Lore Drop: 1991-1997
catskull.net·11h
🏺Gaming Archaeology
Eric Schoedon – Certified Expert In IT, Automotive Engineering, And Emerging Forensic Technologies
forensicfocus.com·1d
🔬Hardware Forensics
Announcing Gateway API Support for DigitalOcean Kubernetes
digitalocean.com·3d
📦Container Security
Saying Exactly What You Mean
feed.tedium.co·1d
💿FLAC Archaeology
We’re In the Windows 95 Era of AI Agent Security
secondthoughts.ai·2d
🔓Hacking
Paul's Online Math Notes
tutorial.math.lamar.edu·1d·
Discuss: Hacker News
📜Manuscript Calculus
Understanding Floating-Point Numbers
dennisforbes.ca·20h·
Discuss: Hacker News
📐Arithmetic Precision
Four Ways Airline and Travel Booking Websites Can Deceive You
lifehacker.com·19h
🎫Kerberos Attacks
Python async: a step in the wrong direction
harshal.sheth.io·9h·
Discuss: Hacker News
🌊Stream Processing
Matrix is email wearing a hoodie
gist.github.com·1d·
Discuss: Hacker News
🕵️Vector Smuggling
A video, a pastor and a tense meeting: timeline of Charlie Kirk suspect’s arrest
theguardian.com·13h
🚨Incident Response
Show HN: Llmswap – Universal AI SDK and Code Generation CLI
sreenathmenon.com·2d·
Discuss: Hacker News
🪟Awesome windows command-line
How to Spot Malicious Two-Factor Authentication Prompts
lifehacker.com·11h
🔓Hacking
PromptLock: When AI Meets Ransomware
dev.to·1d·
Discuss: DEV
🌳Archive Merkle Trees
Innovations in Cloud-Based Standards Management: Shaping the Future of Global Compliance
hackernoon.com·2d
🔓Open Source Software
AI-Enhanced Malware Sports Super-Stealthy Tactics
darkreading.com·1d
🦠Malware Analysis
'MostereRAT' Malware Blends In, Blocks Security Tools
darkreading.com·4d
🔓Hacking
**Master Python Numerical Methods: From Integration to Optimization for Scientific Computing**
dev.to·1d·
Discuss: DEV
📐Error Bounds
chalk + debug just got owned on npm… and honestly, this is the nightmare I’ve been expecting
codeant.ai·3d·
❄️Nix Adoption