Dot Battle - a Javascript Physics Toy
sheep.horseยท5h
๐Ÿ“ŸTerminal Physics
sopass and cross-device syncing in a password manager
blog.liw.fiยท1d
๐Ÿ”€CRDT
Hacking Claude Code for Fun and Profit
sibylline.devยท8hยท
๐Ÿค–Network Automation
Cuckoo hashing improves SIMD hash tables
reiner.orgยท1dยท
โšกSIMD Optimization
Dimensional Analysis in Programming Languages (2018)
gmpreussner.comยท3hยท
Discuss: Hacker News
๐ŸงฎAlgebraic Datatypes
Hackers exploited Zimbra flaw as zero-day using iCalendar files
bleepingcomputer.comยท4hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Prompting Techniques for Specialised LLMs
dev.toยท6hยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Sampling at Negative Temperature
cavendishlabs.orgยท2hยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.comยท2d
๐Ÿดโ€โ˜ ๏ธPiracy
Sleeping Beauty Problem
en.wikipedia.orgยท12hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
One Year of PostgreSQL Hacking Workshops
rhaas.blogspot.comยท2dยท
๐ŸงฌPostgreSQL Forensics
Four years, Five failures, One compiler
daymare.netยท13hยท
๐Ÿ—๏ธCompiler Archaeology
Dotenvx โ€“ A Secure Dotenv
dotenvx.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
In the Crosshairs: A Deep Dive into the MGM Resorts Cyber Attack - A Masterclass in Social Engineering
dev.toยท11hยท
Discuss: DEV
๐Ÿ”“Hacking
On This Day โ€” Soviet Union Launches SPUTNIK (October 4 1957)
inteltoday.orgยท1d
๐Ÿ‡ท๐Ÿ‡บSoviet Computing
Educators Should Think Like Hackers
kelvinpaschal.comยท6hยท
Discuss: Hacker News
๐Ÿ“šProof Pedagogy
How the German government is going all in on AI
dw.comยท22hยท
Discuss: Hacker News
๐Ÿ‡ฉ๐Ÿ‡ชGerman Computing
Red Stone One Carat โ€” TryHackMe Challenge Write-up
infosecwriteups.comยท1d
๐Ÿ›ก๏ธCLI Security
Mastering Google Dorking: Discovering Website Vulnerabilities
infosecwriteups.comยท15h
๐Ÿ”“Hacking
Why Data Is the New Gold
estimateproperty.blogspot.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains