on running an older userland (like XP) on a newer kernel (10).

There is the Anglophone https://loss32.org/ project for a Linux distro with a Win32 desktop. It's #loss32 on Libera Chat.

Aside from enrolling a token with the TPM to unlock the LUKS volume, this is actually a pretty novel idea. Perfect for older hardware without TPM. I guess it depends on your use-case.


He was only briefly in Apocalypse Now, but definitely left his mark. RIP to a Legend.

"Some day this war's gonna end.... [Walks off]"


Emit at your own peril


At first, was horrified... But, goes into using eBPF and IO_URING to collect system stats instead of all the huge overhead of userspace calls (ontop of dbus, ontop of Gnome).. This is pretty good.


https://anubis.techaro.lol/docs/admin/honeypot/overview The Anubis scraper protection has this as a feature. Just sends garbage if something falls into a trap.


Not the parent poster, but I also still use telnet. For me it's "Ancient", I have a few retired SPARC and PA-RISC boxes that run their period appropriate OSes as a hobby. Telnet/rlogin is the more reliable method to get into them remotely (just over the LAN).

They're on a LAN behind a NAT Router/Firewall, and I don't always keep them powered up (I'm not that insane) so I really don't have a concern for them.

Some of the more modern/high-performance examples I have run NetBSD with modern sshd and modern ciphers, but you can tell it's a bit of a workout for them.


good. god.


I think this is really neat. Been wanting to create an ESP32-based environment monitoring system for outside to replace the cheap 915 MHz weather station I have. CAN might not be a bad technology to do this with since I don't really want to have yet more things emitting around 2.4/5 GHz


This solution uses 2pair standard rj11 telephone cable(tested upto 15meters - can be longer) - one pair is for CAN-L/CAN-H and 2nd pair is for dc supply between 6v to 24v, esp32 firmware offers failsafe A/B upgrade mechanism over CAN.


The destination IP has some high-value octets, almost wondering if it's a software bug in something out there:

Address: 66.252.224.242 01000010.11111100.11100000. 11110010

Maybe a long forgotten server with some ancient malware that keeps being moved around...

Mysterious


The destination IP address is my server, the one being attacked. I don't see the significant of the high-value octets.


all good, probably just me seeing patterns.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: