On Hacking Back
schneier.com·1h
🔓Binary Exploitation
Flag this post
Show HN: I just wanted to fix my heating but built a Cursor agent instead
🏠Home Automation
Flag this post
IaC First, Unconventional with Intent
☁️Cloud Computing
Flag this post
An interview with William Kahan, the old man of floating-point. (1998)
💾Retro Computing
Flag this post
Send messages to RabbitMq with Symfony 5 and messenger
blog.devops.dev·3h
📬Message Queues
Flag this post
Collapse OS – Why Forth?
⚙️Systems Programming
Flag this post
Managing local stack in Windows.
🏠Self-hosting
Flag this post
Why Your Automation Keeps Getting Detected: A Developer’s Guide to Browser Fingerprinting
🧩Browser Extensions
Flag this post
Put a little Pixie in your cluster
bitfieldconsulting.com·4d
🔍eBPF
Flag this post
Map a Kubernetes cluster with one command
☸️Kubernetes
Flag this post
Coding and Life – Turning 30 and the Tech Dreams of a Golang Indie Hacker
💾Retro Computing
Flag this post
E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
arxiv.org·1d
🛡️AI Security
Flag this post
Learning to Focus: Prioritizing Informative Histories with Structured Attention Mechanisms in Partially Observable Reinforcement Learning
arxiv.org·1d
🎯Reinforcement Learning
Flag this post
Loading...Loading more...