Wireshark 4.4.1 Released, (Sun, Nov 23rd)
isc.sans.edu·2h
🛡️Parser Security
Flag this post
On Thread Synchronization : Part 1 - A deep dive into mutexes
sayujya-apte.github.io·1d·
Discuss: r/programming
🔗Concurrency Primitives
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·18h·
Discuss: Hacker News
Type Checking
Flag this post
Master Shared Library Loading in Uniface 10.4
docs.rocketsoftware.com·40m·
Discuss: DEV
📚Stack Data Structures
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
🔧Nickel
Flag this post
RUSTSEC-2025-0125: Vulnerability in thread-amount
rustsec.org·1d
🏷️Memory Tagging
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·3d
🔗Hash Functions
Flag this post
When AI Goes Wrong
whenaifail.com·1d·
Discuss: Hacker News
🛡️Error Ergonomics
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·1d
🛡️Security Type Systems
Flag this post
The Secret Life of Python: Bytecode Secrets - What Python Really Runs
dev.to·2d·
Discuss: DEV, DEV
📜Bytecode Interpreters
Flag this post
my journey to accepting that you wont know it all
blog.prdai.dev·16h·
🌈Gradual Languages
Flag this post
How Wipro PARI accelerates PLC code generation using Amazon Bedrock
aws.amazon.com·1d
🎭Program Synthesis
Flag this post
For those doing SRE/DevOps at scale - what's your incident investigation workflow?
reddit.com·2d·
Discuss: r/kubernetes
🛡️Error Ergonomics
Flag this post
When weak passwords open the door: major breaches that began with simple logins
blogger.com·2d
🛡️Capability Security
Flag this post
Building the PVS-Studio megapolis
dev.to·2d·
Discuss: DEV
🔬Code Analysis
Flag this post
Dear Developer: Your Database Isn't a File Cabinet!
cdn.com·1d·
Discuss: DEV
🗃️Query Compilation
Flag this post
Mastering Claude Code — A Free Open-Source Handbook for Developers
github.com·17h·
Discuss: DEV
🎭Program Synthesis
Flag this post
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
cloud.google.com·2d
🛡️Parser Security
Flag this post