Night train in the wrong direction
back-on-track.euยท1d
โš™๏ธNordic Assembly
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท1d
๐Ÿ›กCybersecurity
Best infosec-related long reads for the week of 10/4/25
metacurity.comยท5h
๐Ÿ›กCybersecurity
Nov 15 2025 : Intro to Soldering Workshop: Make an LED Tile
nycresistor.comยท15h
โš™๏ธDIY Electronics
InfoSec News Nuggets 10/10/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Codeminer42 Dev Weekly #82
blog.codeminer42.comยท23h
๐ŸŽฏGradual Typing
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.orgยท19h
๐Ÿ”“Hacking
The Health Effects of Electromagnetic Radiation
huijzer.xyzยท6hยท
๐Ÿ“„PostScript
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท1d
๐Ÿ“Compression Bounds
The B2B Sales Funnel as a State Machine: An Engineer's Guide to Revenue Growth
dev.toยท6hยท
Discuss: DEV
๐Ÿฆ‹Format Metamorphosis
Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กAudio Modulation
Seeking Elite n8n Experts for Project-Based Workflow Builds
dev.toยท2dยท
Discuss: DEV
๐Ÿ”„Archival Workflows
Wireshark 4.6: New functions for encrypted data
heise.deยท1d
๐Ÿ•ต๏ธNetwork Forensics
Scholarship, Hackathons, and Swahili Words: Wikimania 2025 Through My Eyes
diff.wikimedia.orgยท1d
๐ŸŒCultural Algorithms
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Programmer in Wonderland
binaryigor.comยท2dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Inconsistent Affective Reaction: Sentiment of Perception and Opinion in Urban Environments
arxiv.orgยท1d
๐ŸŽ›๏ธFeed Filtering
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท1d
๐Ÿ“ปHomebrew Protocols