How to handle secrets on the command line
๐Hacking
Flag this post
๐ฒ Filler Monthly Blog Post
jacksonchen666.comยท10h
๐Hacking
Flag this post
Giving C a Superpower: custom header file (safe_c.h)
hwisnu.bearblog.devยท12h
๐Hacking
Flag this post
udo โ simple suid CLI ร la doas/sudo
๐Hacking
Flag this post
My go-to prompt for legacy code exploration
leftofthe.devยท1d
๐๏ธSoftware Architecture
Flag this post
Kubernetes at home
drjosh.devยท2d
๐๏ธSoftware Architecture
Flag this post
How to protect your Linux system from hidden threats
howtogeek.comยท3d
๐Hacking
Flag this post
Bootc for Workstation Use
๐๏ธSoftware Architecture
Flag this post
Linux Mint Devs Introduce New System Administration & System Information Tools
9to5linux.comยท3d
๐๏ธSoftware Architecture
Flag this post
Develop AWS Glue job interactive sessions locally using Jupiter Notebook
๐ปProgramming
Flag this post
I wrote a short post on the importance of taking the literal perspective on writing scalable code. Code that itself scales over time. Check it out and let me kn...
๐๏ธSoftware Architecture
Flag this post
How Rust Transforms Error Handling: From Crashes to Reliable Software Systems
๐C# Development
Flag this post
The Raspberry Pi gitops cluster (PXE booting and auto-expanding Docker Swarm)
๐๏ธSoftware Architecture
Flag this post
It's Time to Bring Back GNOME Office (Hope You Remember It)
itsfoss.comยท4d
๐๏ธSoftware Architecture
Flag this post
NILFS2 File-System Seeing Renewed Interest With Additional Maintainer
phoronix.comยท2d
๐๏ธSoftware Architecture
Flag this post
Linux Kernel Patches & Device Tree Additions For PCIe M.2 Connectors
phoronix.comยท1d
๐๏ธSoftware Architecture
Flag this post
kserve/kserve
github.comยท2h
๐๏ธSoftware Architecture
Flag this post
Loading...Loading more...