iFLYTEK AINote 2: Unboxing & First Impressions
ewritable.netยท1h
โŒจ๏ธMechanical Keyboards
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1h
๐Ÿ”’Security
Flag this post
A C example with objects and a arena for allocations, what do you think?
reddit.comยท3hยท
๐Ÿฆ€Rust
Flag this post
The Joys (And โ€œJoysโ€) Of Being Good At My Job
broken-words.comยท1d
๐Ÿ”Reverse Engineering
Flag this post
10 Smart Performance Hacks For Faster Python Code
blog.jetbrains.comยท4h
โšกFastAPI
Flag this post
The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท22h
๐Ÿ”eBPF
Flag this post
โ€‹โ€‹Learn what generative AI can do for your security operations center
microsoft.comยท22h
๐Ÿ›ก๏ธAI Security
Flag this post
The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
thehackernews.comยท2d
๐ŸšจIncident Response
Flag this post
NEWS ROUNDUP โ€“ 5th November 2025
digitalforensicsmagazine.comยท4h
๐Ÿ”’Security
Flag this post
Acer reveals its fanciest Chromebook yet - but will it be enough to convince your IT team to upgrade you?
techradar.comยท16h
๐Ÿš€Web Performance
Flag this post
Valuable News โ€“ 2025/11/03
vermaden.wordpress.comยท2d
๐ŸงLinux
Flag this post
Creating Lisp Systems
renato.athaydes.comยท7hยท
Discuss: Hacker News
๐ŸญCode Generation
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.ioยท5hยท
Discuss: Hacker News
๐Ÿ”“Binary Exploitation
Flag this post
Deploying to Amazon's cloud is a pain in the AWS younger devs won't tolerate
theregister.comยท18hยท
Discuss: Hacker News
๐Ÿ”งDevOps
Flag this post
5 senseless PC habits we all pretend are normal
xda-developers.comยท1d
๐Ÿ”Hardware Security
Flag this post
Solving a problem with mindware
lesswrong.comยท1d
๐Ÿ’ฌPrompt Engineering
Flag this post
When Oracle Got Hacked (and the Hackers Fought Each Other)
dev.toยท10hยท
Discuss: DEV
๐Ÿ”“Binary Exploitation
Flag this post
SLES 16: SUSE's Flagship Linux with AI and Post-Quantum Crypto
heise.deยท2d
๐ŸงLinux
Flag this post
Legible vs. Illegible AI Safety Problems
lesswrong.comยท17h
๐Ÿ”—Dependent Types
Flag this post
The Learning Loop and LLMs
martinfowler.comยท1dยท
๐Ÿ’ฌPrompt Engineering
Flag this post