For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | more hegzploit's commentsregister

adding upon this comment to why the two cardinalities are not equal, on one hand we have the set of integers {..., -2, -1, 0, 1, 2, ...} and they can be put into a bijection with the set of natural numbers {1, 2, 3, 4, ...}, this is done by rearranging the set of integers like {0, -1, 1, -2, 2, -3, 3, ...}. so this is a countably infinite set (one that has a cardinality of ℵ_0)

As for the set of real numbers, we have the subset of irrational numbers which are uncountably infinite (see cantors diagonalization argument) thus making the whole set of real numbers, a set whose cardinality is ℵ_1.

The annotated turing book goes into this pretty well in the first couple pages.


I had a similar experience with my domain, hegz.me, which I had purchased from Namecheap. I allowed it to expire and did not pay the redemption fees, thinking I could buy it again at a later time. However, to my surprise, after the redemption period had ended, it was listed for a price of $2,888. Can you explain why this is the case?


I'm interested in this stuff, care to share some good starting point?


here's one way I love to think about it, A RAT will go all the way to try and persist, hide from AV, load other components from some remote endpoint. It will trigger so much events that can be detected by an AV. on the other hand, TeamViewer will not try to hide what Its doing, there's also a lot more stuff at play here since this is just heuristic analysis, AVs tend to be more complex and incorporate more methods of analysis like signature-based detection and integrity checking, etc...


poe's law to the rescue


Nathan, Edgar Allan or Cameron?


Power-over-Ethernet obviously.


Where would once find examples of such code?


A modern example of code like this would be any game coded in SmileBASIC for the 3DS.


Among others, likely in old introductory books on BASIC or its other flavors.


here's mine: https://hegzploit.github.io/

Did a recent revamp, not proud of the excessive JS but it is what it is, also I've started using stable diffusion to generate thumbnails for my posts which I really like, now the only thing missing is to start blogging actively.


Location: Cairo, Egypt

Remote: Yes

Willing to relocate: Yes

Technologies: Python, C, Assembly, GDB, Linux.

Résumé/CV: https://hegz.me/resume.pdf

Email: yusuf@hegz.me

I'm looking for a remote position/internship that involves low-level programming and/or systems security.


Location: Egypt

Remote: Yes

Willing to relocate: Yes

Technologies: GDB, Ghidra, GNU/Linux, Python, OCaml, C, x86asm, Metasploit. (stuff I enjoy using though not necessarily fluent at)

Résumé/CV: https://hegz.me/resume.pdf

Email: me@hegz.me

Hey,

I'm Yusuf, I'm currently an electrical engineering undergraduate in my senior year, I love cybersecurity and hardware.

mainly stuff that has to do with pwn and exploit development, I've been only doing CTFs from time to another. I'm an okay programmer (I often write scripts in python)

Ideally, I would love a remote position for the time being, I consider relocating after I finish my bachelor's in the coming year, I'm looking to see what jobs are out there.


I'm using raindrops across all my devices for curating links and tagging them.

It's a nice tool.


Raindrop*


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You