Event JSON
{
"id": "161ed4087ba73c7f00b9a649e1e068a19ad3db2e3886374eeada952c9bae162e",
"pubkey": "ccca24c1e7c8dc9068b0c0f6ed38670d995d42c6f9ed5fdcc725baa0e39da1a6",
"created_at": 1742213123,
"kind": 1,
"tags": [
[
"t",
"tui"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/177/678/418/800/777/original/db6961cfa6042861.png",
"m image/png"
],
[
"proxy",
"https://infosec.exchange/@pancake/114177679287780738",
"web"
],
[
"t",
"reverseengineering"
],
[
"proxy",
"https://infosec.exchange/users/pancake/statuses/114177679287780738",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/pancake/statuses/114177679287780738",
"pink.momostr"
],
[
"-"
]
],
"content": "The first TUI disassemble and debugger I used which I spent lots of time in there for reversing viruses and understand better the internals of the DOS operating system was HACK from the nocash dude. I'm always happy to find its website up and use it in dosbox https://problemkaputt.de/hack.htm #reverseengineering #tui\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/177/678/418/800/777/original/db6961cfa6042861.png\n",
"sig": "3729d9a787f9df44891807eb91179ce0ce5a05fe1963db5128d6181d2e1f544122ebb2e40ef7a6c8038fe4a9666c2fa6afe7a7c7148ea55158a3fc7e37e12759"
}