Network Security, Packet Filtering, Access Control, iptables

ELA-1567-1 unbound security update
freexian.com·12h
🛣️BGP
Flag this post
Man Pages (Part 1)
abochannek.github.io·12h·
🐧Linux
Flag this post
Microsoft just updated their docs on container-based development environments for #msdyn365BC.
learn.microsoft.com·15h·
Discuss: DEV
🐳Docker
Flag this post
How to Extend WPGraphQL with Custom Types and Resolvers in PHP WordPress
yourwpweb.com·1d·
Discuss: DEV
💉SQL Injection
Flag this post
Ownership of Digital Content Is an Illusion—Unless You Self‑Host
news.itsfoss.com·20h
🐳Docker
Flag this post
What Artifacts Teach Us
systemsapproach.org·4d
🛣️BGP
Flag this post
Setting up a simple home router with OpenBSD
blog.montgomerie.net·4d·
🛣️BGP
Flag this post
The OWASP AI/LLM Top 10: Understanding Security and Privacy Risks in AI-Powered Mobile Applications
nowsecure.com·1d
🦠Malware Analysis
Flag this post
Kong in production environment in K8s
reddit.com·14h·
Discuss: r/kubernetes
🐳Docker
Flag this post
The Best 4K Projectors
nytimes.com·12h
🐍Python
Flag this post
Prisma SASE as Your New Blueprint for Modern Branch Security
paloaltonetworks.com·2d
🦈Wireshark
Flag this post
Session Messenger prepares to weaken file encryption
discuss.privacyguides.net·1d
🔐Cryptography
Flag this post
⚡ Rethinking Prompt Engineering: How Agent Lightning’s APO Teaches Agents to Write Better Prompts
dev.to·19h·
Discuss: DEV
🐍Python
Flag this post
The Protocol: ZKSync Aims to Revamp Its Tokenomics Model
coindesk.com·1d
🛣️BGP
Flag this post
The first thing I did in my new home was set up a 10 GbE LAN
xda-developers.com·4d
🌐Networking
Flag this post
🔄 Process Migration Between App Versions in Joget
dev.to·2d·
Discuss: DEV
🔬Reverse Engineering
Flag this post
Sub-exponential Growth in Online Word Usage: A Piecewise Power-Law Model
arxiv.org·2h
🐍Python
Flag this post
[$] A security model for systemd
lwn.net·1d
🐧Linux
Flag this post