shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

244
active users

#lazarus

0 posts0 participants0 posts today

🎮 Comic Crusaders Podcast Ep. #572: Joseph A. Gagnepain – Art, Games & Creative Alchemy!
Today we sit down with Joseph A. Gagnepain, the CEO and Lead Game Designer at Lazarus Rising Games! We explore Joseph's rich journey as a visual artist—drawing, painting, sculpting—and how that...
comiccrusaders.com/podcast/jos
#artist spotlight #comic crusaders podcast #Game Designer Interview #Indie Game Dev #Joseph A Gagnepain #Lazarus Rising Games

Dans mon radar de sorties musicales, deux albums de Bonobo et Floating Points qui sont les bandes-son de Lazarus, nouvelle série sur Adult Swim (HBO Max en France).

Un avis sur cet animé qui a commencé cette semaine ?

#Lazarus#tv#anime

#introduction

VA3KZR as of 2023-12-09

Started with #Commodore Vic-20 - at school, we learned graphical #LOGO on PETS and Apple IIe's... crashed the school Unisys ICON network far too often...

Headed to college, *thought* I would be heavily involved in, electronics design, and engineering - instead, it was #programming.

First was #VisualBasic 1.0; next, Borland #Delphi 1.0 / #ObjectPascal - still dabble with #FreePascal #Lazarus, a smidge of #Java, a lot of #CSharp and some #Python.

The Lazarus Group, a cybercrime gang associated with the North Korean government, has been identified as the perpetrator of an attack on a Spanish aerospace firm. This attack utilized a new piece of malware called "LightlessCan." The hackers posed as recruiters from Meta (formerly Facebook) on LinkedIn, offering coding challenges that, when downloaded and printed, triggered a payload and installed the malware. ESET, a cybersecurity firm, believes the goal of the attack was espionage. LightlessCan is an upgraded version of a previously used remote access Trojan known as BlindingCan, featuring 68 commands, although only 43 appear to be implemented. The malware can mimic Windows commands and execute them discreetly, making it harder to detect.

#introduction

Who me? Just a #Maker, IT Consultant and "all-around-#nerd".

I grew up watching Saturday morning cartoons, original #StarTrek re-runs, reading #Fantasy & #SciFi (not SyFy), lots of #Lego and eventually graduated to #RPG and #tabletop gaming. 

My first computer was a #Commodore Vic-20 - at school, we learned graphical #LOGO on PETS and Apple IIe's... crashed the Unisys ICON network often before getting my first PC - grudgingly - really wanted an #Amiga.

Eventually, it was time for college - I *thought* I would be heavily involved in the physical aspects of technology, circuit design, and hardware engineering - instead, I gravitated to #programming.

My first professional #programming language was #VisualBasic 1.0; eventually, jumping into Borland #Delphi 1.0 and #ObjectPascal - still dabble with #FreePascal #Lazarus, a smidge of #Java, a lot of #CSharp and some #Python. My #JavaScript is ancient...