Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.toยท15hยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
Oops, My UUIDs Collided
alexsci.comยท8hยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท19h
๐Ÿ”—Hash Functions
Flag this post
๐Ÿ”ฅ Mastering Data Structures in Java - Part 7: HashMap
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
3 Minutes to Start Your Research in Nearest Neighbor Search
romanbikbulatov.bearblog.devยท2dยท
Discuss: Hacker News
๐Ÿ“Succinct Data Structures
Flag this post
Understanding Primary Keys in Relational Databases: A Key to Data Integrity and Fast Lookups
dev.toยท20hยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Engines
Flag this post
2025 Holiday Readiness Checklist (Page Speed Edition!)
speedcurve.comยท2h
๐Ÿ“ˆPerformance Tools
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comยท1d
โš–๏ธInference Rules
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.comยท10h
๐Ÿ“ฎMessage Queues
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท11h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.comยท7hยท
๐ŸชขRope Data Structures
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท7hยท
Discuss: Hacker News
โ†”๏ธBidirectional Sync
Flag this post
Warnet: The Battle of Galen Erso
github.comยท6h
๐Ÿ“กProtocol Parsers
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท22h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
๐Ÿง  Mastering Data Structures in Java โ€” Part 6: HashSet
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท3d
๐Ÿ”—Hash Functions
Flag this post
Notes from RIPE 91
blog.apnic.netยท1d
๐ŸŒNetwork Protocols
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท14hยท
Discuss: Hacker News
๐Ÿ“ŠProfiling
Flag this post
Why You Should Use 310,000+ Iterations with PBKDF2 in 2025
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
Blazeio vs. FastAPI vs. Robyn: Benchmarking Reveals 86x Performance Difference
news.ycombinator.comยท1hยท
Discuss: Hacker News
๐Ÿ“กErlang BEAM
Flag this post