Think DSP second edition
allendowney.com·11h
🐍Python
Flag this post
I built sbsh: Persistent terminal sessions with discovery, profiles, and an API
🐳Docker
Flag this post
Sandbox Strategies For Power Users On Any Platform
androidheadlines.com·17h
🐳Docker
Flag this post
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation
🧱Firewalls
Flag this post
Microservices? No, modularity is what matters
🐳Docker
Flag this post
r/mathematics
💻Computer Science
Flag this post
Part 4: Daily Security Habits
🔐Cybersecurity
Flag this post
“Sneaky” new Android malware takes over your phone, hiding in fake news and ID apps
malwarebytes.com·15h
🦠Malware Analysis
Flag this post
8 essential shell functions to improve your Linux command line
howtogeek.com·14h
🐧Linux
Flag this post
Analysis of NGate malware campaign (NFC relay)
🔒TLS/SSL
Flag this post
[TUI] Ricing the original Rogue
🔒TLS/SSL
Flag this post
flowengineR: A Modular and Extensible Framework for Fair and Reproducible Workflow Design in R
arxiv.org·23h
🐍Python
Flag this post
Defining Types for a Simple HTTP Server
mmhaskell.com·1d
🔒TLS/SSL
Flag this post
Playing Around with ARM Assembly
🐧Linux
Flag this post
Tycoon 2FA Phishing Kit Analysis
cybereason.com·1d
🔒TLS/SSL
Flag this post
jlesage/docker-jdownloader-2
github.com·1d
🐳Docker
Flag this post
Loading...Loading more...