Touchy Subject is Available
mikecoats.com·13h
⌨️Mechanical Keyboards
Flag this post
There Is No ‘Right to Train’: How AI Labs Are Trying to Manufacture a Safe Harbor for Theft
thetrichordist.com·1d
🧲Magnetic Philosophy
Flag this post
How Workers VPC Services connects to your regional private networks from anywhere in the world
blog.cloudflare.com·1d
🖥️Self-hosted Infrastructure
Flag this post
NetHack4 Philosophy
🔲Cellular Automata
Flag this post
MDR ROI, Proven Outcomes, and What Security Leaders Need to Ask For
rapid7.com·13h
🔍NTLM Forensics
Flag this post
Have I Been Pwned: Billions of New Passwords in Collection
heise.de·17h
🏺Kerberos Archaeology
Flag this post
I love AI; I hate AI
🏴Scottish Computing
Flag this post
Complete Guide to Credit Card Fraud Detection: How AI Protects Your Money
🚨Incident Response
Flag this post
Run LLMs Locally
💻Local LLMs
Flag this post
Proton a new Linux kernel module for crypto functions callable from XDP
🛡️eBPF Security
Flag this post
Show HN: I'm making an Open-source Japanese learning App inspired by Monkeytype
🇯🇵Japanese Computing
Flag this post
Academics and Generative AI: Empirical and Epistemic Indicators of Policy-Practice Voids
arxiv.org·22h
🌍Cultural Algorithms
Flag this post
How AI is Revolutionizing Malware Detection in Modern Software Systems
🦠Malware Analysis
Flag this post
The Unseen Architecture of Python: Mastering Environments, Typing, and Memory
💻Programming languages
Flag this post
Loading...Loading more...