Introduction to Firewall
threadreaderapp.comยท2h
๐ self hosting
Flag this post
C2: Identity Shop
๐ชEuropean data sovereignty
Flag this post
Apple's LLM Breakthrough
๐opende source
Flag this post
Time to start de-Appling
๐ชEuropean data sovereignty
Flag this post
The New 2025 OWASP Top 10 List: What Changed, and What You Need to Know
fastly.comยท1d
๐ self hosting
Flag this post
Eliminate unnecessary costs in your Amazon S3 buckets with Datadog Storage Management
datadoghq.comยท1d
๐ชEuropean data sovereignty
Flag this post
I automated my Proxmox VM deployment with Cloud-Init
xda-developers.comยท52m
๐ self hosting
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
๐ชEuropean data sovereignty
Flag this post
Optimizing Predictive Maintenance in Intelligent Manufacturing: An Integrated FNO-DAE-GNN-PPO MDP Framework
arxiv.orgยท12h
๐ชEuropean data sovereignty
Flag this post
Automating Serverless: A Guide to CI/CD for AWS Lambda with GitHub Actions
๐ self hosting
Flag this post
How I Used WireGuard to Secure API Communication Between Cloud Servers โ Plus a PyAirbyte Custom Connector Tutorial
๐ self hosting
Flag this post
Monitoring Autonomous Systems Telemetry: Building an HFT-Grade Network Analysis Pipeline for UDP-based Protocols
๐ self hosting
Flag this post
I switched from a complex Proxmox setup to a simple Synology NAS
xda-developers.comยท2d
๐ self hosting
Flag this post
Condensation
lesswrong.comยท1d
๐opende source
Flag this post
Akira Ransomware Claims 23GB Data Theft in Alleged Apache OpenOffice Breach
blogger.comยท1d
๐opende source
Flag this post
Looking for an IT management tool to simplify your life? Try Rippling IT for free this Black Friday
techradar.comยท3h
๐ self hosting
Flag this post
FastAPI Template
๐ self hosting
Flag this post
Loading...Loading more...