kemanon's Top FindsLoading...
Systems and Protocol Aspects for Circumstellar Environments Research Group
irtf.org·2h·
Discuss: Hacker News
Flag this post
We will WARC you: preserving access to published CD-ROMs at NLA
dpconline.org·10h
Flag this post
Jamf Threat Labs uncovers mobile app game leaking player credentials
jamf.com·15h
🔐Cybersecurity
Flag this post
OIDC workload identity on AWS
latacora.com·1d
🔒TLS/SSL
Flag this post
Making the Backblaze Network AI Ready
backblaze.com·15h
🦈Wireshark
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.com·2d
🔐Cybersecurity
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·2d·
Discuss: Hacker News
🔒TLS/SSL
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Microsoft Warns Windows 10 Users: Hackers Target Outdated Systems
blogger.com·2d
🔐Cybersecurity
Flag this post
🎙️ Building a Text-to-Speech (TTS) GUI with Python
dev.to·16h·
Discuss: DEV
🐍Python
Flag this post
4 awesome (and practical) things you can do with a terminal on Android
howtogeek.com·14h
🔑SSH
Flag this post
The AI Stack We Trust: Tools, Frameworks, and Practices We Use in Production
dev.to·3h·
Discuss: DEV
🐍Python
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·14h
🦠Malware Analysis
Flag this post
An Analysis of Early-Stage Functional Safety Analysis Methods and Their Integration into Model-Based Systems Engineering
arxiv.org·2h
Flag this post
Networking in the Standard Library is a terrible idea
reddit.com·2d·
Discuss: r/cpp
🌐Networking
Flag this post
DAFU🦉 Infrastructure Revolution: Docker, CLI, and Enterprise Automation Are Here! 🚀
dev.to·2d·
Discuss: DEV
🐳Docker
Flag this post
How to: Automate Your Next.js Docker App with Render and GitHub Actions
dev.to·2d·
Discuss: DEV
🐳Docker
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.org·2d
🔒TLS/SSL
Flag this post
Introducing Spira - Making a Shell #0
github.com·2d·
Discuss: DEV
🐧Linux
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·2d
🦠Malware Analysis
Flag this post
Implementing JWT Authentication in Rust using Axum
dev.to·1d·
Discuss: DEV
🔒TLS/SSL
Flag this post