Three Ways to Use Your Snapshots
neon.comยท10h
๐File Systems
Flag this post
You Thought It Was Over? Authentication Coercion Keeps Evolving
unit42.paloaltonetworks.comยท6h
๐ก๏ธCapability Security
Flag this post
Detections Digest #20251110
detections-digest.rulecheck.ioยท1d
๐Security Types
Flag this post
A fault-tolerant neutral-atom architecture for universal quantum computation
nature.comยท18h
๐ฌNanopasses
Flag this post
โก Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
thehackernews.comยท22h
๐ก๏ธParser Security
Flag this post
OWASP 2025 Top 10 Adds Software Supply Chain Failures, Ranked Top Community Concern
socket.devยท2d
๐ก๏ธError Ergonomics
Flag this post
Multimeter
๐WASM Runtimes
Flag this post
MCP Shark: Observe for Model Context Protocol communications locally
๐Network Protocols
Flag this post
OAuth 2.0 authorization in PostgreSQL using Keycloak as an example
๐ก๏ธCapability Security
Flag this post
New comment by benSepanski in "Ask HN: Who is hiring? (November 2025)"
๐Language Bridges
Flag this post
I recently moved out and was finally able to build my own home network
๐Network Protocols
Flag this post
Parallelization
๐SIMD Programming
Flag this post
Am I wrong for seeking inspiration and excitement from Linux/my operating system? A rant.
๐Bootstrapping
Flag this post
The Workflow of the Future Is Already Here (And It's Nothing Like You Think)
๐ญProgram Synthesis
Flag this post
We built an AI that does the tasks no human likes to repeat โ meet Codedoc
๐Self-Documenting Code
Flag this post
Maestro: Learning to Collaborate via Conditional Listwise Policy Optimization for Multi-Agent LLMs
arxiv.orgยท6h
๐ญRacket
Flag this post
Feeling the gap
๐ฌError Messages
Flag this post
Loading...Loading more...