Yes. I remember listening to it on the radio. The DJ used the handle Hard Hat Mack. It was pretty awesome to hear SID music over the radio.
I found this archive that has some of the shows recorded, and set playlists (I'm giving two links as the site is using frames so the top level page requires you navigate the menus to get to these):
The set playlists (using HVSC) works. For actual recordings they're 404 from this site -- arnold.c64.org is gone. But there are a few archives of the arnold.c64.org site! This should help re-construct the original links from the above page:
- https://www.mmnt.net/db/0/0/arnold.c64.org/pub/sidmusic/lala/ra
- https://archive.org/download/arnold.c64.org (download the whole thing and dig into pub/sidmusic/lala/ra)
Due to the era, most of the files are in RealAudio format; with a few MP3s as well. Wonder if this could all be re-posted somewhere in modern formats to make it more accessible.
Its possible the authors are still around and have more copies; doubtful KDVS has archives, maybe tapes buried in the library.
Anyway, hope this helps! Its a cool piece of history and brings back a few memories.
Tools like Playwright and Puppeteer are abstractions on top of CDP. The other use case is when these frameworks don’t expose or don’t use a CDP command you need (often they hide some parameters for cross browser compatibility).
Webdriver BiDi is a future cross browser replacement:
Bidi’s not a viable replacement for some use-cases e.g. setting headers for just the main origin as it’s add header command adds the header to all requests potentially causing CORS issues
I’ve had a similar thing happen to me recently. 500$ tariff on $130 of stuff. The tariff should have been like $20. UPS has been completely non responsive and still won’t show me the customs forms. Total scam.
I work a product that involves a security crawler (phish, malware detection, etc). It’s just a new arms race. Crawlers will adapt.
Cloudflare is already heavily abused by threat actors to host, and gate their malicious content. This means our crawler has to handle anti-bot and CAPTCHAs. It’s a pain. Cloudflare is no help.
They have a “verified bot” program but it’s a joke for security. You must register a unique, identifiable user agent, and come from a set of self declared IPs. Cloudflare users can check a box to filter these bots out. And now you're easily fingerprintable so the bad guys can just filter you even without Cloudflare’s help.
So now we have a choice. Operate above board and miss security threats. Or operate outside the rules (as opaquely defined by Cloudflare), and do right by our customers.
All of this on CFs side is to solve a real problem. Unfortunately by not working with the industry in a productive manner, Cloudflare is just creating new problems for everyone else.
Interesting. Looks really neat! How do you deal with anti bot stuff like Fingerprintjs, Cloudflare turnstile, etc? Maybe you’re new enough to not get flagged but I find this (and CDP) a challenge at times with these anti-bot systems.
Google search results are full of garbage pages populated with LLM generated content (the pages exist solely to serve ads and capture search results).
Search spam is not new, but the use of LLMs simplifies the ability to make pages that look like legit content (increasing the likelihood they’ll show up in search results).
Neat optimization! Would it have been feasible to spend a bit of cpu/memory and tag headers as internal upon the request construction? That way filtering on output is trivial.
I’m really mixed on this. Anti bot stuff is increasingly a pain point for security research. Working in this space, I have to work against these systems.
Threat actors use Cloudflare and other services to gate their payloads. That’s a problem for our customers who are trying to find/detect things like brand impersonation and credential phish. Cloudflare has been completely unhelpful. They just don’t care.
Seconding this. Evading detection has become a real cake-walk since threat actors are able to sign up for a free Cloudflare account and then put their phishing site on their 2-hours old domain behind a level of protection backed by a $20B company. Funny that you almost never see phishing on Akamai ;)
Disclaimer: We operate in this space so we obviously have an interest in being able to detect these threats going forward.
Excuse my bias, as I work for IPinfo. Rolling your own bot detection service is something you should explore if you want near-absolute coverage.
We intentionally do not provide an IP reputation service as many sophisticated bots mimic the "good reputational" aspect of IP addresses. Usage of residential connections or essentially being vetted by CDN/cloud services makes making bot detection ambiguous.
That is why we provide accurate IP metadata information. Whenever you detect patterns of bot-like behavior, look up the metadata such as privacy service usage, ASN, or assigned company, and then start blocking them via the firewall.
They could police their content. Or if they don’t want to, they could meaningfully partner with the security industry - create a “security bots” program, respond to takedown requests in days not months, etc.
I suppose that Cloudflare scanning payloads for known malware could potentially be effective if they could make the performance work.
Closed partnerships programs are a bit concerning though. Once they’re up and running there’s an enormous economic incentive for CF to squeeze members with fees that capture the economic upside.
Cool library. This sounds like SWAR (simd within a register). I’ve seen these techniques give a nice speed up especially when SIMD isn’t available or a pain (eg in Java pre-Panama).
I found this archive that has some of the shows recorded, and set playlists (I'm giving two links as the site is using frames so the top level page requires you navigate the menus to get to these):
The set playlists (using HVSC) works. For actual recordings they're 404 from this site -- arnold.c64.org is gone. But there are a few archives of the arnold.c64.org site! This should help re-construct the original links from the above page: Due to the era, most of the files are in RealAudio format; with a few MP3s as well. Wonder if this could all be re-posted somewhere in modern formats to make it more accessible.Its possible the authors are still around and have more copies; doubtful KDVS has archives, maybe tapes buried in the library.
Anyway, hope this helps! Its a cool piece of history and brings back a few memories.
reply