5 open-source remote desktop tools prove that nobody should use TeamViewer anymore
xda-developers.com·2h
🛡️Capability VMs
Flag this post
Secure Remote Password (SRP) protocol
dev.to·4d·
Discuss: DEV
🤝Session Protocols
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·53m·
Discuss: Hacker News
🔧Error Recovery
Flag this post
Need feedback, contributors & users for my open source python IoT runtime (HTTP, MQTT & ZMQ supported)
github.com·2d·
Discuss: r/opensource
🌐Network Protocols
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️Security Type Systems
Flag this post
Provably Secure e2ee file transfer CLI (post-quantum-ready)
reddit.com·2h·
Discuss: r/webdev
📡Network Serialization
Flag this post
Security Doesn’t Have to Hurt
docker.com·1d
🛡️Capability Security
Flag this post
Loro Protocol: a wire protocol designed for real-time CRDT sync
loro.dev·5h·
Discuss: Hacker News
📡Network Serialization
Flag this post
A Second Life for CORBA in MCP 2.0 - An example of AI and humans leveraging their combined potential to create new knowledge
dev.to·1d·
Discuss: DEV
📡Erlang
Flag this post
Notes from RIPE 91
blog.apnic.net·2d
🌐Network Protocols
Flag this post
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
thehackernews.com·1d
🛡️Security Type Systems
Flag this post
From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course
netacad.com·1d·
Discuss: DEV
🛡️Security Type Systems
Flag this post
The Role of AVs in Strengthening COOP: Challenges and Opportunities
hstoday.us·10h
🔌Microcontrollers
Flag this post
IAB Tech Lab opens device disclosure specification for public comment
ppc.land·8h
🔐Capability Calculus
Flag this post
How to Make Zoom Meetings More Secure and Protect Your Privacy
blogger.com·8h
🛡️Security Type Systems
Flag this post
Securing and Authenticating MCP Connections: A Developer's Guide (That Won't Put You to Sleep)
dev.to·2d·
Discuss: DEV
🛡️Security Type Systems
Flag this post
Keys to the Kingdom: A Defender’s Guide to Privileged Account Monitoring
gixtools.net·3d
🛡️Capability Security
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·2d
🛡️Security Type Systems
Flag this post
TreeCast: Multi-Party Key Establishment Protocol for IoT Devices
eprint.iacr.org·2d
📡Network Serialization
Flag this post