Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.orgยท10h
๐Ÿ”งHardware Verification
How to find Smartbedded Meteobridge devices on your network
runzero.comยท14h
๐Ÿ›ก๏ธeBPF Security
SSH keys in TPM
blog.dan.drown.orgยท9h
๐Ÿ”’Hardware Attestation
SysLinuxOS: The Go-To Linux for System Administrators
thenewstack.ioยท1d
๐Ÿ”ŒOperating system internals
My First Contribution to Linux
vkoskiv.comยท1hยท
๐Ÿ“บVT100 Emulation
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.comยท1d
๐Ÿ”eBPF
Obelisk 0.25.4 and handling of WASM traps
obeli.skยท1hยท
Discuss: Hacker News
๐ŸšShell Monads
Three important things to get right for successful AI Coding
kau.shยท21h
โšกProof Automation
Infinite Footguns: Writing a JavaScript Interpreter in JavaScript
scour.ingยท1d
โšกProof Automation
Are Software Registries Inherently Insecure?
developers.slashdot.orgยท12h
๐Ÿ“ฆContainer Security
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.eduยท10h
๐ŸŽซKerberos Exploitation
New script: AWS China MFA login
perrotta.devยท2d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Show HN: Is-Kit โ€“ Lightweight TypeScript Guard and Validator Toolkit
github.comยท1dยท
Discuss: Hacker News
โšกDependent Rust
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.comยท16hยท
Discuss: r/linux
๐Ÿ”’Secure Boot
WASM in the Kernel: Tales of Triumph and Trouble
riptides.ioยท26mยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
6th October โ€“ Threat Intelligence Report
research.checkpoint.comยท4h
๐Ÿ›กCybersecurity
Koske miner โ€“ Panda images and malware generated by AI
baco.skยท22hยท
Discuss: Hacker News
๐Ÿ”—Binary Similarity
Design Principle: Composable Services
sleepingpotato.comยท54mยท
Discuss: Hacker News
โšกgRPC
Building a Command-Line Quiz Application in R
towardsdatascience.comยท1d
๐ŸšShell Calculus
Dave's Paper Notes: A Tutorial for the Sam Command Language
ratfactor.comยท5d
๐Ÿ“Shell Parsing