What is content filtering?
proton.meยท9h
๐Ÿ“ฐContent Curation
Webcast recap: see + secure everything in your OT environment
runzero.comยท6h
๐ŸŒNetwork Security
Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 1)
blackhillsinfosec.comยท11h
๐ŸบKerberos Archaeology
The Ternary Manifesto
homepage.cs.uiowa.eduยท14h
๐Ÿ“Concrete Syntax
Hacking Electronic Safes
schneier.comยท14h
๐Ÿ”“Hacking
Senior DevOps Engineer Interview at Uber..
medium.comยท14hยท
Discuss: r/programming
๐Ÿ Homelab Pentesting
enjoy-digital/litex
github.comยท22h
๐Ÿ–ฅ๏ธModern Terminals
Bitrig's Swift Interpreter: From Code to Bytecode
bitrig.appยท1dยท
Discuss: Hacker News
๐Ÿ”งBinary Parsers
Internet Archive and Major Labels Settle $621 Million Copyright Lawsuit
rollingstone.comยท2d
๐ŸŽตAudio Archaeology
What is Algebraic about Algebraic Effects?
interjectedfuture.comยท2dยท
Discuss: Hacker News
โœจAlgebraic Effects
Outbox Done Right in Go: Building Resilient Event-Driven Systems with NATS and SQL
dev.toยท4dยท
Discuss: DEV
๐Ÿ“Database WAL
Democratizing Red Teaming: AI-Powered Security for Everyone
dev.toยท14hยท
Discuss: DEV
๐Ÿ Homelab Pentesting
Internet Archive vs. Music Labels: $693m Copyright Battle Ends with Confidential Settlement
torrentfreak.comยท1dยท
๐ŸŒWeb Archiving
Esther Minano: Making Postgres scale to zero with CNPG
xata.ioยท14hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Privacy-Preserving Decentralized Federated Learning via Explainable Adaptive Differential Privacy
arxiv.orgยท1d
๐Ÿ”’Privacy Preserving
Orchestrating Real-World Agent Workflows with MCP
dev.toยท11hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Multi-Region keys: A new approach to key replication in AWS Payment Cryptography
aws.amazon.comยท1d
๐ŸŒณArchive Merkle Trees
Building a Secure Fortress within AI: A Developer's Guide to Full-Stack Security ๐Ÿฐ
dev.toยท8hยท
Discuss: DEV
๐Ÿ›ก๏ธWebAssembly Security
Unlocking Hidden Potential: Optimal Solutions Beyond the Obvious
dev.toยท8hยท
Discuss: DEV
๐ŸŒCultural Algorithms