IT security: BSI gives tips on Microsoft Office – and warns of "residual risks"
heise.de·1d
🔤EBCDIC Privacy
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.com·1d
🎫Kerberos Exploitation
Encrypted Root and ZFS on NixOS
ryanseipp.com·14h
🔒Secure Boot
A New Method for Estimating P2P Network Size
eli.sohl.com·1d·
Discuss: Hacker News
📊Count-Min Sketch
A Focused Approach to Learning SQL
towardsdatascience.com·1d
🗃️Database Forensics
Link Graveyard: A snapshot of my abandoned browser tabs
timkellogg.me·22h·
🌀Brotli Internals
Postgres High Availability with CDC
planetscale.com·1d·
Discuss: Hacker News
🗄️PostgreSQL WAL
“Beyond the Obvious: How a Dead-End XXE Led to a Critical SQLi Goldmine”
infosecwriteups.com·1d
💣ZIP Vulnerabilities
Rails on SQLite: exciting new ways to cause outages
andre.arko.net·2d·
Discuss: Hacker News
🗄️SQLite Internals
Smart Log Anomaly Detection with Python and Isolation Forest
dev.to·1d·
Discuss: DEV
📝Log Parsing
Taming the Data Tsunami: Handling Big Data in Real-Time
dev.to·4h·
Discuss: DEV
🌊Stream Processing
The Trellis: A Gardening Metaphor for Software Engineering
sinclairtarget.com·1d·
Discuss: Hacker News
📏Code Metrics
Network Switch Reverse Engineering
fohdeesha.com·2d·
Discuss: Hacker News
🎮Switch Archaeology
From SQL to Python: Uniting Stored Power with Functional Flexibility
dev.to·1d·
Discuss: DEV
🧮Datalog
The future of microoptimization
goldenstack.net·18h·
Discuss: Hacker News
🧮Compute Optimization
Tool-space interference in the MCP era: Designing for agent compatibility at scale
microsoft.com·2d·
Discuss: Hacker News
🔗Topological Sorting
Failed Machine Learning
github.com·1d·
Discuss: Hacker News
🧠Machine Learning
AI-Powered Automated Polyp Characterization in Narrow-Band Imaging Endoscopy (NBIE)
dev.to·1h·
Discuss: DEV
🧠Machine Learning
9 Best Practices for API Security ⚔️
newsletter.systemdesign.one·1d
gRPC
Automated Semantic Accessibility Layer for Metaverse Environments via Tri-Modal Data Fusion
dev.to·51m·
Discuss: DEV
📏Linear Logic