Speedier elisp-refs-* with Dumb Grep
feyor.sh·1d
🐍lisp
I think Really Simple Licensing misses the mark
rubenerd.com·11h
🛡️Security Type Systems
What Is Anti-Phishing? Tools and Tactics to Protect Your Organization
vmray.com·2h
🔗Hash Functions
In-depth Review of Emacs tree-sitter integration
archive.casouri.cc·23h·
🌲Tree-sitter
Fuck YouTube tutorials.
threadreaderapp.com·12h
🎮Language Ergonomics
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·12h
💻Terminal Control
Password Security Part 2: The Human Factor – Password Patterns and Weaknesses
guidepointsecurity.com·1d
🔗Hash Functions
Top Dependency Scanners: A Comprehensive Guide
dev.to·7h·
Discuss: DEV
📦Dependency Analysis
Arguzz: Testing zkVMs for Soundness and Completeness Bugs
arxiv.org·18h
🧪Testing Compilers
Your Unit Tests Suck
medium.com·5h·
Discuss: Hacker News
🧪Compiler Testing
A Kevin week
blog.mitrichev.ch·2d·
🧩Constraint Solvers
LLM Rerankers for RAG: A Practical Guide
fin.ai·2d·
🪜Recursive Descent
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.com·1d
🪢Rope Data Structures
Generate and Recognize QR Codes in Java (Simple Tutorial)
dev.to·1d·
Discuss: DEV
🏷️Memory Tagging
Transformer Architecture
dev.to·1d·
Discuss: DEV
🪜Recursive Descent
Building a Legal Document Intelligence Platform with BigQuery AI: 99% Efficiency Implementation Guide
dev.to·13h·
Discuss: DEV
🔄Incremental Lexing
NPM Supply Chain Malware with Self-Replicating Behaviour
safedep.io·15h·
Discuss: Hacker News
📦Package Managers
Logic Engines: Building Smarter AI with State-Based Truth Tables by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🎯Finite Automata
MostereRAT Malware Leverages Evasion Tactics to Foil Defenders
blogger.com·7h
🛡️Parser Security