Hacker Paragraph: BSI Chief Calls for Decriminalization of Security Researchers
heise.de·13h
⏱️Computational Complexity
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·2d
🏗️Design Patterns
Flag this post
Consumer Financial Protection Bureau's security falls apart amid layoffs
theregister.com·15h
⏱️Computational Complexity
Flag this post
I Processed the Internet on a Single Machine to Find Valuable Expired Domains
⏱️Computational Complexity
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
🏗️Design Patterns
Flag this post
Hackers Target Freight Firms, Adding Costs and Disruptions
bloomberg.com·21h
⏱️Computational Complexity
Flag this post
My little string library
💻programming
Flag this post
Cyber Attack Exposes Data of 861 Irish Defective Block Grant Applicants
blogger.com·19h
💻programming
Flag this post
OP-TEE on the Raspberry Pi 5
🔬Static Analysis
Flag this post
Unauthenticated Remote Code Execution Vulnerability in WSUS Service
offsec.com·1d
🔬Static Analysis
Flag this post
I built a small ARM-like virtual system with a custom RTOS and C/C++ toolchain (BEEP-8)
🏗️Design Patterns
Flag this post
Google Big Sleep found five vulnerabilities in Safari
securityaffairs.com·21h
🌳Red-Black Trees
Flag this post
udo — simple suid CLI à la doas/sudo
🔁Recursion
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·4d
λFunctional Programming
Flag this post
5 senseless PC habits we all pretend are normal
xda-developers.com·21h
🌳Red-Black Trees
Flag this post
Loading...Loading more...