Working with Digital Archives: The William S. Burroughs Project
fsuspecialcollections.wordpress.comยท1h
๐Document Paleography
Flag this post
Weekly Update 475
troyhunt.comยท3d
๐Hacking
Flag this post
Caddy snippets for static sites
willnorris.comยท59m
๐Interface Evolution
Flag this post
How did the Windows 95 user interface code get brought to the Windows NT code base?
๐ฎSwitch Archaeology
Flag this post
What Is FedCM?
๐ฏNTLM Attacks
Flag this post
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
๐ง
Tor Networks
Flag this post
Speedrunning an RL Environment
โ๏ธLean Tactics
Flag this post
Web 4.0
๐Web Standards
Flag this post
"The Bug Hunt" blog post pattern
๐ฆRusty Databases
Flag this post
Building Better Software: Why Workflows Beat Code Every Time โข Ben Smith & James Beswick โข GOTO 2025
youtube.comยท2d
๐Reproducible Builds
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.comยท2d
๐ฏNTLM Attacks
Flag this post
Signalโs Post-Quantum Cryptographic Implementation
schneier.comยท8h
๐Quantum Security
Flag this post
**Automated Wear Debris Analysis & Predictive Maintenance via Acoustic Fingerprinting and Machine Learning**
๐ตAcoustic Fingerprinting
Flag this post
Your AI Agent Just Sent an Invoice (ERC-8004 + x402 in 5 Minutes)
๐ณArchive Merkle Trees
Flag this post
OpenReward: Learning to Reward Long-form Agentic Tasks via Reinforcement Learning
arxiv.orgยท16h
๐Information Retrieval
Flag this post
Agentic AI and Security
๐ปLocal LLMs
Flag this post
Mem3nt0 mori โ The Hacking Team is back!
securelist.comยท2d
๐ซKerberos Exploitation
Flag this post
Loading...Loading more...