Making the veb(4) virtual Ethernet bridge VLAN aware
undeadly.org·1d
🌐NetworkProtocols
Flag this post
Thompson’s Reflections on Trusting Trust revisited
irreal.org·3d
🔓Hacking
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.com·5h
🌳Archive Merkle Trees
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.be·2d
🔐Cryptographic Archaeology
Flag this post
How fast can an LLM go?
🎯Emulator Accuracy
Flag this post
Xcode MCP
🛡️CLI Security
Flag this post
Fil-C: A memory-safe C implementation
🧠Separation Logic
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.edu·1d
📟Terminal Forensics
Flag this post
theCUBE Research economic validation of Docker’s development platform
docker.com·5h
🔗Supply Chain
Flag this post
Re: A few comments on ‘age’ (2019)
🔐Archive Encryption
Flag this post
EY 4TB Data Leak
🔓Hacking
Flag this post
Dangerous npm packages are targeting developer credentials on Windows, Linux and Mac - here's what we know
techradar.com·1d
🔓Hacking
Flag this post
FreeBSD Vendor Summit 2025 to convene industry and developers
discoverbsd.com·10h
🐡OpenBSD
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·8h
🎯NTLM Attacks
Flag this post
Loading...Loading more...