A Metal Detectorist Found Ancient Roman Coins—Then Hid Them From Authorities for 8 Years
popularmechanics.com·5h
🗝️Paleocryptography
Flag this post
UN member states sign cybercrime agreement despite industry, activist opposition
cybersecuritydive.com·3h
🛡Cybersecurity
Flag this post
Adding a Syslog Server to a netlab Lab Topology
blog.ipspace.net·12h
📊Homelab Monitoring
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.edu·9h
🌐DNS Security
Flag this post
What Is a Patent Invalidity Search: A Complete Guide for IP Professionals
✅Archive Validation
Flag this post
Collins Aerospace: Old Passwords and Delayed Response Enable Data Theft
heise.de·23h
🔓Hacking
Flag this post
Enhanced Microbial Diagnostics via Hyperdimensional Microbial Signature Analysis for Endocarditis
🌀Hyperbolic Geometry
Flag this post
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated
🧪Protocol Fuzzing
Flag this post
Paper2Web: Let's Make Your Paper Alive
📄PostScript
Flag this post
Which tech company launched the world's first bug bounty program?
techspot.com·3h
🚀Indie Hacking
Flag this post
Learning osquery
blog.devops.dev·5h
🔌Operating system internals
Flag this post
Quality of Coverage (QoC): A New Paradigm for Quantifying Cellular Network Coverage Quality, Usability and Stability
arxiv.org·14h
🕸️Network Topology
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·14h
🌐NetworkProtocols
Flag this post
Continuous profiling with Parca: finally seeing which functions burn CPU in prod
📊Performance Profiling
Flag this post
New to homelab - Just got Pi Hole running as my first project, and would like to dig a bit deeper into my outbound data
📡Network Monitoring
Flag this post
Loading...Loading more...