How to Hack a Poker Game
wired.comยท2d
๐ผCassette Hacking
Flag this post
Never Use Text Pixelation To Redact Sensitive Information | Bishop Fox
bishopfox.comยท18h
๐งชArchive Fuzzing
Flag this post
Text rendering and effects using GPU-computed distances
blog.pkh.meยท1d
๐Mathematical Art
Flag this post
Things you can do with diodes
โ๏ธDIY Electronics
Flag this post
Impedance and Trianglular Numbers
๐Mathematical Art
Flag this post
Java Generics and Collections โข Maurice Naftalin & Stuart Marks โข GOTO 2025
youtube.comยท3d
ฮปLambda Formalization
Flag this post
This week in 1969, the internet was born, and immediately glitched โ only two of the five letters in the first computer-to-computer message were received
๐กNetwork Archaeology
Flag this post
Day 22: Python Even-Odd Counter โ Count Even and Odd Integers in a List with Type Checks
๐งฎAlgebraic Datatypes
Flag this post
How AI is Actually Changing Cybersecurity (And Why I'm Paying Attention)
๐ฏThreat Hunting
Flag this post
Scalable In-Memory Associative Processing for Graph Neural Network Inference
๐ฅ๏ธHardware Architecture
Flag this post
Minecraft HDL, an HDL for Redstone
โกHomebrew CPUs
Flag this post
Show HN: Mach, a new systems language that focuses on being simple and explicit
๐ง Lisp Dialects
Flag this post
Async/Await is finally back in Zig
๐Stream Processing
Flag this post
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
arxiv.orgยท5d
๐Cryptographic Archaeology
Flag this post
Central Submonads and Notions of Computation: Soundness, Completeness and Internal Languages
arxiv.orgยท2d
๐งฎAlgebraic Archives
Flag this post
Linkage
11011110.github.ioยท1d
๐Mathematical Art
Flag this post
Loading...Loading more...