Hans-Juergen Schoenig: Counting Customers in PostgreSQL
cybertec-postgresql.comΒ·14h
πSQL Injection
Flag this post
Ground zero: 5 things to do after discovering a cyberattack
welivesecurity.comΒ·1d
π¦Wireshark
Flag this post
Calculating the spreading of fluids in porous materials to understand saltwater in soil
phys.orgΒ·3h
πPython
Flag this post
The internet was made for privacy
doctorow.medium.comΒ·4d
πCybersecurity
Flag this post
SesameOp Backdoor Uses OpenAI API for Covert C2
darkreading.comΒ·5h
π―Penetration Testing
Flag this post
Health privacy bill seeks protections for data collected by apps, smartwatches
discuss.privacyguides.netΒ·7m
π¦Wireshark
Flag this post
Secure Distributed Consensus Estimation under False Data Injection Attacks: A Defense Strategy Based on Partial Channel Coding
arxiv.orgΒ·15h
π£οΈBGP
Flag this post
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
π―Penetration Testing
Flag this post
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation
π§±Firewalls
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
π¦Wireshark
Flag this post
Diving Deeper into Blockchain and Web3 Product Engineering β Week 1 Learnings
π£οΈBGP
Flag this post
Predicting & Mitigating Data Corruption in Pure Storage Flash Arrays via Adaptive Bit Error Rate Modeling
π¬Reverse Engineering
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.orgΒ·15h
π¦Wireshark
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.orgΒ·15h
πPython
Flag this post
DOGE Prints Lower-Low Sequence as $0.17 Resistance Locks In
coindesk.comΒ·2h
πCybersecurity
Flag this post
Impact of CuInP<sub>2</sub>S<sub>6</sub>βmetal interfaces on the stabilization of polar phases and polarization switching
nature.comΒ·1h
π‘TCP/IP
Flag this post
Informatics-Driven Selection of Polymers for Fuel-Cell Applications
arxiv.orgΒ·1d
πPython
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.comΒ·1d
πCybersecurity
Flag this post
Why millions of connected vehicles need automated cyber security
techradar.comΒ·5h
πCybersecurity
Flag this post
Loading...Loading more...