An enough week
blog.mitrichev.chΒ·1dΒ·
πŸ“ˆLinear programming
Qt for MedTech Pre- and Post-Market Surveillance
qt.ioΒ·1d
πŸ“ŠHomelab Monitoring
Product comparison: Detectify vs. Tenable
blog.detectify.comΒ·1d
🎯Threat Hunting
How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape
circleid.comΒ·1d
πŸ“‘DNS Archaeology
Error'd: Yes We Have No Bananas
thedailywtf.comΒ·1d
πŸ”“Hacking
How to Save the World with ZFS and 12 USB Sticks: 4th Anniversary Video (2011)
constantin.glez.deΒ·11hΒ·
Discuss: Hacker News
πŸ’ΏZFS Archaeology
Phones as a Fortress: 4th Amendment Castle Doctrine for the "Digital Home"
computerweekly.comΒ·15hΒ·
Discuss: Hacker News
🧲Magnetic Philosophy
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioΒ·1dΒ·
Discuss: Hacker News
πŸ”Capability Systems
How to tame a user interface using a spreadsheet
blog.gingerbeardman.comΒ·8hΒ·
Discuss: Hacker News
πŸ“ŸTerminal Physics
We can just do things together
leaflet.pubΒ·10hΒ·
Discuss: Hacker News
πŸ“‘BGP Archaeology
A major evolution of Apple Security Bounty
security.apple.comΒ·22hΒ·
πŸ›‘οΈRISC-V Security
Streamlining Operations: The Role of AI-Powered Automation in Modern Enterprises
dev.toΒ·1hΒ·
Discuss: DEV
🌊Stream Processing
The Scarcity and Pressure to Make Decisions and Placing Guilt in the Users Lap
toddl.devΒ·1dΒ·
Discuss: Hacker News
🌍Cultural Algorithms
People rescuing forgotten knowledge trapped on old floppy disks
bbc.comΒ·19hΒ·
πŸ“ΌCassette Archaeology
Quantifying AI Coverage on Hacker News
beuke.orgΒ·1dΒ·
Discuss: Hacker News
🧠Intelligence Compression
Computer Tycoon
store.steampowered.comΒ·3dΒ·
Discuss: Hacker News
πŸ•ΉοΈRetro Gaming
Autonomous AI Hacking and the Future of Cybersecurity
schneier.comΒ·21hΒ·
Discuss: Hacker News
🎯Threat Hunting
Title: Harnessing Nuclear Energy for Bitcoin Mining: A French Parliamentary Proposal
dev.toΒ·8hΒ·
Discuss: DEV
🌐WARC Mining
A new breed of analyzers
daniel.haxx.seΒ·20hΒ·
πŸ›Fuzzing