Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

CEFS: Finally Solving CE's Mount(ing) Problems
xania.org·2d
🔗Archive Combinators
If my kids excel, will they move away?
jeffreybigham.com·1h·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Voice Sims: test agents in real world conditions before they talk to your custom
sierra.ai·2d·
Discuss: Hacker News
🎙️Whisper
Keeping the Dream Alive: The Power and Promise of Federally Funded Research
cacm.acm.org·2d
Time Capsule Networks
GSoC 2025 - Byte Type: Supporting Raw Data Copies in the LLVM IR
blog.llvm.org·6d·
🔒Type Safety
Powering Crypto Workloads with Sub-100ms Latency
risingwave.com·2d·
Discuss: Hacker News
🌊Stream Processing
US charges suspected ransomware kingpin, and offers $10 million bounty for his capture
fortra.com·3d
🎫Kerberos Exploitation
Building an ARM64 home server the hard way
jforberg.se·2d·
Discuss: Hacker News
🔌Operating system internals
Adding OR logic forced us to confront why users preferred raw SQL
signoz.io·3d·
Discuss: Hacker News
⛏️SQL Archaeology
I don’t want AI agents controlling my laptop
sophiebits.com·5d·
🔐Capability Systems
UC Berkeley shares names of students, staff with feds amid antisemitism investigation
mercurynews.com·1d
📟Terminal Forensics
Norton VPN promises to be much faster thanks to a feature many VPNs don't offer
techradar.com·2d
🖥️Modern Terminals
How to avoid seeing disturbing content on social media and protect your peace of mind
theconversation.com·1d·
Discuss: Hacker News
🎛️Feed Filtering
Dashboard anxiety plagues IT pros' nights, weekends, vacations
theregister.com·2d
💾Persistence Strategies
Ban&Pick: Achieving Free Performance Gains and Inference Speedup via Smarter Routing in MoE-LLMs
arxiv.org·4d
💻Local LLMs
Why AI Voice Bot Development Solutions Are Becoming Essential for Businesses Adapting to Hybrid Work Models
dev.to·14h·
Discuss: DEV
🎙️Whisper
Quectel KCMCA6S industrial wM-bus modules target smart metering
cnx-software.com·3d
🦾ARM Cortex-M
Dicio: Open-Source Voice Assistant for Android
github.com·2d·
Discuss: Hacker News
🔗Concatenative Programming
New Android RAT uses Near Field Communication to automatically steal money from devices
techradar.com·3d
🕵️Vector Smuggling