They're in…now what? How to stop lateral movement when the phish bites
runzero.com·11h
🎫Kerberos Attacks
One file that can change the world (not clickbait)
master255.medium.com·5h·
Discuss: Hacker News
🌊BitTorrent
Round Robin vs Least Connection vs IP Hash? Which Load Balancing Algorithm Wins?
javarevisited.substack.com·1d·
📡Network Calculus
Data Management for Collaborations
dataabinitio.com·11h
📦METS Containers
How Nepal’s Gen Z Uprising Made the Case for a Decentralized Internet
hackernoon.com·1d
🖥️Self-hosted Infrastructure
Achieving 1.2 TB/s Aggregate Bandwidth by Optimizing Distributed Cache Network
juicefs.com·1d·
Discuss: Hacker News
📡Network Stack
Stalwart Labs
stalw.art·18h
Archive Fixity
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.to·6h·
Discuss: DEV
🌐NetworkProtocols
Fitting It All in Your Head
systemsapproach.org·19h
📡BGP Archaeology
A Global Mining Dataset
tech.marksblogg.com·16h·
Discuss: Hacker News
📦METS Containers
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
Toy Binary Decision Diagrams
philipzucker.com·1d
🧮Algebraic Datatypes
Keeping emergency services connected when it matters most through link bonding
techradar.com·18h
🕸️Mesh Networking
Medium Android App — Migrating from Apollo Kotlin 3 to 4: Lessons Learned
medium.engineering·18h
🏎️Varnish Cache
Public Key Infrastructure with Secure Shell
free-pmx.org·2d·
Discuss: r/homelab
🎯NTLM Attacks
A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.com·4d
🤝Consensus Algorithms
Analysing the state of Happy Eyeballs implementations
blog.apnic.net·2h
🔌Interface Evolution
Creating an AI-Ready Network with Hub and Spoke WAN
blog.telegeography.com·15h
🕸️Mesh Networks
Valuable News – 2025/10/06
vermaden.wordpress.com·23h
🔌Operating system internals