A Metal Detectorist Found Ancient Roman Coins—Then Hid Them From Authorities for 8 Years
popularmechanics.com·8h
🗝️Paleocryptography
Flag this post
UN member states sign cybercrime agreement despite industry, activist opposition
cybersecuritydive.com·6h
🛡Cybersecurity
Flag this post
Adding a Syslog Server to a netlab Lab Topology
blog.ipspace.net·15h
📊Homelab Monitoring
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.edu·12h
🌐DNS Security
Flag this post
My Core Insights Grafana Dashboard for Kafka Streams
kafkastreamsfieldguide.com·12h·
Discuss: Hacker News
🌊Streaming Systems
Flag this post
Learning osquery
blog.devops.dev·8h
🔌Operating system internals
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·17h
🌐NetworkProtocols
Flag this post
Understanding Type-Based Alias Analysis in C and C++
kdab.com·10h·
Discuss: Hacker News
🔒Type Safety
Flag this post
Hard part about building AI Agents isn't planning it's making them stick to plan
sia.build·2h·
Discuss: Hacker News
Proof Automation
Flag this post
Continuous profiling with Parca: finally seeing which functions burn CPU in prod
reddit.com·10h·
Discuss: r/kubernetes
📊Performance Profiling
Flag this post
Mastering Lock-Free Data Structures in Go: Ring Buffers, Queues, and Performance Optimization
dev.to·22h·
Discuss: DEV
Hardware Transactional Memory
Flag this post
Exploring Spiking Neural Networks for Binary Classification in Multivariate Time Series at the Edge
arxiv.org·17h
🧠Machine Learning
Flag this post
Environment-Dependent Components Identification of Behind-the-Meter Resources via Inverse Optimization
arxiv.org·17h
🧩WASM Components
Flag this post
How AI Search Solves the Problem of Working with Unstructured Data
dev.to·9h·
Discuss: DEV
👤Search Personalization
Flag this post
A new measure for dynamic leakage based on quantitative information flow
arxiv.org·17h
🕳️Information Leakage
Flag this post
Day 16: Mapping Connections with Shared Classmates
dev.to·10h·
Discuss: DEV
🕸️Neo4j
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.co·5d
🛡️eBPF Security
Flag this post
Qilin Targets Windows Hosts With Linux-Based Ransomware
darkreading.com·6h
🎫Kerberos Exploitation
Flag this post