Integer overflow checking with C23
blog.gnoack.org·1d
🔬Static Analysis
Flag this post
The overengineered Solution to my Pigeon Problem
maxnagy.com·1d·
Discuss: Hacker News
🌳Red-Black Trees
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·20h
🏗️Design Patterns
Flag this post
udo — simple suid CLI à la doas/sudo
reddit.com·17h·
Discuss: r/commandline
🔁Recursion
Flag this post
Make Cargo & Rust Analyzer Nice to Keep Your Machine Snappy
positron.solutions·1d·
Discuss: r/rust
🏗️Design Patterns
Flag this post
Detecting XZ in Debian with Otto Kekäläinen
opensourcesecurity.io·1d
🔬Static Analysis
Flag this post
New comment by hitekker in "Futurelock: A subtle risk in async Rust"
rfd.shared.oxide.computer·3d·
Discuss: Hacker News
🏗️Design Patterns
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·2d·
Discuss: Hacker News
🔬Static Analysis
Flag this post
Empirical Characterization Testing
blog.ploeh.dk·13h
🔬Static Analysis
Flag this post
How Transformer Models Detect Anomalies in System Logs
hackernoon.com·8h
🌳Red-Black Trees
Flag this post
ADS1241E/1K returning 0xFFFFFF or 0xFFFFEE
imgur.com·1d·
Discuss: r/embedded
🔢Numerical Methods
Flag this post
CyberSlop — meet the new threat actor, MIT and Safe Security
doublepulsar.com·7h
🔬Static Analysis
Flag this post
System.in, Scanner, and File Descriptors – JAVA Case study
dev.to·2h·
Discuss: DEV
💻programming
Flag this post
Building Freebsd Ports
blog.bapt.name·18h
🗺️Graph Algorithms
Flag this post
PostgreSQL update 17 to 18: changed default of database checksum: upgrade_pg.sh
reddit.com·1d·
Discuss: r/archlinux
💻programming
Flag this post
Vibe Coding Beginner Tips (From an Experienced Dev)
vision.md·12h·
Discuss: r/ClaudeAI
🔬Static Analysis
Flag this post
9001/copyparty v1.19.20
github.com·2d
🎨Computer Graphics
Flag this post
OAuth Device Code Phishing: Azure vs. Google Compared
bleepingcomputer.com·11h·
Discuss: Hacker News
💻programming
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·2d·
💻programming
Flag this post
Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns
forbes.com·1d
⏱️Computational Complexity
Flag this post