Show HN: Floxtop – Clean up your Mac with private, offline AI file organization
floxtop.com·11h·
Discuss: Hacker News
🎛Logic Pro
Flag this post
I don’t use my router’s USB port for 3 very good reasons
makeuseof.com·4h
💻Claude Code
Flag this post
Made a self-hosted password manager (CLI + sync server)
reddit.com·4h·
Discuss: r/selfhosted
🎛Logic Pro
Flag this post
Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·13h
💻Claude Code
Flag this post
Read post
zscaler.com·2d
🤖AI
Flag this post
Building Zone Failure Resilience in Apache Pinot™ at Uber
uber.com·12h
💻Claude Code
Flag this post
The Paranoid Guide to Running Copilot CLI in a Secure Docker Sandbox
gordonbeeming.com·2d·
Discuss: Hacker News
🤖AI
Flag this post
BlocksDS Nintendo DS(I) devkit now supports WPA2 networks in homebrew software
blocksds.skylyrac.net·1h·
Discuss: Hacker News
💻Claude Code
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.io·17h·
Discuss: Hacker News
💻Claude Code
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Apple’s Binaries
blog.virustotal.com·5h·
🤖AI
Flag this post
Session Messenger prepares to weaken file encryption
discuss.privacyguides.net·1d
🤖AI
Flag this post
Beyond CASB: SaaS Security in the Era of Shadow IT and AI Integrations
guidepointsecurity.com·17h
🤖AI
Flag this post
Void-Vault: A deterministic generative solution to password management
github.com·7h·
Discuss: r/archlinux
🎛Logic Pro
Flag this post
Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs
securityaffairs.com·17h
💻Claude Code
Flag this post
Flatpak Happenings
blog.sebastianwick.net·1d·
🎛Logic Pro
Flag this post
Nebius Token Factory: Open Model Platform for Production Inference
windowsforum.com·18h
🎛Logic Pro
Flag this post
Turn any of your APIs into a Kubernetes-native citizen
dev.to·15h·
Discuss: DEV
🤖AI
Flag this post
Identify insecure TLS services with the enhanced runZero Certificate Inventory
runzero.com·14h
🎛Logic Pro
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·1d
💻Claude Code
Flag this post
We Tested 6 AI Models on 3 Advanced Security Exploits: The Results
dev.to·15h·
Discuss: DEV
🤖AI
Flag this post