Packet Analysis, Network Troubleshooting, Protocol Analysis, Traffic Monitoring

I built a WAF in Golang
github.com·9h·
Discuss: DEV
🔒TLS/SSL
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·19m
🧱Firewalls
Flag this post
Pushing Python to 20,000 Requests Sent/Second
dev.to·5h·
Discuss: DEV
🐍Python
Flag this post
The APM paradox
honeybadger.io·8h·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
Security Affairs newsletter Round 548 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·19h
🔐Cybersecurity
Flag this post
We built a simple AI-powered tool for URL Monitoring + On-Call management — now live (Free tier)
reddit.com·27m·
Discuss: r/kubernetes
🐧Linux
Flag this post
Proxy Servers: How They Work and What They Actually Do
blogger.com·1d
🧱Firewalls
Flag this post
Oxy is Cloudflare's Rust-based next generation proxy framework
blog.cloudflare.com·5h·
Discuss: Hacker News
🧱Firewalls
Flag this post
What Artifacts Teach Us
systemsapproach.org·1h
🛣️BGP
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·2d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
4 command-line tools I always install on Windows PCs
makeuseof.com·21h
🐧Linux
Flag this post
EP187: Why is DeepSeek-OCR such a BIG DEAL?
blog.bytebytego.com·1d
🐍Python
Flag this post
When Logs Become Chains: The Hidden Danger of Synchronous Logging
systemdr.substack.com·1d·
🧱Firewalls
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.com·8h
🔐Cybersecurity
Flag this post
High-Performance Java gRPC Implementation Guide for Scalable Microservices Communication
dev.to·8h·
Discuss: DEV
🐳Docker
Flag this post
Setting up a simple home router with OpenBSD
blog.montgomerie.net·3h·
🧱Firewalls
Flag this post
CVC applauds SECL's tech initiatives for transparency and vigilance
nordot.app·17h
🎯Penetration Testing
Flag this post
Provably Secure e2ee file transfer CLI (post-quantum-ready)
reddit.com·1d·
Discuss: r/webdev
🔒TLS/SSL
Flag this post
From Signals to Reliability: SLOs, Runbooks and Post-Mortems
fatihkoc.net·2h·
Discuss: Hacker News
🐧Linux
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·2d
🦠Malware Analysis
Flag this post