Hacker Paragraph: BSI Chief Calls for Decriminalization of Security Researchers
heise.de·15h
⏱️Computational Complexity
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·2d
🏗️Design Patterns
Flag this post
I Processed the Internet on a Single Machine to Find Valuable Expired Domains
⏱️Computational Complexity
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
🏗️Design Patterns
Flag this post
Consumer Financial Protection Bureau's security falls apart amid layoffs
theregister.com·17h
⏱️Computational Complexity
Flag this post
My little string library
💻programming
Flag this post
Cyber Attack Exposes Data of 861 Irish Defective Block Grant Applicants
blogger.com·21h
💻programming
Flag this post
Unauthenticated Remote Code Execution Vulnerability in WSUS Service
offsec.com·1d
🔬Static Analysis
Flag this post
Google Big Sleep found five vulnerabilities in Safari
securityaffairs.com·23h
🌳Red-Black Trees
Flag this post
OP-TEE on the Raspberry Pi 5
🔬Static Analysis
Flag this post
udo — simple suid CLI à la doas/sudo
🔁Recursion
Flag this post
5 senseless PC habits we all pretend are normal
xda-developers.com·23h
🌳Red-Black Trees
Flag this post
I just created go-picker: a small Go library for picking values from maps, typically parsed JSON.
💻programming
Flag this post
I built a small ARM-like virtual system with a custom RTOS and C/C++ toolchain (BEEP-8)
🏗️Design Patterns
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·4d
λFunctional Programming
Flag this post
bcpierce00/unison v2.53.8
github.com·11h
🔬Static Analysis
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
🔬Static Analysis
Flag this post
Help with Rust/Cargos/Maxima
🔬Static Analysis
Flag this post
Loading...Loading more...