iFLYTEK AINote 2: Unboxing & First Impressions
ewritable.netยท1h
โจ๏ธMechanical Keyboards
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1h
๐Security
Flag this post
The Joys (And โJoysโ) Of Being Good At My Job
broken-words.comยท1d
๐Reverse Engineering
Flag this post
10 Smart Performance Hacks For Faster Python Code
blog.jetbrains.comยท4h
โกFastAPI
Flag this post
The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท22h
๐eBPF
Flag this post
โโLearn what generative AI can do for your security operations center
microsoft.comยท22h
๐ก๏ธAI Security
Flag this post
The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
thehackernews.comยท2d
๐จIncident Response
Flag this post
NEWS ROUNDUP โ 5th November 2025
digitalforensicsmagazine.comยท4h
๐Security
Flag this post
Acer reveals its fanciest Chromebook yet - but will it be enough to convince your IT team to upgrade you?
techradar.comยท16h
๐Web Performance
Flag this post
Valuable News โ 2025/11/03
vermaden.wordpress.comยท2d
๐งLinux
Flag this post
Creating Lisp Systems
๐ญCode Generation
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐Binary Exploitation
Flag this post
Deploying to Amazon's cloud is a pain in the AWS younger devs won't tolerate
๐งDevOps
Flag this post
5 senseless PC habits we all pretend are normal
xda-developers.comยท1d
๐Hardware Security
Flag this post
Solving a problem with mindware
lesswrong.comยท1d
๐ฌPrompt Engineering
Flag this post
SLES 16: SUSE's Flagship Linux with AI and Post-Quantum Crypto
heise.deยท2d
๐งLinux
Flag this post
Legible vs. Illegible AI Safety Problems
lesswrong.comยท17h
๐Dependent Types
Flag this post
The Learning Loop and LLMs
๐ฌPrompt Engineering
Flag this post
Loading...Loading more...