Webcast recap: How North Carolina secures 2,700 schools with one shared view
runzero.comยท1h
๐Network Security
Flag this post
What's different about my RSS reader
olano.devยท19h
๐ฐRSS Reading Practices
Flag this post
A PERSONAL COMPUTING ENVIRONMENT THAT I CAN RELY ON?
logicgrimoire.wordpress.comยท1h
๐Bash Monads
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท6h
๐Certificate Analysis
Flag this post
xb.sql and xbi.sql - Explain Oracle Execution Plans Better! (Part 3 - Cardinality Misestimates)
tanelpoder.comยท9h
๐ง Query Planners
Flag this post
Cybersecurity Laws Will Shape the Future of DevOps
devops.comยท3h
โ๏ธNix Adoption
Flag this post
Show HN: Safebox: Open-source framework for managing self-hosted apps (Beta)
๐ Homelab Federation
Flag this post
Tre โ PG Play Writeup
infosecwriteups.comยท6h
๐Terminal Forensics
Flag this post
Research roundup: 6 cool science stories we almost missed
arstechnica.comยท1d
๐ฆดDatabase Paleontology
Flag this post
FSWatcher: A new cross platform file watcher for MacOS, Linux and Windows
๐ฐFeed Readers
Flag this post
Fungus: The Befunge CPU(2015)
โกHomebrew CPUs
Flag this post
AI Agents in Go: Exploring Agent-to-Agent (A2A) Protocols in AI Ecosystems
๐Interface Evolution
Flag this post
Simple Additions, Substantial Gains: Expanding Scripts, Languages, and Lineage Coverage in URIEL+
arxiv.orgยท10h
๐Concatenative Languages
Flag this post
THE LEAN MEAN MEME MACHINE
โ๏ธFeed Ranking
Flag this post
Good abstractions for humans turn out to be good abstractions for LLMs
โจEffect Handlers
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.comยท6h
๐ซKerberos Attacks
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comยท16h
๐Hash Chains
Flag this post
Loading...Loading more...