Little Procedural Island I've been working on
v.redd.it·1d·
🐳Docker
Flag this post
Pragma Unroll
sandordargo.com·23h·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
Crypto Long & Short: Redefining the Custody Standard for Banking
coindesk.com·15h
🔐Cryptography
Flag this post
Switching from GPG to Age
luke.hsiao.dev·16h·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
How to Design Efficient Memory Architectures for Agentic AI Systems
pub.towardsai.net·1d
🐍Python
Flag this post
Stop vibe coding your unit tests
andy-gallagher.com·16h·
Discuss: Hacker News
💉SQL Injection
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·1d
🐍Python
Flag this post
LazyLLM, Easiest and laziest way for building multi-agent LLMs applications
github.com·9h·
Discuss: Hacker News
🐍Python
Flag this post
Voiden: The API client that doesn't want your email address
reddit.com·41m·
Discuss: r/programming
🐧Linux
Flag this post
How Serde Transforms Rust Data Serialization: Complete Performance and Safety Guide
dev.to·1d·
Discuss: DEV
🐍Python
Flag this post
AMD confirms critical security risk for many Zen 5 CPUs
tweaktown.com·16h
🐧Linux
Flag this post
Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
thehackernews.com·1d
🎯Penetration Testing
Flag this post
Do Androids Dream of Unseen Puppeteers? Probing for a Conspiracy Mindset in Large Language Models
arxiv.org·4h
🦠Malware Analysis
Flag this post
Confidential Computing To Secure AI Workloads
semiengineering.com·1h
🔐Cryptography
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·3d
💉SQL Injection
Flag this post
C++ implementation of SIP, ICE, TURN and related protocols
github.com·19h·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
Beyond the Scan: The Future of Snyk Container
dev.to·1d·
Discuss: DEV
🐳Docker
Flag this post
Code That Writes Itself: The Era of Example-Driven Programming by Arvind Sundararajan
dev.to·4h·
Discuss: DEV
🐍Python
Flag this post
A memo on Takeoff
lesswrong.com·29m
💻Computer Science
Flag this post
Google Security Researchers ID AI-Powered Malware Used in Real World Cyberattack
axios.com·16h
🦠Malware Analysis
Flag this post