kemanon's Top FindsLoading...
Show HN: First Principles articles teaching a variety of languages
github.com·22m·
Discuss: Hacker News
🐳Docker
Flag this post
CISO Predictions for 2026
fortinet.com·2h
🔐Cybersecurity
Flag this post
How Does the Internet Work? TCP/IP, DNS & Network Infrastructure Explained
the-ultimate-gadget-guide.blogspot.com·1d
🛣️BGP
Flag this post
7 Linux commands to keep your system healthy and optimized
howtogeek.com·2h·
Discuss: Hacker News
🐧Linux
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.to·11h·
Discuss: DEV
🔒TLS/SSL
Flag this post
HTB: Dump
0xdf.gitlab.io·6h
🦈Wireshark
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·23h·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·1d
🦠Malware Analysis
Flag this post
Autark: Rethinking build systems – Integrate, Don't Outsource
blog.annapurna.cc·1h·
Discuss: Hacker News
🐧Linux
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·16h·
🐧Linux
Flag this post
Dive into Systems
diveintosystems.org·1d·
Discuss: Hacker News
💻Computer Science
Flag this post
An eBPF Loophole: Using XDP for Egress Traffic
loopholelabs.io·27m·
Discuss: Hacker News
🧱Firewalls
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
DNS Under Strain: Technical and Policy Challenges in Supporting the Internet of Autonomous Things
circleid.com·23h
🌐DNS
Flag this post
Ransomware Defense Using the Wazuh Open Source Platform
thehackernews.com·5h
🦠Malware Analysis
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.net·9h
🦈Wireshark
Flag this post
Build your own GPG in Rust
andrewhalle.github.io·1d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
What would you do? Opening my lab to the internet, DNS/cert/design/security questions.
reddit.com·23h·
Discuss: r/homelab
🌐DNS
Flag this post
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
blogger.com·1d
🔐Cybersecurity
Flag this post
The Joys (And “Joys”) Of Being Good At My Job
broken-words.com·1h
🔬Reverse Engineering
Flag this post