Beyond Lorentzian Noise: Phonon-Scattering Signatures in Carbon Nanotubes
jpsht.jps.jpยท1d
๐Networking
Flag this post
From Lists to Structured Data: A Transformation Guide
haarisekou200207.webbuzzfeed.comยท1d
๐Python
Flag this post
Read more: US subsidiary of Swiss defence contractor hacked
swissinfo.chยท1d
๐Cybersecurity
Flag this post
mkinitcpio v40 released and now in core-testing
๐งLinux
Flag this post
The Joys (And โJoysโ) Of Being Good At My Job
broken-words.comยท2d
๐ฌReverse Engineering
Flag this post
Using AI to modernize mainframes: Turning legacy tech into a strategic advantage
nordot.appยท7h
๐ฌReverse Engineering
Flag this post
3,000+ YouTube videos deliver malware disguised as free software
foxnews.comยท2d
๐ฆ Malware Analysis
Flag this post
New comment by KE000123 in "Ask HN: Who wants to be hired? (November 2025)"
๐Cybersecurity
Flag this post
OpenAI engineers donโt prompt like you do.
threadreaderapp.comยท10h
Flag this post
INDEXING,HASHING & QUERY OPTIMIZATION IN SQL (EXAMPLE ON STUDENTS TABLE )
๐SQL Injection
Flag this post
A Criminology of Machines
arxiv.orgยท14h
Flag this post
One of the most devious malware strains might have been cracked - and it's all thanks to Gen AI
techradar.comยท2d
๐ฆ Malware Analysis
Flag this post
<p>**Abstract:** This paper introduces a framework for automated verification of the semantic integrity of scientific literature, termed Automated Semantic Inte...
freederia.comยท1h
๐Python
Flag this post
Container Census 1.5.1 major update: Multi-host Docker monitoring with vulnerability scanning, resource tracking, container history reporting, and community sta...
๐ณDocker
Flag this post
Loading...Loading more...