The Art of the Command Line
jxself.orgยท18h
๐CLI Design
Flag this post
November 5, 2025
buttondown.comยท1d
๐ฐRSS Archaeology
Flag this post
Beware of double agents: How AI can fortify โ or fracture โ your cybersecurity
blogs.microsoft.comยท1d
๐Capability Systems
Flag this post
Show HN: TestiWall โ Collect video and text testimonials in minutes
๐Indie Hacking
Flag this post
New Samsung Galaxy S26 Ultra leaks point to a tiny camera improvement and a โmajor upgradeโ to charging
techradar.comยท6h
๐ฅStreaming Codecs
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.netยท1d
๐บDatabase Archaeology
Flag this post
An open-source conflict has emerged between Google and FFmpeg regarding AI-identified software vulnerabilities
๐Indie Hacking
Flag this post
Superconducting qubit that lasts for over 1 millisecond is primed for industrial scaling
โ๏ธQuantum Tape
Flag this post
The best mesh Wi-Fi systems of 2025
engadget.comยท6h
๐ธ๏ธMesh Networking
Flag this post
SonicWall blames state-sponsored hackers for September security breach
securityaffairs.comยท18h
๐กCybersecurity
Flag this post
Show HN: KeyLeak Detector โ Scan websites for exposed API keys and secrets
๐ฆ Malware Analysis
Flag this post
Why Verified Cash App Accounts Are Important for Secure Transactions
โ
Checksum Validation
Flag this post
Digital Preservation Steps at the Science Museum Group & Why (We Want To) Preserve
dpconline.orgยท7h
๐บCompression Museums
Flag this post
Bel Fuse: Margin Expansion And Valuation Compression Make A Strong Buy Case (Rating Upgrade)
seekingalpha.comยท3h
๐BitFunnel
Flag this post
Dynamic Gradient Echo Pulse Sequence Optimization via Reinforcement Learning for Reduced Artifact in 3T MRI
๐งฒMagnetic Resonance
Flag this post
How reliable are AI agents?
๐พPersistence Strategies
Flag this post
Apache OpenOffice says it wasn't hit by cyberattack - despite ransomware hacker claims
techradar.comยท1d
๐Hacking
Flag this post
Loading...Loading more...