Transport Security, Certificates, HTTPS, Handshake Protocol

Systems and Protocol Aspects for Circumstellar Environments Research Group
irtf.org·1d·
Discuss: Hacker News
🛣️BGP
Flag this post
Huawei Enables MTN South Africa to Obtain the World's First AN L4 Certification Issued by TM Forum in IP Network Field
huawei.com·23h
🛣️BGP
Flag this post
ELISA seminar recap : Introduction to Requirements Engineering – Pete Brink, UL Solutions
elisa.tech·19h
🎯Penetration Testing
Flag this post
What does it mean to be “Safer with Yealink”?
techzine.eu·1d
🔐Cryptography
Flag this post
Australia Mandates Encryption Backdoors
wired.com·1d·
Discuss: Hacker News
🔐Cryptography
Flag this post
How to Convert RTF to PDF in Java: A Step-by-Step Guide
e-iceblue.com·6h·
Discuss: DEV
🔬Reverse Engineering
Flag this post
Various Illustrations
behance.net·8h
🔐Cryptography
Flag this post
Hosting an ATProto PDS without containerization
char.lt·3d·
Discuss: Hacker News
🐳Docker
Flag this post
The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT
trustwave.com·30m
🔐Cybersecurity
Flag this post
Fly-E Group, Inc. Sued for Securities Law Violations - Contact the DJS Law Group to Discuss Your Rights - FLYE
prnewswire.com·8h
🔐Cybersecurity
Flag this post
OpenWRT vs OPNsense
reddit.com·11h·
Discuss: r/homelab
🐧Linux
Flag this post
KeePass DB and TOTP backup strategy
discuss.privacyguides.net·4h
🧱Firewalls
Flag this post
How to Solve AWS WAF Challenges with Node.js
dev.to·3d·
Discuss: DEV
💉SQL Injection
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.de·1d
🔐Cybersecurity
Flag this post
Show HN: I'm open sourcing my Chrome extension that uses AI to modify websites
github.com·1d·
Discuss: Hacker News
🧱Firewalls
Flag this post
Legal Research is Changing: How AI Makes Your C# Applications Smarter
dev.to·1d·
Discuss: DEV
🐍Python
Flag this post
Analyzing Network Traffic with AI: Introducing mcp-wireshark (Wireshark + MCP)
dev.to·8h·
Discuss: DEV
🦈Wireshark
Flag this post
Building an AI-Powered Resume Tailoring Pipeline: Lessons Learned
github.com·20m·
Discuss: DEV
🐍Python
Flag this post
A security model for systemd
lwn.net·2d·
Discuss: Hacker News
🐧Linux
Flag this post
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
thehackernews.com·1d
🎯Penetration Testing
Flag this post