The Art of the Command Line
jxself.orgยท18h
๐Ÿ“ŸCLI Design
Flag this post
November 5, 2025
buttondown.comยท1d
๐Ÿ“ฐRSS Archaeology
Flag this post
Beware of double agents: How AI can fortify โ€” or fracture โ€” your cybersecurity
blogs.microsoft.comยท1d
๐Ÿ”Capability Systems
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.orgยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Show HN: TestiWall โ€“ Collect video and text testimonials in minutes
news.ycombinator.comยท8hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.netยท1d
๐ŸบDatabase Archaeology
Flag this post
An open-source conflict has emerged between Google and FFmpeg regarding AI-identified software vulnerabilities
piunikaweb.comยท8hยท
๐Ÿš€Indie Hacking
Flag this post
Superconducting qubit that lasts for over 1 millisecond is primed for industrial scaling
phys.orgยท1dยท
Discuss: Hacker News
โš›๏ธQuantum Tape
Flag this post
The best mesh Wi-Fi systems of 2025
engadget.comยท6h
๐Ÿ•ธ๏ธMesh Networking
Flag this post
SonicWall blames state-sponsored hackers for September security breach
securityaffairs.comยท18h
๐Ÿ›กCybersecurity
Flag this post
Show HN: KeyLeak Detector โ€“ Scan websites for exposed API keys and secrets
github.comยท4dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Flag this post
Why Verified Cash App Accounts Are Important for Secure Transactions
dev.toยท1dยท
Discuss: DEV
โœ…Checksum Validation
Flag this post
The Ultimate Guide to- Buying- Old- Yahoo accounts
dev.toยท10hยท
Discuss: DEV
๐Ÿ”BitFunnel
Flag this post
Digital Preservation Steps at the Science Museum Group & Why (We Want To) Preserve
dpconline.orgยท7h
๐ŸบCompression Museums
Flag this post
Bel Fuse: Margin Expansion And Valuation Compression Make A Strong Buy Case (Rating Upgrade)
seekingalpha.comยท3h
๐Ÿ”BitFunnel
Flag this post
Dynamic Gradient Echo Pulse Sequence Optimization via Reinforcement Learning for Reduced Artifact in 3T MRI
dev.toยท6hยท
Discuss: DEV
๐ŸงฒMagnetic Resonance
Flag this post
How reliable are AI agents?
dev.toยท4hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
Flag this post
Apache OpenOffice says it wasn't hit by cyberattack - despite ransomware hacker claims
techradar.comยท1d
๐Ÿ”“Hacking
Flag this post
EQ-Negotiator: Dynamic Emotional Personas Empower Small Language Models for Edge-Deployable Credit Negotiation
arxiv.orgยท11h
๐ŸงฎSMT Solvers
Flag this post