Design of Energy Storage System In Power Grid OT Cyber Range
pixelstech.net·1d
🤖Network Automation
Leopard Lord (1983)
bluerenga.blog·13h
🕹️Retro Gaming
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
garwarner.blogspot.com·6h·
🎫Kerberos Attacks
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·3d
🛡️eBPF Security
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·2d
🎫Kerberos Attacks
X-Copy on the Amiga
spillhistorie.no·1d·
🕹️Game Preservation
My Top 5 Favourite Features in Python 3.14
blog.codingconfessions.com·1d
🦀Rust Macros
My Cognitive Dissonance
studium.dev·4d·
Discuss: Hacker News
🚀Indie Hacking
RTP Video stream with C++ and Raspberry Pi
hackster.io·17h
🎥Streaming Codecs
Ever Need to Recover Stolen Crypto Contact Proficient Expert Consultant
news.ycombinator.com·1d·
Discuss: Hacker News
🚨Incident Response
The Day the CEO of Meta Stopped to Like My Vision
hackernoon.com·1d
🚀Indie Hacking
GPUs, module upgrades and more site fixes
markjgsmith.com·1d
🖥️Terminal Renaissance
Building on vibes: Lessons from three years with LLMs
world.hey.com·3d·
Discuss: Hacker News
🌀Brotli Internals
The Porcelain to Come
stackdiver.com·2d·
Discuss: Hacker News
🔲Cellular Automata
GraphMERT: Efficient and Scalable Distillation of Reliable Knowledge Graphs from Unstructured Data
arxiv.org·4h
🕸️Knowledge Graphs
Syntax highlighting is a waste of an information channel
buttondown.com·7h·
Discuss: Hacker News
🌳Incremental Parsing
Predictive Modeling of Neutron Capture Cross-Sections via Bayesian Kernel Regression
dev.to·6h·
Discuss: DEV
🧲Magnetic Resonance
Built a “code-first + visual” ETL/ELT Pipeline in Go — feedback wanted from data folks
reddit.com·1d·
Discuss: r/golang
💧Liquidhaskell
Conformal Risk Training: End-to-End Optimization of Conformal Risk Control
arxiv.org·4h
🧠Machine Learning