12 everyday technologies powered by Linux
allthingsopen.orgยท12h
๐งLinux
Flag this post
The Joys (And โJoysโ) Of Being Good At My Job
broken-words.comยท1d
๐Reverse Engineering
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท5h
๐Security
Flag this post
The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท1d
๐eBPF
Flag this post
NEWS ROUNDUP โ 5th November 2025
digitalforensicsmagazine.comยท8h
๐Security
Flag this post
From Swift to Mojo and high-performance AI Engineering with Chris Lattner
newsletter.pragmaticengineer.comยท3h
๐จLLVM
Flag this post
InfoSec News Nuggets 11/04/2025
aboutdfir.comยท1d
๐Security
Flag this post
Japan Mino Kogyo Ransomware Attack
๐Network Security
Flag this post
10 Smart Performance Hacks For Faster Python Code
blog.jetbrains.comยท8h
โกFastAPI
Flag this post
How CIOs approach data, process, and security shortfalls with AI to tackle technical debt
nordot.appยท2h
๐ก๏ธAI Security
Flag this post
โโLearn what generative AI can do for your security operations center
microsoft.comยท1d
๐ก๏ธAI Security
Flag this post
The Learning Loop and LLMs
๐ฌPrompt Engineering
Flag this post
jlesage/docker-jdownloader-2
github.comยท1d
๐ณDocker
Flag this post
Gain Control of Your Innovation With Low Code Technologies
devops.comยท7h
๐งDevOps
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.comยท1d
๐จDesign Systems
Flag this post
Master Pro Docker Techniques: A Best Practices Guide for Lean, Secure Containers
๐ณDocker
Flag this post
5 senseless PC habits we all pretend are normal
xda-developers.comยท1d
๐Hardware Security
Flag this post
Loading...Loading more...