How to configure and verify ACM certificates with trust stores
aws.amazon.com·3d
🔐PKI Archaeology
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.com·1d
🛡Cybersecurity
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·5d
🔐Certificate Analysis
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.net·2d
📡BGP Archaeology
Introducing PromptIntel
blog.securitybreak.io·1h
🎯Threat Hunting
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·2d
🔐Capability Systems
DataWave: General purpose framework for both structured and unstructured data
code.nsa.gov·15h·
Discuss: Hacker News
🌊Streaming Databases
🚀 From Rejection to Reinvention: How I Built an AI That Finds My Jobs
dev.to·1d·
Discuss: DEV
🇨🇳Chinese Computing
pgtricks – two tools for backing up PostgreSQL database dumps
github.com·1d·
Discuss: Hacker News
🌳Git Internals
10 Data + AI Observations for Fall 2025
towardsdatascience.com·1d
🌊Stream Processing
Tired of Passwords? Meet Passkeys: Your Keychain to a Passwordless Future
dev.to·1d·
Discuss: DEV
🔓Password Cracking
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·3d
🔍eBPF
Let's Write a Macro in Rust
hackeryarn.com·1d·
🦀Rust Macros
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.to·5d·
Discuss: DEV
🌐NetworkProtocols
Building A Real-Time Communication System Using Go and WebSocket
dev.to·1d·
Discuss: DEV
🌐WebSocket Framing
CubicLog – A single-binary logging server with zero-config smart analytics
github.com·2d·
Discuss: Hacker News
📝Log Parsing
Building a Custom MCP Server in Continue: A Step-by-Step Guide
dev.to·1d·
Discuss: DEV
📻Homebrew Protocols
OSD600: Lab 5
dev.to·1d·
Discuss: DEV
❄️Nix Flakes
Operable Software
ferd.ca·1d·
Discuss: Hacker News
👁️System Observability
How Calyx Is Solving The $100 Billion Problem That's Fragmenting DeFi Across 19 Blockchains
hackernoon.com·1d
🔗Hash Chains