🐉 Kali Linux Command Reference Sheet <span class="entity-image"><a href="https://pbs.twimg.com/media/G4_LsY0a4AECc3j.jpg" target="_blank"><img alt="Image" src="...
threadreaderapp.com·1d
💻programming
Flag this post
Microsoft put on the naughty step by Aussie regulator
bangkokpost.com·1d
💻programming
Flag this post
saxon1964/neovim-tips v0.7.3
github.com·18h
💻programming
Flag this post
Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns
forbes.com·4d
⏱️Computational Complexity
Flag this post
I undervolted and overclocked my 40-Series GPU, here's how it went
xda-developers.com·56m
🎨Computer Graphics
Flag this post
Windows: October Security Updates Can Trigger Bitlocker Recovery
heise.de·2h
🌳Red-Black Trees
Flag this post
Q: Avoiding ‘1 Step Forwards, 2 Steps Back’ When Finalizing Larger Projects?
🔬Static Analysis
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.com·2h
λFunctional Programming
Flag this post
Self-hosted remote support shell?
💻programming
Flag this post
Flatpaks kinda suck in my experience
🌳Red-Black Trees
Flag this post
jlesage/docker-jdownloader-2
github.com·2d
💻programming
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.com·2d
🔢mathmemathics
Flag this post
Prompt Injection as an Emerging Threat: Evaluating the Resilience of Large Language Models
arxiv.org·2d
λFunctional Programming
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·1d
λFunctional Programming
Flag this post
Loading...Loading more...