Phishing Alert: Fake RIPE NCC “Licence Information Verification” Email
ripe.net·5h
🔧Reverse Engineering
Flag this post
Unlicensing
fossable.org·21h·
Discuss: Hacker News
🐧Linux
Flag this post
Psychology of craft
aworkinglibrary.com·11h
💻Computer Science
Flag this post
Protection against surveillance
discuss.privacyguides.net·1d
🔧Reverse Engineering
Flag this post
How can they do this?
aardvark.co.nz·1d
💻Programming
Flag this post
Congressional Budget Office hacked, China suspected in breach
cnn.com·2d·
Discuss: Hacker News
💻Programming
Flag this post
pdxscript: VCS edition
blog.birbpara.de·3d
🔧Reverse Engineering
Flag this post
Anticheat: a non-technical look without psychoanalysis
lesswrong.com·5d
🔧Reverse Engineering
Flag this post
Update Windows ASAP to Patch Another Zero-Day Vulnerability
lifehacker.com·1h
💎C# Development
Flag this post
MCP-RiskCue: Can LLM infer risk information from MCP server System Logs?
arxiv.org·17h
🏗️Software Architecture
Flag this post
Too Much of Today's Web is Fake, Not Just Fake News
techrights.org·19h
🐧Linux
Flag this post
3D Printed mmWave Human Detection system with Xiao ESP32C3
hackster.io·3d
🔧Reverse Engineering
Flag this post
Rejecting "Goodness" Does Not Mean Hammering The Defect Button
lesswrong.com·15h
🔧Reverse Engineering
Flag this post
I present to you my new game: "Set Wars: Cardinal Bounds"
reddit.com·23h·
Discuss: r/godot
💻Programming
Flag this post
Consistent Hashing: The Unseen Engine
dev.to·4d·
Discuss: DEV
🏗️Software Architecture
Flag this post
GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
thehackernews.com·1d
🔧Reverse Engineering
Flag this post
Online age checking is creating a treasure trove of data for hackers
theconversation.com·5h
💎C# Development
Flag this post
🚀 Building a Job Search Agent with Mastra, Google Gemini, and A2A Protocol
dev.to·2d·
Discuss: DEV
💻Programming
Flag this post