Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Can You Box the Letters?
thefiddler.substack.com·13h·
Discuss: Substack
🔲Cellular Automata
Novel smartphone scam targeting elderly emerges in Osaka
japantimes.co.jp·1d
🎫Kerberos Attacks
Gauss, an Agent for Autoformalization
math.inc·1d·
🏛️Agda
The 100MHz 6502
e-basteln.de·1d·
Discuss: Hacker News
Homebrew CPUs
The $275,000 job that broke Adam Wathan
world.hey.com·23h·
Discuss: Hacker News
🚀Indie Hacking
Virgin Games Bingo Welcome Offer: Play £10 Get £50
the-independent.com·1d
🎫Kerberos Attacks
Accelerated Game of Life with CUDA / Triton
boristhebrave.com·1d·
Discuss: Hacker News
🖥️Terminal Renaissance
Apple’s latest iPhone security feature just made life more difficult for spyware makers
techcrunch.com·1d·
Discuss: Hacker News
🔓Hacking
Uber in US court for refusing disabled passengers
heise.de·15h
Tactile Computing
DDD Studies: Between Fishermen and Developers Reflections on my initial studies in Domain-Driven Design
blog.codeminer42.com·2d
🔢Denotational Semantics
Building a Recipe Scraping Tool in Python: What I learned
dev.to·23h·
Discuss: DEV
📡RSS Automation
Prongs rock
theverge.com·15h
🏺Gaming Archaeology
**Master Python Memory Management: 8 Essential Optimization Techniques for Performance**
dev.to·3d·
Discuss: DEV
🧠Memory Allocators
Vibe Coding Best Practices
dev.to·2d·
Discuss: DEV
Proof Automation
Introducing MindsDB’s Integration with Gong: AI Analytics on Call Data
dev.to·1d·
Discuss: DEV
🌊Streaming Databases
Tell-Tale Watermarks for Explanatory Reasoning in Synthetic Media Forensics
arxiv.org·3d
🔍Vector Forensics
Open-Sourcing Starlark Worker: Define Cadence Workflows with Starlark
uber.com·1d·
Discuss: Hacker News
🌊Stream Processing
Chinese espionage campaign targeted House staffers ahead of trade talks
metacurity.com·4d
🔓Hacking
How to Avoid Becoming Dependent on One Model
dev.to·18h·
Discuss: DEV
Incremental Computation