A new home for Tor user documentation
blog.torproject.org·21h
🧅Tor Networks
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com·6h
🎫Kerberos Attacks
Flag this post
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
rapid7.com·8h
🎯Threat Hunting
Flag this post
How did we cope? (an ode to 8-bits)
aardvark.co.nz·1d
🕹️Retro Gaming
Flag this post
My First Rust Project
binwang.me·1d
🦀Rust Macros
Flag this post
pgbackrest/pgbackrest
github.com·4d
🗄️PostgreSQL WAL
Flag this post
The seven second kernel compile
💾Memory Mapping
Flag this post
Show HN: nblm - Rust CLI/Python SDK for NotebookLM Enterprise automation
🕸️WASM Archives
Flag this post
More Than a Warm-Up: Start KubeCon With a Colocated Event
thenewstack.io·1d
🏠Homelab Orchestration
Flag this post
Comparing Disciplinary Classifications in SSH: Organizational, Channel-Based, and Text-Based Perspectives
arxiv.org·17h
📚Digital Humanities
Flag this post
Recent Rust Changes
🦀Rust Borrowing
Flag this post
Part 1: Training a Neural Network to Detect Coffee First Crack from Audio - An Agentic Development Journey with Warp
🔍FLAC Forensics
Flag this post
Where to go next?
💾Proxmox Storage
Flag this post
Helicase-mediated mechanism of SSU processome maturation and disassembly
nature.com·4h
🧬Copy Number Variants
Flag this post
Loading...Loading more...