APNIC / FIRST Security 2 at APNIC 60
blog.apnic.netΒ·1d
🌐Network Security
Compositional Interface Refinement Through Subtyping in Probabilistic Session Types
arxiv.orgΒ·1d
πŸ“žSession Types
How is my network topology?
i.redd.itΒ·9hΒ·
Discuss: r/homelab
πŸ•ΈοΈNetwork Topology
Elephantshark, a tool to monitor Postgres network traffic
github.comΒ·12hΒ·
Discuss: Hacker News
🧬PostgreSQL Forensics
GRNET establishes new Software Heritage mirror
softwareheritage.orgΒ·16h
🌐Edge Preservation
Artificial Intelligence in Networking Research in the Arab World
cacm.acm.orgΒ·2d
πŸ•ΈοΈMesh Networking
The Things Conference 2025: A Decade of Growth and a Shift Toward Diversity in IoT
disk91.comΒ·9h
🏠Home Automation
Indie Web Before Web3: Owning Your Domain Since 2001
brajeshwar.comΒ·2h
πŸ“‘DNS Archaeology
Fastly’s Pillars of Resilience: Building a More Robust Internet
fastly.comΒ·1d
πŸ•ΈοΈMesh Networks
China exports Great Firewall surveillance systems
protonvpn.comΒ·12h
πŸ‡¨πŸ‡³Chinese Computing
**Advanced Python Logging and Observability: Build Production-Ready Monitoring Systems**
dev.toΒ·16hΒ·
Discuss: DEV
πŸ“Log Parsing
Wireless Threats at the UN: What the Secret Service Raids Reveal
bastille.netΒ·9h
πŸ•ΈοΈMesh Networking
Consistent Hashing Explained: The Algorithm That Powers Modern Internet
javarevisited.substack.comΒ·13hΒ·
🀝Distributed Consensus
You’ve probably lost sight of your network – here’s why
techradar.comΒ·16h
🏠Homelab Security
Bookworm to Stately Taurus Using the Unit 42 Attribution Framework
unit42.paloaltonetworks.comΒ·5hΒ·
Discuss: r/SecOpsDaily
🦠Malware Analysis
A history of the Internet, part 3: The rise of the user
arstechnica.comΒ·2dΒ·
Discuss: Hacker News
πŸ“‘DNS Archaeology
Traefik's 10-Year Journey from Zero to Standard
traefik.ioΒ·18hΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Multi-Homed DDoS Protection: Strategies for Service Providers and Enterprises
corero.comΒ·11h
🏠Homelab Security
How We Cut Telemetry Queries to Under 10 Milliseconds
thenewstack.ioΒ·2d
🌊Stream Processing
Accelerating adoption of AI for cybersecurity at DEF CON 33
security.googleblog.comΒ·8hΒ·
πŸ›‘Cybersecurity