My Favorite Mac VoiceOver commands
feed.thoughtbot.comΒ·7h
πŸ”‘SSH
Flag this post
A simple Obsidian setup for non-techies and Notion refugees
youtu.beΒ·11hΒ·
Discuss: r/ObsidianMD
🐧Linux
Flag this post
My Leetcode Extension just hit 90 users, THANK YOU ALL!
chromewebstore.google.comΒ·3hΒ·
πŸ’»Computer Science
Flag this post
Resolving the Scourge of Java's Checked Exceptions on Its Streams and Lambdas
javajanitorjim.substack.comΒ·9hΒ·
Discuss: Substack
πŸ’‰SQL Injection
Flag this post
Have I Been Pwned: Billions of New Passwords in Collection
heise.deΒ·3d
🎯Penetration Testing
Flag this post
Speech at Christening of Computer [1967]
mynamelowercase.comΒ·1hΒ·
Discuss: Hacker News
πŸ’»Computer Science
Flag this post
Tomorrow's Top 25 Today: Duke, Kentucky to move up in first weekly update of AP college basketball rankings
cbssports.comΒ·7h
πŸ’»Computer Science
Flag this post
2 Years of ML vs. 1 Month of Prompting
levs.fyiΒ·15hΒ·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Vibe Coding ++
blog.bizjak.devΒ·1hΒ·
Discuss: DEV
🐍Python
Flag this post
Account Takeover: What Is It and How to Fight It
hackread.comΒ·3d
🎯Penetration Testing
Flag this post
The U.S. Has 1 Big Reason for Hiding the F-47 Fighter (And China Knows It) - National Security Journal
news.google.comΒ·7h
πŸ›£οΈBGP
Flag this post
From Arrays to Insights: Statistics with NumPy and SciPy
dev.toΒ·13hΒ·
Discuss: DEV
🐍Python
Flag this post
Contributing to Ubuntu β€” Day 2.5: When I had to pause my journey ⏸️
dev.toΒ·1hΒ·
Discuss: DEV
🐧Linux
Flag this post
Malware-pwned laptop gifts cybercriminals Nikkei's Slack
theregister.comΒ·3d
🦠Malware Analysis
Flag this post
Cloud Resume Challenge - Chunk 4 - Building the Automation and CI
dev.toΒ·11hΒ·
Discuss: DEV
🐳Docker
Flag this post
🧡🚨 MAJOR BREAKING: International actors are involved in the State Department led color revolution 🚨🚨
threadreaderapp.comΒ·15h
πŸ›£οΈBGP
Flag this post
SonicWall Firewall Backups Stolen by Nation-State Actor
darkreading.comΒ·3d
🧱Firewalls
Flag this post
Fusion of equipment reliability data through knowledge graphs
sciencedirect.comΒ·1d
πŸ”¬Reverse Engineering
Flag this post
European Commission proposal to β€˜overhaul the GDPR risks user privacy
blog.lukaszolejnik.comΒ·1d
πŸ”Cryptography
Flag this post