- 掃描 ID:
- 6019f768-fbc2-4e8e-b3f8-0a0a423d09c5已完成
- 已提交的 URL:
- https://q3k.org/
- 報告完成時間:
連結 · 找到 2 個
從頁面中識別的傳出連結
連結 | Text |
---|---|
https://social.hackerspace.pl/@q3k | @[email protected]) |
https://ko-fi.com/q3kq3k | buy me a coffee |
JavaScript 變數 · 找到 3 個
在頁面的視窗物件上載入的全域 JavaScript 變數是在函數外部宣告的變數,可從目前範圍內程式碼中的任何位置存取
名稱 | 類型 |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
主控台記錄訊息 · 找到 0 條
記錄到 Web 主控台的訊息
HTML
頁面的原始 HTML 主體
<!DOCTYPE html><html><head><meta charset="utf-8">
<title>q3k</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="shortcut icon" type="image/png" href="/favicon.png">
<style>
body {
font: courier, sans-serif;
font-size: 12px;
text-align: center;
margin-top: 100px;
}
</style>
</head><body><p>
<b>Hi there. I'm q3k. Thanks for stopping by.</b>
</p>
<p>
If you're looking to get in touch, email me at q3k@ this website, or find me on libera (q3k), Matrix (@q3k:hackerspace.pl) or the Fediverse (<a href="https://social.hackerspace.pl/@q3k" rel="me">@[email protected])</a>.
</p>
<p>
GPG Key: 63DF E737 F078 657C C8A5 1C00 C29A DD73 B356 3D82
</p>
<p style="margin-top: 50px;">
<b>Writings:</b>
</p><ul style="list-style: none;">
<li>2024/06/11: PL: <a href="/2024-06-11-pap-newag-pl.html">„Zainstalowane przez hackerów oprogramowanie“ - jak PAP.pl kłamie o aferze z Newagiem</a></li>
<li>2024/06/11: EN: <a href="/2024-06-11-pap-newag-en.html">“Software installed by hackers”- how the Polish Press Agency lies about the Newag scandal</a></li>
<li>2023/01/13: <a href="/wInd3x.html">wInd3x, the iPod Bootrom exploit 10 years too late</a></li>
<li>2022/03/21: <a href="/lanai.html">Lanai, the mystery CPU architecture in LLVM</a></li>
</ul>
<p></p>
<p style="margin-top: 50px;">
<a href="https://ko-fi.com/q3kq3k">buy me a coffee</a>
</p>
</body></html>