“On Being Watched from Above,” by Carolyn Forché
newyorker.com·16h
🔐Cryptography
Flag this post
電動バイク×電アシの切り替え可能!「EVEREST XING W/エベレストエクシング ダブル」を Acalie が発表
news.jp·1h
🔤c
Flag this post
A systems-theoretic approach for identifying security vulnerabilities in machine learning-enhanced industrial control systems
sciencedirect.com·2d
🔌Embedded Systems
Flag this post
Speedrunning an RL Environment
🛡️Cybersecurity
Flag this post
jlesage/docker-jdownloader-2
github.com·2h
🐧Linux
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.com·3d
🐧Linux
Flag this post
The Art of the Do-Over: Designing Idempotent Jobs as a Journey to Peace of Mind
⚡Systems Programming
Flag this post
Password manager KeePass 2.60 is now available: here is what is new
ghacks.net·16h
🌐Network Security
Flag this post
You can't cURL a Border
🔤c
Flag this post
Okta notification on chrome requesting ability to scan local network - is this safe?
🌐Network Security
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
🌐Network Security
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
🛡️Cybersecurity
Flag this post
How to Make Zoom Meetings More Secure and Protect Your Privacy
blogger.com·2d
🌐Network Security
Flag this post
XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd)
isc.sans.edu·13h
🛡️Cybersecurity
Flag this post
3rd November – Threat Intelligence Report
research.checkpoint.com·17h
🌐Network Security
Flag this post
RP2350 hacking challenge 2: into extra time
raspberrypi.com·17h
🔐Cryptography
Flag this post
HTB: Store
0xdf.gitlab.io·4d
🐧Linux
Flag this post
Loading...Loading more...