From Raw to Refined: Data Pipeline Architecture at Scale
dev.to·11h·
Discuss: DEV
⚙️Batch Processing
Flag this post
Challenges compiling old C++ code on modern Linux
smalldatum.blogspot.com·15h·
🔗Static Linking
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·15h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·11h
λLambda Encodings
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·13h·
Discuss: Hacker News
Bidirectional Typing
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org·2d
🏺Format Archaeology
Flag this post
Day 43: Python Valid Parentheses Checker, Stack-Based Bracket Validation with Mapping and Loop Scanning
dev.to·1h·
Discuss: DEV
Format Verification
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.com·1d
📜Family History Data
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·13h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
Building a Distributed Database in Elixir (Part 2: Architecture and the Beam)
medium.com·1d·
Discuss: Hacker News
🤝Distributed Consensus
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
Code Intel: Multi-agent LLM and AST analysis for Python codebases (Python only)
github.com·1d·
Discuss: Hacker News
🦀Rust Borrowing
Flag this post
Cryptology Group Held an Election, but Can’t Decrypt the Results
nytimes.com·1d·
🔐Archive Cryptanalysis
Flag this post