Title | Year | Author/Editor | Commenter | Details |
---|---|---|---|---|
Mirrorshades pt. 2 | 2025 | Clipping (ft. Cartel Madras) | girvo | Song from Dead Channel Sky, inspired by Mirrorshades anthology, part of a banger album. |
Error Message Eyes Release 3.0 | 2024 | Keith P. Graham | kpgraham | Self-promoted cyberpunk story collection, free Kindle download on August 24, 2024. |
[empfindungsfæhig] | 2023 | Reda El Arbi | 4ggr0 | Niche cyberpunk recommendation for German readers, unique entry. |
The Big Book of Cyberpunk | 2023 | Jared Shurin (ed.) | patrickscoleman | Anthology with 108 stories, bought alongside Mirrorshades. |
Juicy Ghosts | 2021 | Rudy Rucker | rudytheelder | Novel about toppling an evil U.S. president, shared by Rucker. |
Delta-V | 2019 | Daniel Suarez | 4ggr0 | Sci-fi with cyberpunk elements, focuses on space exploration. |
Transreal Cyberpunk | 2016 | Rudy Rucker, Bruce Sterling | rudytheelder | Anthology blending transrealism and |
My Works - A collection of fun hacks, tools, products and experiments that are creative and inventive.
An incomplete list of all my creative output over the last 15 years. Selected based on how I feel about it right now.
- Puppetromium - Hacking CSS @media queries to probe viewport size, MJPEG and 0% client-side JavaScript to make a remote browser. Sep 22, 2021.
- Selector Generalization - Hacking a bioinformatics DNA sequence alignment algorithm to select all related elements on a page by clicking examples. Jan 1, 2013.
- [Language Detection](no link available) - Using LZ factorization and letter bi- and trigrams to fingerprint human languages for detection from samples. February 1, 2013.
- Janus - Overcoming the core challenge of WebRTC by hacking GitHub Actions to use Issues as a signalling channel to negotiate the connection. Nov 13, 2023.
- [Fully Hosted](https://git
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <ctype.h> | |
#include <openssl/sha.h> | |
#define TARGET_PREFIX "20250327" | |
#define MAX_WORDS 256 | |
#define MAX_TEXT 2048 | |
#define MAX_ATTEMPTS (1ULL << 32) // 2^32 attempts (~4.3B, enough for 8-char prefix) |
they're not Particularly Rare, But I think they're more pleasing to See. | |
For instance This "2822302" Makes me Especially Happy: https://github.com/BrowserBox/BrowserBox/commit/2822302387c4cb7ff71c4239da3dc5fa4c07e165 | |
It Even Extends up to 10 digits! That's Not Particularly rare - Roughly 1% chance (10^10/16^10 i think) - But i just think they look nice. | |
Are there any other people out there who are particularly pleased when they hit that? sorta like hitting 7777 on the odometer, or whatever. | |
I'm also a fan of the purely Numeric Identifiers Twitter/X Uses (and has for ages). |
import Database from 'better-sqlite3'; | |
import { createDatabaseClient } from 'my-partial-db-lib'; | |
// 1) Create an in-memory DB and your table(s). | |
const db = new Database(':memory:'); | |
db.exec(` | |
CREATE TABLE users ( | |
id TEXT PRIMARY KEY, | |
data JSON | |
); |
source: Dr. Willy Smith Unicat Project June 1999, https://rense.com/ufo5/hudsonv.htm
The Roots of Complacency by Dr. J. Allen Hynek
Something truly astonishing happened.... Not far from New York City, along the Hudson Valley, as hundreds of astonished people looked up, many driving along the Taconic Parkway, they saw something no one had ever seen before. Some called it a "Space-ship from outer space" (for want of anything better) but it was generally described by numbers of competent, professional persons as startlingly brilliant lights, in the form of a "V", or Boomerang, silent, slowly-moving, and very large close-by object. It has often popularly been called the "Westchester (County) Boomerang".
The world has never known about this, even though the event happened not once but several times, and over the course of several years. To all intents and purposes, this was a non-event. The media across the world has remained dumb. Local papers, radios and TV's, it is true, did momentarily carry spots along
archive.today | |
webpage capture | |
Saved from | |
https://chatgpt.com/share/9296f553-d36d-4c02-b73d-31b1058afe60 | |
no other snapshots from this url | |
13 Aug 2024 13:31:50 UTC | |
All snapshots from host chatgpt.com | |
WebpageScreenshot | |
sharedownload .zipreport bug or abuse |
to check if the server works - https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice | |
stun: | |
stun.l.google.com:19302, | |
stun1.l.google.com:19302, | |
stun2.l.google.com:19302, | |
stun3.l.google.com:19302, | |
stun4.l.google.com:19302, | |
stun.ekiga.net, | |
stun.ideasip.com, |
In many object-oriented languages, the concept of protected
members allows properties and methods to be accessible within the class they are defined, as well as by subclasses. JavaScript, however, does not natively support protected
members. This article introduces a novel approach to simulate protected
access in JavaScript classes using symbols and private fields.
JavaScript provides private
fields, but they are not accessible to any derived classes. This limitation means that developers cannot use private
fields to directly implement protected
members, which are a staple in many other object-oriented languages.
The solution involves using symbols as keys for protected
properties and methods, ensuring that only the class and its subclasses have access to them. This is achieved by:
{ | |
const $ = Symbol(`[[state]]`); | |
class Base extends HTMLElement { | |
static get observedAttributes() { | |
return ['state']; | |
} | |
constructor(state) { | |
super(state); |