1 little known secret of cliconfg.exe
hexacorn.com·1d
🕹Emulation
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·5d
🦠Parasitic Storage
Flag this post
Detecting XZ in Debian with Otto Kekäläinen
opensourcesecurity.io·2d
❄️Nixpkgs
Flag this post
How preppers plan to save us if the whole internet collapses
newscientist.com·16h
📻Homebrew Protocols
Flag this post
Show HN: ChatGPT for Forms
🎙️Whisper
Flag this post
Time to move on: n8n vs code for SaaS
🌐Web Standards
Flag this post
Federal Agencies May Move to Ban These Popular Wifi Routers
lifehacker.com·1d
📡Network Monitoring
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.net·10h
🏺Database Archaeology
Flag this post
Smaller Surfaces
📏Code Metrics
Flag this post
Kong Adds MCP Support to Tool for Designing and Testing APIs
devops.com·18h
🤖Network Automation
Flag this post
Code execution with MCP: Building more efficient agents
simonwillison.net·8h
⚡Proof Automation
Flag this post
Automated Anomaly Detection and Predictive Maintenance in Self-Propelled Brush Rollers Using Bayesian Network Fusion
🌊Stream Processing
Flag this post
Coherent: Quality Comes At A Price, But AI Tailwinds Could Push It Higher
seekingalpha.com·20h
🗜️LZW Variants
Flag this post
STACKFEED: Structured Textual Actor-Critic Knowledge Base Editing with FeedBack
arxiv.org·1d
📋Document Grammar
Flag this post
Loading...Loading more...