[notes] My CDN Subdomain Setup
v5.chriskrycho.comΒ·17h
πŸ”’Computer Security
Flag this post
Variants of Fitch Cheney’s Trick
possiblywrong.wordpress.comΒ·17h
πŸ”’Computer Security
Flag this post
Trump-Epstein statue gets new location
arkansasonline.comΒ·7h
πŸ”’Computer Security
Flag this post
November 14, 2025 CN strike
fastfrwrd.infoΒ·13h
πŸ”’Computer Security
Flag this post
Master Linux Process Management: The Ultimate Guide to ps, top, kill, htop & More (2025)
thecybersecguru.comΒ·3h
πŸ”’Computer Security
Flag this post
New Book Release from Saifedean Ammous - The Gold Standard
stacker.newsΒ·15h
πŸ”’Computer Security
Flag this post
I Measured Neural Network Training Every 5 Steps for 10,000 Iterations
towardsdatascience.comΒ·3h
πŸ”’Computer Security
Flag this post
Best infosec-related long reads for the week of 11/8/25
metacurity.comΒ·3h
πŸ”’Computer Security
Flag this post
considering tcm as a potential cure
reddit.comΒ·5hΒ·
Discuss: r/badbreath
πŸ”’Computer Security
Flag this post
I NEED A HACKER TO ASSIST ME IN RECoVERING MY LOST CRYPTO>> BRUNOE QUICK HACK
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”’Computer Security
Flag this post
More Devs, Faster Code
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”’Computer Security
Flag this post
Ancient RNA recovery reveals gene activity in Ice Age mammoths
spacedaily.comΒ·7h
πŸ”’Computer Security
Flag this post
Δ€iyā
reddit.comΒ·11hΒ·
πŸ”’Computer Security
Flag this post
Build in Public: Week 2. How Do People Even Find Influencers?
dev.toΒ·1hΒ·
Discuss: DEV
πŸ”’Computer Security
Flag this post
If you say these 10 things regularly, you’re probably more privileged than you realize (and everyone notices)
artfulparent.comΒ·3h
πŸ”’Computer Security
Flag this post
Speculative Decoding: Making LLMs Faster Without Sacrificing Quality
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”’Computer Security
Flag this post
Banning micro-bets in sports is the only way to restore integrity to the games
nytimes.comΒ·2d
πŸ”’Computer Security
Flag this post
Links 12/11/2025: Botulism Outbreak and Increased Russian Censorship
techrights.orgΒ·2d
πŸ”’Computer Security
Flag this post