Cisco Silicon One P200 and Cisco 8223 for 51.2T Scale Across Networking
servethehome.comยท1d
๐Ÿ Homelab Federation
XProc 3 Steps as XSpec Test Helper Functions
medium.comยท1d
๐Ÿ”€XSLT
Cybersecurity Awareness Month - 4 Key Tactics to Prevent Phishing
cofense.comยท4d
๐ŸŽฏThreat Hunting
Peeking Inside Gigantic Zips with Only Kilobytes
ritiksahni.comยท3hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.orgยท3dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.comยท4d
๐ŸŒDistributed Hash
Unlock Your PPC Potential: Buy Verified Google Ads Accounts and Skip the Suspensions
dev.toยท3hยท
Discuss: DEV
๐Ÿ”BitFunnel
Rubygems.org AWS Root Access Event โ€“ September 2025
rubycentral.orgยท2dยท
๐ŸบKerberos Archaeology
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท1d
๐ŸŽซKerberos Attacks
A new information-theory framework reveals when multi-agent AI systems truly work as a team
the-decoder.comยท1d
๐Ÿ”ฒCellular Automata
Bose SoundTouch Smart WiFi Speakers are about to go Dumb
hackaday.comยท11h
๐Ÿ’ฟFLAC Archaeology
Show HN: OpenRun โ€“ Declarative web app deployment
github.comยท21hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Randomized and quantum approximate matrix multiplication
arxiv.orgยท2d
๐Ÿ”Quantum Cryptography
Enhanced Thermoelectric Performance via Nanostructured Bi2Te3-Based Composites and Machine Learning Optimization
dev.toยท17hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
Nicholas Renotte: I Spent 6 Weeks using Reinforcement Learning to Beat This GoDot Game
dev.toยท1dยท
Discuss: DEV
โš”๏ธLean Tactics
Unveiling the Power of Queues: A Journey into Data Structures and Algorithms
dev.toยท3dยท
Discuss: DEV
โšกCache Theory