Looking for Sales/Marketing co-founder (equity-only)
beatstorapon.com·12h·
Discuss: Hacker News
📼Cassette Culture
Flag this post
Whatever you do, don’t disable these 11 Windows services
makeuseof.com·2d·
Discuss: Hacker News
🪟Awesome windows command-line
Flag this post
Show HN: LogLens, a fast alternative to grep – jq for structured logs
getloglens.com·3d·
Discuss: Hacker News
📝Log Parsing
Flag this post
30x30 pixels grayscale camera made out of an optical mouse sensor
old.reddit.com·7h·
Discuss: r/3Dprinting
🔬Floppy imaging
Flag this post
Exploring Cloud Key Management Options
devops.com·3d
🔐Archive Encryption
Flag this post
Revisiting interface segregation in Go
rednafi.com·1d·
📋Format Specification
Flag this post
Machine Scheduler in LLVM – Part II
myhsu.xyz·11h·
Discuss: Hacker News
⚙️RISC-V Microcode
Flag this post
Importing Node Modules from BitTorrent
evanhahn.com·2d·
Discuss: Hacker News
🌊BitTorrent
Flag this post
Breaking into GitLab: Attacking and Defending Self-Hosted CI/CD Environments
risk3sixty.com·3d·
Discuss: Hacker News
📦Container Security
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.io·5d·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Python Coding Challenges: FizzBuzz, String Equality, and Heterogram Checks for Beginners
dev.to·59m·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
From Classical Models to AI: Forecasting Humidity for Energy and Water Efficiency in Data Centers
towardsdatascience.com·4h
📈Time Series
Flag this post
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
dev.to·1d·
Discuss: DEV
🔓Hacking
Flag this post
Decoding Autonomy: When AI Learns to Speak for Itself by Arvind Sundararajan
dev.to·10h·
Discuss: DEV
💻Local LLMs
Flag this post
Tech With Tim: Learn Fast API With This ONE Project
dev.to·7h·
Discuss: DEV
🎬WebCodecs API
Flag this post
WebAssembly (WASM) arch support for the Linux kernel
github.com·1d·
Discuss: Hacker News
⚙️WASM Runtime
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·6d
🌐NetworkProtocols
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·2d
🦠Malware Analysis
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.com·3d·
Discuss: Hacker News
🦀Rust Verification
Flag this post
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
dev.to·5d·
Discuss: DEV
🛡Cybersecurity
Flag this post