NetAnalysis® v4.1 – Decrypting Firefox v144
digital-detective.net·1d
🌐WARC Forensics
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·2d
🎯NTLM Attacks
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.net·1d
🕸️Mesh Networking
Flag this post
Problems from the Land down Under
pballew.blogspot.com·2d·
📜Manuscript Calculus
Flag this post
Fuzzy/Non-Binary Graphing
gods.art·23h·
Discuss: Hacker News
📐Mathematical Art
Flag this post
Gambling coin game – math and CS article
joshpearlson.com·15h·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
The Vindication of Bubble Sort
entropicthoughts.com·6h·
🧪Binary Fuzzing
Flag this post
More Than 70% of DNS Root Queries Are Junk
pulse.internetsociety.org·3h·
Discuss: Hacker News
🌐DNS Security
Flag this post
Challenge: An asymmetric key system that does everything
news.ycombinator.com·2d·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models
arxiv.org·9h
🎙️Whisper
Flag this post
Show HN: Base64 Decode – A fast, privacy-first Base64 decoder in the browser
base64decode.site·5d·
📝Text Compression
Flag this post
Weekly Challenge: The one about arrays
dev.to·3d·
Discuss: DEV
📊APL Heritage
Flag this post
Length-extension attacks are still a thing
00f.net·6d·
Checksum Validation
Flag this post
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
dev.to·1d·
Discuss: DEV
🛡Cybersecurity
Flag this post
From Memorization to Reasoning in the Spectrum of Loss Curvature
arxiv.org·9h
🧠Intelligence Compression
Flag this post
Build High-Performance Reverse Proxy and Load Balancer in Golang: Complete Implementation Guide
dev.to·14h·
Discuss: DEV
gRPC
Flag this post
Reasoning Visual Language Model for Chest X-Ray Analysis
arxiv.org·9h
🏺Computational Archaeology
Flag this post
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
arxiv.org·1d
🌊Stream Ciphers
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·2d
🌐NetworkProtocols
Flag this post