We were promised better customer service with AI. What we got instead? Longer hold times, rigid chatbots, and a growing sense that human empathy has been replaced by scripted indifference. This post explores why the problem isn’t AI itself, it’s how we’ve rushed to use it, and what needs to change to rebuild trust.
More and more dental and GP practices are asking patients to fill in online forms — often using third-party platforms. But do you really know who sees your data, where it goes, or how long it’s kept? I took a closer look... and it raised more questions than answers.
A calm, professional voice... a few real transaction details... and just enough pressure to catch you off guard. This is the true story of a sophisticated phone scam I experienced ... complete with real audio ... and a breakdown of the tactics scammers use to manipulate trust, isolate victims, and exploit their targets. Even seasoned professionals aren’t immune... and that’s exactly why we need to talk about it.
Somewhere over the ocean, the strangest thought hit me. The stumps on her back… what if they were her angel wings? I know it was just a dream. The mind is an incredible thing—finding patterns, making connections that may not even be real. But... the thought of it... was enough to break me again.
I had held it together for as long as I could. But now… the floodgates opened.
After years of illness, delays, and guilt, I was finally here—taking Janice to the place she had always wanted to be. I stood where she asked me to scatter her ashes, the wind carrying her into the landscape she loved.
She was home.
And now, I had to let go.
Looking through some old projects, I was asked if I could recreate a MATRIX Digital Rainfall look alike in 10 Lines of BASIC code… This was in 2021 looking at […]
In the early days of Hacking, it was rare a protection system would be as memorable as the one created by Richard Aplin, Author of Fly Spy published by Mastertronic. Havking was always a trade of ideas and new techniques. In this post I'll cover off how to transfer FlySpy to disk that you can follow along.
Back in the 80's I created a Disk Protection system, exploiting a potential bug in the Firmware of the µPD765A Disk Controller. Looking into this more with todays tools, it seems that the disk record and this specific command isn't implemented as per the specification. Is it my misunderstanding or is there a bug that's gone unnoticed?
The µPD765A was a prevalent Floppy Disk Controller for many a home computer in the 80's. The Amstrad CPC was no exception. This is a primer for Writing Z80 assembler to access the controller direct. that I'll use for later articles on old school hacking. Want to know more?
I found myself needing a command line tool to investigate and extract files from DSK Image files used by Emulators, after archiving my own 1980's hack disks. I wrote my own and made it opensource for you to use, amend or even improve on if it helps your projects.
DiscSys was a commonly used Disk Protection format in the 80s for the Amstrad CPC. For a protection system it was very basic, relying on modifying track and sector information to non standard formats to prevent copying with the supplied tools. Though it was very trivial to bypass the protection system and copy the disk anyway. Whilst reminiscing about the past, I discovered a small flaw with implementation in the game XOR, here's what I found...