Screening Without Tagging
science.org·2d
🔬Reverse Engineering
Flag this post
実行委員会 CFで電波時計を寄贈 記念事業として 川崎市中原区
news.jp·1h
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
🔬Reverse Engineering
Flag this post
ZFS Enabled Disaster Recovery for Virtualization
klarasystems.com·3d
🐧Linux
Flag this post
Good Code Is Like a Good Joke: It Needs No Explanation
Flag this post
IPv6: The Future of the Internet That’s Quietly Already Here
blogger.com·3d
📡TCP/IP
Flag this post
The 5 quick fixes I always try after a Windows crash
makeuseof.com·12h
Flag this post
Ecuador establishes framework for legitimate interest data processing
ppc.land·17h
Flag this post
Alternate MultiPing 1.000
majorgeeks.com·3d
🦈Wireshark
Flag this post
Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'
🦠Malware Analysis
Flag this post
c!n tester – Release Announcement
🔬Reverse Engineering
Flag this post
Frontend or Backend: Where Full-Stack Devs Spend Their Time
thenewstack.io·18h
Flag this post
Hackers commit highway robbery, stealing cargo and goods
malwarebytes.com·2d
🦠Malware Analysis
Flag this post
Gootloader malware back for the attack, serves up ransomware
theregister.com·2d
🦠Malware Analysis
Flag this post
Book: Emergence in Games, by Penny Sweetser (2007)
Flag this post
Vulnerability Inception: How AI Code Assistants Replicate and Amplify Security Flaws
🎯Penetration Testing
Flag this post
Oregon outlasts Iowa with clutch drive to bolster Playoff chances
nytimes.com·8h
💻Computer Science
Flag this post
From Text to Live Video: How We Built a Serverless Multimodal Logistics AI on Google Cloud Run
Flag this post
Texas Tech vs. BYU: Red Raiders may be the Big 12's new dominant program
nytimes.com·11h
💻Computer Science
Flag this post
Loading...Loading more...