A File Format Uncracked for 20 Years
landaire.net·1d·
🟪Programming
Flag this post
YOLO Mode Is How You Build Fast. Auditable Control Is How You Ship Faster
securetrajectories.substack.com·1d·
Discuss: Substack
🟪Programming
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.com·3d·
Discuss: Hacker News
🟪Programming
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·3d·
Discuss: Hacker News
high performance
Flag this post
What Are the Hidden Risks of Custom GPTs?New Open-Source Tool
token.security·1d·
Discuss: Hacker News
🟪Programming
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.info·2d·
Discuss: Hacker News
high performance
Flag this post
We Tested 6 AI Models on 3 Common Security Exploits
blog.kilocode.ai·2d·
high performance
Flag this post
Mount Mayhem at Netflix: Scaling Containers on Modern CPUs
netflixtechblog.medium.com·17h·
Discuss: Hacker News
high performance
Flag this post
Cameras, Cameras Everywhere!
xn--gckvb8fzb.com·2d·
Discuss: Hacker News
🟪Programming
Flag this post
Diving into Rama: A Clojure LSH Vector Search Experiment
shtanglitza.ai·12h·
Discuss: Hacker News
high performance
Flag this post
Show HN: When 7 Codex Agents Sent Each Other 1k Messages over 2 Days
dicklesworthstone.github.io·1d·
Discuss: Hacker News
🟪Programming
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.io·2d·
Discuss: Hacker News
🟪Programming
Flag this post
Amazon WorkSpaces Linux Flaw Lets Attackers Steal Tokens
jphfeeds.top·1d·
Discuss: Hacker News
high performance
Flag this post
A Deep Dive into the Morris Worm
rapid7.com·2d·
Discuss: Hacker News
🟪Programming
Flag this post
Rocket Software Expert on Modernizing and Securing COBOL Systems
channelinsider.com·1d·
Discuss: Hacker News
🟪Programming
Flag this post
Australia Mandates Encryption Backdoors
wired.com·2d·
Discuss: Hacker News
🟪Programming
Flag this post
Japan Mino Kogyo Ransomware Attack
pbxscience.com·2d·
Discuss: Hacker News
🟪Programming
Flag this post
Project researches harmful social media content and its influence on middle-aged
smidgeproject.eu·23h·
Discuss: Hacker News
🟪Programming
Flag this post
AiDHD: Reflecting on 6 Months Vibing
josh.ing·21h·
Discuss: Hacker News
🟪Programming
Flag this post
T-Mobile accessed a whistleblower's personal cell phone account to identify him
medium.com·1d·
Discuss: Hacker News
🟪Programming
Flag this post