kemanon's Top FindsLoading...
Show HN: First Principles articles teaching a variety of languages
github.com·9h·
Discuss: Hacker News
🐳Docker
Flag this post
CISO Predictions for 2026
fortinet.com·11h
🔐Cybersecurity
Flag this post
How Does the Internet Work? TCP/IP, DNS & Network Infrastructure Explained
the-ultimate-gadget-guide.blogspot.com·1d
🛣️BGP
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.to·8h·
Discuss: DEV
💉SQL Injection
Flag this post
7 Linux commands to keep your system healthy and optimized
howtogeek.com·11h·
Discuss: Hacker News
🐧Linux
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·1d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Autark: Rethinking build systems – Integrate, Don't Outsource
blog.annapurna.cc·9h·
Discuss: Hacker News
🐧Linux
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·1d·
🐧Linux
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·1d
🦠Malware Analysis
Flag this post
HTB: Dump
0xdf.gitlab.io·15h
🦈Wireshark
Flag this post
Devuan GNU+Linux "Excalibur": Debian 13 "Trixie" without systemd
heise.de·4h
🐧Linux
Flag this post
Dive into Systems
diveintosystems.org·1d·
Discuss: Hacker News
💻Computer Science
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
An eBPF Loophole: Using XDP for Egress Traffic
loopholelabs.io·9h·
Discuss: Hacker News
🧱Firewalls
Flag this post
DNS Under Strain: Technical and Policy Challenges in Supporting the Internet of Autonomous Things
circleid.com·1d
🌐DNS
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.net·17h
🦈Wireshark
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
zdnet.com·8h·
Discuss: Hacker News
🐧Linux
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.to·20h·
Discuss: DEV
🔒TLS/SSL
Flag this post
Ransomware Defense Using the Wazuh Open Source Platform
thehackernews.com·14h
🦠Malware Analysis
Flag this post
AI Slop vs. OSS Security
devansh.bearblog.dev·4h·
Discuss: Hacker News
🎯Penetration Testing
Flag this post