Package Derivations, Overlay System, Flakes, Build Isolation

Site Unseen: Enumerating and Attacking Active Directory Sites
synacktiv.com·1d
🏢Active Directory
Flag this post
“Backalog”
rubenerd.com·1h
🏠Personal Archives
Flag this post
Going Public – Part One
buildingslack.com·3h
🗜️Zstandardized Archives
Flag this post
Ambient CI, progress this year
blog.liw.fi·4d
🧱Immutable Infrastructure
Flag this post
Discrete Fourier Transform: Introduction (2020)
chciken.com·7h·
Discuss: Hacker News
📐Linear Algebra
Flag this post
Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.me·1d·
Discuss: Hacker News
Checksum Validation
Flag this post
The psychological cost of having an RSS feed
refp.se·1d·
Discuss: Hacker News
📰RSS Feed Discovery
Flag this post
original ↗
jamesoclaire.com·23h·
Discuss: Hacker News
🏠Personal Archives
Flag this post
From Signals to Reliability: SLOs, Runbooks and Post-Mortems
fatihkoc.net·3d·
👁️Observatory Systems
Flag this post
Four Reasons You Should Upgrade to Smart Power Tools
lifehacker.com·5h
🏠Home Automation
Flag this post
Scaling up Prime Video monitoring service reduced costs 90% (archive) (2023)
web.archive.org·3d·
Discuss: Hacker News
👁️Observatory Systems
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.com·21h
🔓Password Cracking
Flag this post
How to get the GOT address from a PLT stub using GDB
rafaelbeirigo.github.io·4d·
Discuss: Hacker News
⚙️PL Implementation
Flag this post
You may not need pg_vector, sqlite-vss, etc.
dev.to·21h·
Discuss: DEV
🗂️Vector Databases
Flag this post
The best mesh Wi-Fi systems of 2025
engadget.com·13h
🕸️Mesh Networking
Flag this post
EQ-Negotiator: Dynamic Emotional Personas Empower Small Language Models for Edge-Deployable Credit Negotiation
arxiv.org·18h
🧮SMT Solvers
Flag this post
LazyLLM, Easiest and laziest way for building multi-agent LLMs applications
github.com·23h·
Discuss: Hacker News
🎙️Whisper
Flag this post
Principal Dev's Take On Vibe-Coding
dev.to·21h·
Discuss: DEV
📏Code Metrics
Flag this post
🚀 Meet Telelinker: A CLI Tool to Extract and Analyze Links from Telegram Groups
dev.to·20h·
Discuss: DEV
📡RSS Readers
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.org·18h
🎯Threat Hunting
Flag this post