mindly.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mindly.Social is an English speaking, friendly Mastodon instance created for people who want to use their brains and their hearts to make social networking more social. 🧠💖

Administered by:

Server stats:

1.3K
active users

#windows

198 posts172 participants35 posts today
STREAMING at 8:00 PM EASTERN

#YouTube:
https://www.youtube.com/@SwitchedtoLinux/streams

#Odysee:
https://odysee.com/@switchedtolinux:0

#Rumble:
https://rumble.com/c/SwitchedToLinux/livestreams

For folks on DLive and Twitch, you may also watch the stream, there...

#DLive - https://dlive.tv/switchedtolinux

#Twitch - https://twitch.tv/search?term=switchedtolinux

!!! NOTE !!! Switched To Linux is, “written by a broad spectrum computer consultant to help people learn more about the Linux platform.” This account is a supporter of @switchedtolinux and provides convenience posts of thumbnails art, videos and streams.

ALL HAIL THE VAN PANTHERS!!!

«Posts may contain hashtags as content may pertain to many distributions and/or related material/topics. Posts may be reposted, boosted, shared, etc. by bots and/or other accounts and are done so at the discretion of the bots/accounts that perform those actions. This account is not responsible for the action(s) of those bots and/or accounts. Therefore, Offended Discretion is advised.»

#SwitchedToLinux #Linux #Windows #Mac #AltTech #FOSS #YouTube #Odysee #Rumble #BitChute #Locals #DLive #Twitch #FactCheckTrue #Fediverse #Fedi22 #Fedi23 #Fedi24 #WeeklyNewsRoundup #Stream

Deobfuscating APT28's HTA Trojan: A Deep Dive into VBE Techniques & Multi-Layer Obfuscation

This analysis delves into APT28's cyber espionage campaign targeting Central Asia and Kazakhstan diplomatic relations, focusing on their HTA Trojan. The malware employs advanced obfuscation techniques, including VBE (VBScript Encoded) and multi-layer obfuscation. The investigation uses x32dbg debugging to decode the obfuscated code, revealing a custom map algorithm for character deobfuscation. The process involves decoding strings using embedded characters from Windows vbscript.dll. The analysis identifies the use of Microsoft's Windows Script Encoder (screnc.exe) to create VBE files. By employing various deobfuscation techniques, including a Python script, the final malware sample is extracted and analyzed, showcasing APT28's evolving tactics in cyber espionage.

Pulse ID: 67efc6e712b49d46c1423ca9
Pulse Link: otx.alienvault.com/pulse/67efc
Pulse Author: AlienVault
Created: 2025-04-04 11:47:51

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Hey all, I've a Java written Program, based on Eclipse.
On my own machine this comes in a larger environment with some cringe CMD-Logic to magically do some setup.

I tried to copy over the IDE folder to a Vanilla Windows machine.
The GUI itself starts fine, but the moment I try to open any of the main menus, I get an exception, saying "Could not initialize class <some internal thing>"

Any idea, how to approach whats the missing part? 🧐

When I left my first job in software development, I promised myself never to work on #windows again.
It was a decade and a half ago and it was one of the best work-related decision I took.

I'm thinking about going the same way with #github if I ever leave my current position. It's not bad enough to make me leave. But I think it's the major pain point in my day-to-day work life.

This product sucks hard !
Give me my #Gitlab back please 🙏