FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·22h
🛡️Security Type Systems
After $3 Billion In Crypto Hacks, The Race Is On For Real-Time Recovery
forbes.com·1h
🔗Hash Functions
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·5h·
Discuss: Hacker News
🔗Hash Functions
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984)
dgl.cx·10h·
Discuss: Hacker News
💻Terminal Control
🎲 What makes a game tick? Part 5
mropert.github.io·4h
🗑️Dead Code
Toy Binary Decision Diagrams
philipzucker.com·1d
Type Checking
Data Safety on a Budget
ardentperf.com·2d
🏰Capability Machines
Writing a Dictation Application
osada.blog·1d·
Discuss: r/programming
📚Self-Documenting Code
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·4d
🪆Embedded DSLs
𝗠𝗮𝘀𝘁𝗲𝗿𝗶𝗻𝗴 𝗠𝗲𝗺𝗼𝗿𝘆 𝗶𝗻 .𝗡𝗘𝗧
dev.to·1h·
Discuss: DEV
🗑️Garbage Collection
Ask HN: Systems Development Path
news.ycombinator.com·3d·
Discuss: Hacker News
🦀MIR Optimization
The Price of Cyberattacks: Why the Real Damage Goes Beyond the Ransom
blogger.com·3d
🛡️Error Boundaries
Clop Ransomware Hits Oracle Customers Via Zero-Day Flaw
darkreading.com·18h
🛡️Parser Security
Your-Projects-a-Mess-Its-Not-You-Its-Your-Frameworks-Fault
dev.to·17h·
Discuss: DEV
📦Monorepos
Prompting Techniques for Specialised LLMs
dev.to·1d·
Discuss: DEV
🎮Language Ergonomics
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
thehackernews.com·3h
🛡️Parser Security
The Outbox Pattern: A Love Letter to Eventual Consistency
dev.to·1d·
Discuss: DEV
📮Message Queues
C2|Q>: A Robust Framework for Bridging Classical and Quantum Software Development
arxiv.org·1d
🔬Nanopasses
🧩 A Complete Guide to React Testing: From Unit Tests to E2E, Snapshots, and Test Doubles
dev.to·11h·
Discuss: DEV
🧪Compiler Testing