New day, new MetaSound Patch. I made 10 yesterday. I'm starting to feel like a sound designer. When there's no electricity, Unreal Engine is still for me to create sounds on my laptop
The big snowstorm this week has made it really easy to stay home and work on computer projects. Yeah I am vibe coding things a bit, but also learning about docker and codeberg and node.js in the process.
Is there a really good way to make a raspberry pi or other linux SBC servve a captive portal webpage of its own when not able to find a known wifi connection? I basically want to be able to change network manager over a webpage. Sometimes it works, but not on all wifi networks. Is RPi connect worth looking into? It would be nice to not be bound to a single company.
I cant be the only person with this issue, But I shall keep tinkering away at it. I ultimately want to make interconnected sculptures that run little webservers to control neon.
Also the snow has been very good for baking. Bread 43 was inspired by a Sundried tomato, pesto, burrata Ali had the other day. I shall bake the third mini loaf of it tonight :)
🧠💪 Your #brain isn't just a static organ – it's a dynamic system that "remodels" itself based on use. Just like lifting weights builds muscle, pushing your brain into the "discomfort zone" with unfamiliar tasks builds new neural connections that protect your cognitive #health as you age.
Working in a nature park, we see more and more #alienation from #nature in #children (of course, caused by adults who often pay more attention to their mobile phone than to their toddler on walks.)
For beginners in cybersecurity, the "Starting Point" machines on Hack The Box are an invaluable resource. However, many tutorials simply tell you what to type to get the flag.
In my latest YouTube video, I take a different approach with the Meow machine (Tier-0).
I believe that to become a proficient penetration tester or bug bounty hunter, you need to understand the fundamentals.
🔹 What is the purpose of specific Nmap flags like -sV or -Pn?
🔹 How is a port scan like checking the doors of a house?
🔹 Why is Telnet considered insecure compared to SSH?
I break down these concepts step-by-step, ensuring that you are not just memorising commands, but actually learning the logic behind each step.
Whether you are a student, a career switcher, or just curious about ethical hacking, this walkthrough will give you the solid foundation you need.
This is part of an ongoing beginner-friendly series where I will be covering all of the Hack The Box Starting Point machines, step by step.
A is for #Abstract 💚
Join us for another year of #ArtABCs, the most laid-back art challenge on the Internet
Share your art of anything starting with A at any point in the next 2 weeks!
I have scheduled some online classes this month and next, some about occult history, some about magical and esoteric techniques. Here is my current schedule, check it out and sign up! #occult#magic#learninghttps://arnemancy.com/classes