JavaScript Did not Crash. That Does not Mean It is Fine.
dev.toยท19hยท
Discuss: DEV
๐Ÿ’ปComputer Science
Flag this post
Oklahoma at Tennessee: Sooners kick Vols out of Playoff race, plus more takeaways
nytimes.comยท12h
๐Ÿ”Cybersecurity
Flag this post
Hackers target online stores with new attack
foxnews.comยท1h
๐Ÿ”Cybersecurity
Flag this post
Speedrunning an RL Environment
sidb.inยท1dยท
Discuss: Hacker News
๐ŸPython
Flag this post
Demystifying Uniface ProcScript: A Simple Guide to $totdbocc ๐Ÿš€
dev.toยท7hยท
Discuss: DEV
๐Ÿ”Cryptography
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1dยท
Discuss: Hacker News
๐Ÿ”Cybersecurity
Flag this post
Made a web extracter py script named ScrapeWebX
dev.toยท1hยท
Discuss: DEV
๐ŸPython
Flag this post
Parsing with zippers improves parsing with derivatives
dl.acm.orgยท6hยท
Discuss: Hacker News
๐ŸPython
Flag this post
Another major WordPress add-on security flaw could affect 10,000 sites - find out if you're affected
techradar.comยท23h
๐ŸŽฏPenetration Testing
Flag this post
AI scrapers request commented scripts
cryptography.dogยท2dยท
๐Ÿฆ Malware Analysis
Flag this post
Patterns for Defensive Programming in Rust
corrode.devยท15h
๐Ÿ”Cybersecurity
Flag this post
Gmailใ€1ๅ„„8300ไธ‡ไปถใฎ่ช่จผๆƒ…ๅ ฑๆตๅ‡บ
rtbsquare.workยท1d
๐Ÿ”Cybersecurity
Flag this post
Moving tables across PostgreSQL instances
ananthakumaran.inยท10hยท
๐ŸงฑFirewalls
Flag this post
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LlmJailbreaks and Prompt Injections
dev.toยท10hยท
Discuss: DEV
๐ŸŽฏPenetration Testing
Flag this post
How to find DNN Software installations on your network
runzero.comยท1d
๐ŸฆˆWireshark
Flag this post
Cross-Database Migratable Reports--SPL Reporting
dev.toยท2dยท
Discuss: DEV
๐ŸPython
Flag this post
How to validate business logic
event-driven.ioยท4d
๐Ÿ”Cybersecurity
Flag this post
Never Use Text Pixelation To Redact Sensitive Information | Bishop Fox
bishopfox.comยท12h
๐Ÿ”Cybersecurity
Flag this post
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
blogger.comยท3h
๐Ÿ”Cybersecurity
Flag this post
Why should I accept all cookies?
idiallo.comยท16hยท
Discuss: Hacker News
๐Ÿ”Cybersecurity
Flag this post