The Dark Assassins Podcast
By Dark Assassins Inc.
The Dark Assassins PodcastJun 01, 2024
Can Spyware be a Useful Feature?
Microsoft revealed a new AI-powered feature called "Recall" for Copilot+ PCs at their event they held last week. This Windows 11 feature allows users to search for and retrieve their past activities on their PC. That, of course, comes at a cost to not only system resources but also raises concerns over privacy. In this episode, we dive into what this “Recall” feature is all about and if it is worth using or if you should disable it. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Microsoft "Recall" press release
Microsoft's privacy claims about Recall
Microsoft's Pluton security processor
Follow Us:
Dr. Frankenstein’s Back at it Again!
Anyone remember the Apple Developer Transition Kit (DTK)? Dr. Frankenstein (aka. dosdude1) sure does. In this episode, we look at developing for Apple Silicon and how an iPad chip beats the pants off of a, albeit former, top-of-the line workstation in not only performance but also at a fraction of the power. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Our interview with dosdude1:
- YouTube
- Podcast
Follow Us:
Doing Things the Ansible Way
Ansible is a popular open-source configuration management and automation tool that is loved by many system administrators and DevOps professionals, and today we are going to dive into why it is so freaking awesome and just some of the many use cases for it. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://thehackernews.com/2024/05/microsoft-patches-61-flaws-including.html
https://thehackernews.com/2024/05/google-patches-yet-another-actively.html
Follow Us:
Want the Latest Apple Silicon? Buy an - iPad?
Apple just held their “Let Loose” event, where they unveiled new iPads. In this episode, we will discuss what these new changes are and the mind-blowing fact that if you want the latest and greatest Apple Silicon, you need to buy an iPad. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Hacking RHEL, More Ansible Automation, Embedding Assets in Binaries | Operation Core Dump
The Red Hat Enterprise Linux (RHEL) “free money glitch” saga continues. In theory, gaining root access to any already authenticated RHEL system will allow you to access an infinite number of RHEL systems for free without having to register any of them. Also in this episode, we, once again, touch on how awesome Ansible is and how easily you can remove the friction induced by manually performing tasks on a server(s) by automating everything. Lastly, we discuss the pros and cons of embedding assets, such as images, audio, fonts, etc., directly into your binaries vs. having your binary reach out to a resources folder. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://thehackernews.com/2024/05/cisa-warns-of-active-exploitation-of.html
Follow Us:
Where to Start with Software Development and Homelabbing
We talk a lot about software development and homelabbing, but where and how do you start? Today we start from zero and give you the road map for how to get started with software development and/or homelabbing, assuming you’ve never written a line of code or deployed a server or virtual machine in your life, but you want to do one or both of those. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Writing a HTTP Server: A Perfect Intro to Cybersecurity and Software Development
In this episode, we explore why writing a simple HTTP server serves as the perfect introduction to both cybersecurity and software development. From understanding networking protocols to writing robust software by fortifying systems against security vulnerabilities, we look at why writing your own HTTP server offers valuable insights for those wanting a better understanding of not just software development but cybersecurity as well. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Strategies for Error Handling in Your Software Projects
Error handling and exception handling are crucial aspects of software development aimed at managing unexpected events and errors that may occur during the execution of a program. In this episode, we’ll take a look at some strategies for handling errors and exceptions, including error propagation, error recovery, and defensive programming techniques. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Rust Standard Library Vulnerability
Follow Us:
The Perfect Score You Don’t Want
A massive backdoor exploit was found in the XZ Utils library, which is included with almost all Linux distributions, granting root access to an attacker just by logging in to a server via SSH. In this episode, we are covering the intricate workings of how the exploit works from building and including into the library itself, to actually exploiting. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
XZ Utils References:
General Info + Affected Distros
Andres Freund Discovers the Vulnerability
Follow Us:
Tech Buzzwords Decoded, 40x Performance With Cache, Writing MS-DOS Code | Operation Core Dump
The technology sphere has a lot of buzzwords, but what do they all mean? In this episode, we take a lighthearted look at the “true” meaning of some of these buzzwords. Also in this episode, we revisit our cache performance discussion from last week to show the real-world, absolutely mind-bending performance gains cache hits have. Finally, we talk about what it’s like to write code for MS-DOS. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Dracula - "Phishing-as-a-Service"
Follow Us:
Centennial, Coding Like it’s 1994, Cache Performance | Operation Code Dump
Have you ever wondered what it was like to write code back in the late 80’s and early 90’s or why minor tweaks to your code can cause massive performance improvements? In this episode, we are going back in time to the MS-DOS days to see what it was like to write software back in the day. We are also going to talk about cache performance and why optimizing your code to have more cache hits rather than misses can have such a drastic improvement on your program's overall performance. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
The Usefulness of AI in Software Development
Artificial Intelligence can be a powerful tool, but it is not without its pitfalls. In this episode, we tackle whether Large Language Models (LLMs) are worth using for software developers and if they do more harm than good, as well as looking at their pros and cons. Also this week, we look into the recent legislation “TikTok Ban” that just passed the United States House of Representatives and what that actually means for data privacy and cybersecurity. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Choosing Your Architecture: Monolith or Microservice
Two of the most common architectures in software development are Monolithic and Microservices. Microservices might be the hip new kid on the block, but that doesn’t necessarily mean it's the best architecture for every software application. In this episode, we break down each architecture and compare what use cases suit which architecture to help you decide what is best for your next software development project. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Should C/C++ Start Climbing The Stairway to Heaven in The Name of Cybersecurity?
The White House published a report calling for the reduction of memory safety vulnerabilities at scale and how creators of software and hardware can better secure the building blocks of cyberspace. In this episode, we dive deep into what memory safety is and the challenges associated with migrating all code to memory-safe programming languages. We will also look at what mitigation steps can be taken, such as secure coding, in order to better protect code written in memory-unsafe languages from common memory-safety vulnerabilities. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
What Does AI Think About Homelabs?
Artificial Intelligence (AI) has been all the rage for over a year now. Previously, AI was thought to only be relegated to datacenters with tons of GPUs, but now you can run Large Language Models (LLMs) in your very own homelabs! Speaking of homelabs, what do our AI overlords think of homelabs? We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Apple Bringing Quantum-Resistant Encryption to iMessage
Follow Us:
Software Development Hot Takes: C++ STL Containers and Smart Pointers
C++ has a lot of quality-of-life improvements compared to C. In this episode, we are diving deep into the C++ STL containers and smart pointers to try and determine if these quality of life improvements are actually worth using, like the C++ evangelists say. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://thehackernews.com/2024/02/4-ways-hackers-use-social-engineering.html
Performance analysis paper on C++ smart pointers
Follow Us:
Winnie-the-Pooh’s Favorite Cybersecurity Principle: Honeypots
Honeypots are not only vessels for the sweet and sugary substance known as honey. They are also tools used by cybersecurity researchers and enthusiasts alike to lure in threat actors and analyze their movements, actions, malware, etc. In this episode, we will take a look at the use cases and goals of honeypots, as well as things to keep in mind or be wary of if you want to set one up yourself. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
More info about honeypots: https://us.norton.com/blog/iot/what-is-a-honeypot
Follow Us:
Technical Debt, Procedurally Generated Graphics, A New Milestone | Operation Core Dump
Technical debt is something no one wants but always seems to creep up on, and possibly overwhelm, code bases. But what is technical debt? In this episode, we will answer that question, as well as what procedurally generated graphics are and how they work. Lastly, we have a major milestone we would like to celebrate to cap off the episode. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Jetbrains developer lifestyle survey
Follow Us:
Should Developers Have Admin Rights
What is more important, cybersecurity or productivity? In this episode, we tackle one of the hot topics in the IT world. Should developers have administrator access to their devices? We look at both sides: how it can make developers more productive, but at the cost of security, or how it can make you more secure, but at the cost of developers being less productive. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Productivity Tracking for Software Development: Justified or Unnecessary
Productivity tracking applications are ubiquitous with professional software development, but that doesn’t mean it’s for the best. In this episode, we look at the pros and cons of using such applications to try and understand if they are even worth using in the first place for optimal performance of development teams and personal use. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Unveiling the Vitality of Secure Code
Cybersecurity is everyone’s responsibility, especially the developers that write the applications and software we use every day. In this episode, we look at why secure coding is so important, what it is, some best practices about how to go about doing it, and why every developer should implement it when they write their code and not as an afterthought after the fact. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://www.apple.com/newsroom/2024/01/apple-vision-pro-available-in-the-us-on-february-2/
Vision Pro SDK Restricted to Apple Silicon
Follow Us:
2024 is the Year of Personal Projects
It’s a new year, and that means it's time to start working on, or return to, personal projects. The Dark Assassins Podcast champions how beneficial personal projects are. Whether that is installing services or hardware in a homelab or developing your own software projects, regardless of the domain, personal projects not only give you enjoyment but also useful skills that enterprises are dying to have. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://thehackernews.com/2024/01/google-settles-5-billion-privacy.html
https://9to5mac.com/2023/12/27/apple-watch-ban-pause/
Follow Us:
Building Out a Homelab, From Budget to Datacenter
If you only had a set amount of money to rebuild your homelab from scratch, how would you do this? In this episode, we take a look at various possible homelab configurations, from the most budget-friendly options to creating a full-on datacenter. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
The Software That Runs Homelabs and Powers Developers
In this episode, we take a look at some of the best open-source projects. We look at a wide range of projects, from things you can run in your homelab to everyday pieces of software, development tools, and more. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Apple halting Apple Watch Series 9 and Ultra 2 sales
Follow Us:
Bluetooth Vulnerability, macOS On Linux?, Don’t Discount Programming Languages | Operation Core Dump
A recent flaw in Bluetooth could leave your devices vulnerable. What is it, and how can you protect yourself until patches are rolled out? Running macOS, on Linux? Yes, and it’s awesome and an excellent complement to any developer or homelabbers environment. Lastly, we discuss why you should never count out a programming language just because you don’t like it and how having a broad knowledge of many programming languages can improve your career as a software developer. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Principle of least privilege implementers everywhere facepalm 🤦♂️
Follow Us:
How Software License Keys Work
While controversial and not as common nowadays, with software moving towards a subscription model, software licenses, and specifically software license keys, played a pivotal role in the history of software development. In this episode, we look at what software license keys do, how they work, the information encoded in them, and the cybersecurity principles at play when generating and reverse engineering them. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Laws about reverse engineering:
Reverse Engineering practice: https://crackmes.one/
- To find keygen ones, click Search, and type “keygen” in the name field and hit search
Follow Us:
Cybersecurity Wake-up Call
Apparently, “common sense” cybersecurity measures aren’t so common, according to findings by the NSA and CISA. In this episode, we are taking a look at the “Top 10 cybersecurity misconfigurations” and how to mitigate or prevent them. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Top 10 Cybersecurity Misconfigurations
Follow Us:
Build It All From Source, Optimize ZFS Cache Allocation, The Truth About Thanksgiving | Operation Core Dump
Why use a prebuilt library or program when you can just build it all from source yourself? In this episode, we're talking about why opting to build the libraries yourself can add a lot of flexibility to your build system. Also in this episode, we take a dive into ZFS cache and how to utilize it effectively, whether that is for a NAS or a hypervisor. Finally, we expose the truth about Thanksgiving and how, in reality, it is just one big allegory for software development and computer science topics. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Rome Wasn’t Built in a Day; Neither is a Homelab or Software
The famous saying “Rome wasn’t built in a day” applies to more than just civilizations, it also applies to your personal projects and your homelab. In this episode, we take a look at why you should focus on the small wins and how you can stay motivated even when it may seem like there is so much more to do or implement. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Apple announces they are bringing RCS support later next year
Follow Us:
Game Development is the Swiss Army Knife of IT
Game development is basically the Swiss Army knife when it comes to all things technology, but specifically computer science and software development. In this episode, we’ll be breaking down all the various aspects of computer science, software development, and technology in general that developing your own video game will teach you. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
How Fast is “Scary Fast”?
How fast is “Scary Fast”? In this episode, we are discussing Apple’s latest announcement of their new chips and the devices they’re in. We also take a moment to look back at some of the great Intel Macs and how these former titans compare to the latest and greatest from Apple. Finally, we look at a perfect marriage between software development and homelabbing. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
We Need More Analog, Apple Xserve Keeps Kicking, State Machines | Operation Core Dump
As more and more things become controlled by software and electronics, when that software or those electronics stop working, it can cause major problems in your day-to-day routines and even put you at risk. In this episode, we’ll be covering why we need more analog devices as well as what state machines are and how they work. Of course, finally, long live the Xserve! Even though Apple discontinued it well over a decade ago, it keeps on kicking even with the latest macOS. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Why Software Developers “Aren’t Loyal”
According to industry data, developers have the highest turnover ratio out of all professions and change jobs, on average, twice as often as other non-developers. Why is this? Are developers just not loyal to companies? In this episode, we’ll be looking into the reasons why developers elect to leave companies so frequently and what both the developers and management can do to alleviate these issues. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Hacked By Proxy, Free Real Estate, SFP+ Shenanigans | Operation Core Dump
One of the worst ways you can be hacked is when you weren’t even hacked yet got your personal information stolen anyway from someone you know getting hacked. In this episode, we’ll be taking a look at the recent 23andMe hack and what it means. Also in this episode, we look at some shenanigans hardware vendors pull when it comes to the compatibility of SFP+ transceivers. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
VLANs Are More Than Just Theory
VLANs are a staple in any corporate or enterprise networking solution, and even some homelabs. However, VLANs can be hard to grasp and implement for those who aren’t all that familiar with them. In this episode, we’ll be looking at not just how VLANs work but also how they are implemented. All while not changing how your code interfaces with the rest of the software. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Bit-Packing: A Memory Optimized Way to Write Unreadable Code (And I Love It)
Writing optimized code in terms of memory footprint performance should be goals of every software developer. In this episode, we’re taking a look at how properly aligning your data and even packing multiple variables into a single variable with bit-packing can save you a lot of memory you would otherwise be wasting. All while not changing how your code interfaces with the rest of the software. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Jeff Geerling's Raspberry Pi 5 Video
Follow Us:
Extreme Makeover: Homelab Edition
“My homelab is finally complete"—the infamous words of a homelabber before they inevitably upgrade something else. Homelabs are a constantly growing and evolving thing, and in this episode, we were going over tons of hardware and other infrastructure changes, as well as some software changes as well. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Welcome to 2013, iPhone 15 Pro
Apple just held their September "Wonderlust" event, where they unveiled the new Series 9 and Ultra 2 Apple Watches, as well as the new iPhone 15 and iPhone Pro lines. In this episode, we’ll be covering what’s new, if it's worth upgrading, and what these updates mean for the future of other Apple products. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Apple Dominates Headlines, Contributing to Open-Source, Homelab Push-Notifications | Operation Core Dump
Apple was all in the news this week for exploits, security patches, and their announcement of their September event, Wonderlust. Also, we’ll discuss how becoming a contributor to an open-source project might not seem as farfetched as it sounds and how it is totally within the reach of all developers. Lastly, we are taking a look at a cool tool for your homelab that will allow you to get real-time updates and monitoring of everything happening in your homelab sent directly to your phone. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://thehackernews.com/2023/09/key-cybersecurity-tools-that-can.html
Apple's September, “Wonderlust,” Event
Follow Us:
Round and Round it Goes; Where it Stops When X is Greater Than 10
Loops play an integral role when it comes to software development. However, if you aren’t careful, they can cause your program to run forever or outright crash from a stack overflow (yes, that’s a real thing, not just a website). In this episode, we’re looking at the various kinds of loops, how they're used, and why you may or may not want to use one over the other given your use case. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Why You Should, and Shouldn’t, Build a Custom Server for Your Homelab
When it comes to sourcing your next server, or even your first server, a common debate arises: do you buy a pre-built server, or do you custom build one? In this episode, we are breaking down the pros and cons of each to help you decide which is right for you. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Legitimacy of a VR Future, Software Updates Out the Wazoo, Web Scraping | Operation Core Dump
Ready Player One offers an online utopia built in virtual reality where you can do anything and be anything you want, but how realistic is that future in our world? What are the data and privacy implications of such a world? Also in this episode, we go over a number of software updates and also discuss what a web scraper is and why Python is so darn good at it. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Patching Other People’s Code
Whether you are working in a company, on a school project, on an open source project, or on any project where the codebase is not entirely your own, you will inevitably run into a scenario where you have to patch someone else’s code. In this episode, we are looking at an instance of patching someone else’s code to improve the number of systems it supports, as well as patching code to prevent it from crashing. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
https://www.axios.com/2023/07/28/senator-wyden-probe-microsoft-breach
Follow Us:
Turning Gigabytes Into Megabytes: The Art of Compression
File compression is all around us, from the photos we take to the shows and movies we watch to the music and podcasts we listen to to the backup archive of our old files from school. But how does it work? In this episode, we’ll be looking at real-world examples of compression and diving into the differences between lossless and lossy compression, as well as why you would want to use compression. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Personal Projects vs. Closed-Source Software: A Debate
Personal projects are a staple for any software developer worth their salt. However, are the personal projects we make that we never release and never release the source code for closed-source? What makes a project open-source vs. closed-source? In this episode, we’ll tackle that very debate about whether or not personal projects that you don’t release publicly are closed-source. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Set up e-mail certificates to do e-mail encryption
Apple Vision Pro Dev Kit applications are now live!
Follow Us:
Logging While Not Selling the Souls of Your Users
We done goofed and posted last weeks episode as this weeks, whoops. Here's the right one.
The idea of logging has been tarnished over the years by Governments, Social Media companies, and many other companies that provide software, hardware, and services to spy on, surveil, and sell the data they harvest from their users to the highest bidder. At the same time, logging plays a pivotal role in software development. In this episode, we are talking about why logging is so important when it comes to developing software and managing your server infrastructure, whether that’s in a homelab or in a corporate environment. Lastly, we’ll also discuss how you can log data from users to improve your software, website, etc. without actually knowing a single thing about any of them and without taking the route a lot of companies go down of harvesting as much user data as possible to sell to the highest bidder. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
GLIBC Giveth and GLIBC Taketh Away: How to Overcome Failure in Your Homelab and in Software Development
Failure is inevitable in life, especially in software development and in having a homelab. In this episode, we look at ways you can overcome failures and use them as learning experiences to make you a better software developer and maintainer of your homelab. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us:
Major Java Updates, Dead Code, Red Hat’s Message To Open Source | Operation Core Dump
In this episode, we’re covering the huge win for newbie developers trying to learn to code with the new updates coming to the Java SDK. Speaking of code, what is dead code, and why is it something you want to remove from your projects? Lastly, what do Red Hat’s changes mean for what Linux distros you run in your homelab, workstations, dev- and production environments, etc., and for the open source community at large? We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
visonOS SDK, Simulator, and Dev Kits:
https://developer.apple.com/news/?id=8sntwknb
Java SDK Beginner Friendly Update
Red Hat:
https://www.theregister.com/2023/06/23/red_hat_centos_move/
https://www.ibm.com/investor/att/pdf/IBM-1Q23-Earnings-Press-Release.pdf
https://www.redhat.com/en/blog/red-hats-commitment-open-source-response-gitcentosorg-changes
Follow Us:
Software Development Meets Physics
If anyone tells you software development is a great field for anyone who doesn’t like math or physics, they are severely mistaken. In this episode, we’ll dive into how intertwined software development and physics are and how sometimes software development is, in fact, rocket science. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Amazon shuts down customer’s smart home devices
Follow Us:
Why APIs Are Crucial for Developers and End Users
Application Programming Interfaces (APIs) are crucial for not only developers to make better apps and their lives easier, but in doing so, they also make the end experience for the user that much better. In this episode, we’re looking at how APIs work, the pivotal role they play in developers writing the best apps they can, and how this relates to Reddit's decision to charge for their API and the subsequent protest going on the site. We are covering all of this and more on this episode of The Dark Assassins Podcast.
If you enjoyed this episode, please give it a rating, review, and subscribe if you haven’t already. Also, share it with a friend or family member who you think would enjoy it or benefit from it.
Do you have a question or topic you want answered in a future episode? Send me an email at contact@darkassassinsinc.com
Follow Us: