Result isomorphism
blog.ploeh.dk·5h
🧮Algebraic Datatypes
Flag this post
Check your Mac is secure
eclecticlight.co·13h
🔌Operating system internals
Flag this post
Compilation is communication
mmapped.blog·2d
🛡️Proof-Carrying Archives
Flag this post
GitOps on Azure: Deploying AKS and ArgoCD with Automated SSL via Terraform [Part 1]
blog.devops.dev·7h
📦Container Security
Flag this post
Microsoft's October 'Patch Tuesday' Update Fixes Over 170 Flaws
lifehacker.com·1d
🔓Hacking
Flag this post
Rethinking PostgreSQL buffer mapping for modern hardware architectures
🗃️Database Storage
Flag this post
A Taste of P99 CONF: Low Latency With eBPF, Rust and More
thenewstack.io·1d
🖥️Modern Terminals
Flag this post
Anatomy of an Attack: The "BlackSuit Blitz" at a Global Equipment Manufacturer
unit42.paloaltonetworks.com·21h
🎫Kerberos Attacks
Flag this post
Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution
securelist.com·7h
🦠Malware Analysis
Flag this post
Critical infrastructure CISOs Can't Ignore 'Back-Office Clutter' Data
darkreading.com·2d
🔓Hacking
Flag this post
Matthew Plascencia, Digital Forensic Investigator, Exhibit A Cyber
forensicfocus.com·1d
🔍Binary Forensics
Flag this post
A very basic plugin for Filestash
📦Archive Formats
Flag this post
I Built a SaaS Without Looking at a Single Competitor. Here’s What I Learned
🚀Indie Hacking
Flag this post
SLEAN: Simple Lightweight Ensemble Analysis Network for Multi-Provider LLM Coordination: Design, Implementation, and Vibe Coding Bug Investigation Case Study
arxiv.org·1d
🔗Archive Combinators
Flag this post
Loading...Loading more...