ToddyCat: your hidden email assistant. Part 1
securelist.comΒ·1d
🎯NTLM Attacks
Flag this post
Data Exfiltration in Claude for Excel
promptarmor.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Flag this post
A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics
arxiv.orgΒ·2d
πŸ”¬Hardware Forensics
Flag this post
Pitch Multiplication (2017)
klangnewmusic.weebly.comΒ·12hΒ·
Discuss: Hacker News
🎼Audio Lambda Calculus
Flag this post
Overfitting vs. Underfitting: Making Sense of the Bias-Variance Trade-Off
towardsdatascience.comΒ·20h
🧠Machine Learning
Flag this post
HugBunter Deleted: Reddit Erases Dread Forum Administrator
sambent.comΒ·1dΒ·
Discuss: Hacker News
πŸ”BitFunnel
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.aiΒ·11hΒ·
Discuss: Hacker News
πŸ“„Text Chunking
Flag this post
A $5 Domain Purchase Exposed Critical AI Agent Security Flaws – Deep Dive
pylar.aiΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Exploitation
Flag this post
Why People Don’t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info
techdirt.comΒ·1d
🧲Magnetic Philosophy
Flag this post
Cross-referencing code and specs for maintainability (2024-03-21)
ueber.netΒ·1dΒ·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
nocomplexity.substack.comΒ·21hΒ·
Discuss: Substack
πŸ”—Dependency Resolution
Flag this post
Remote Control, Done Right: Reviewing the Comet Pro Remote KVM
medium.comΒ·1hΒ·
Discuss: Hacker News
πŸ–₯️Modern Terminals
Flag this post
Structural Inducements for Hallucination in LLMs
researchgate.netΒ·1dΒ·
Discuss: Hacker News
πŸ›Digital humanities
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.comΒ·14hΒ·
Discuss: Hacker News
⬌Bidirectional Typing
Flag this post
For those doing SRE/DevOps at scale - what's your incident investigation workflow?
reddit.comΒ·1dΒ·
Discuss: r/kubernetes
🚨Incident Response
Flag this post
Show HN: Enklayve – Free, Local, Private, and Secure Personal AI
enklayve.comΒ·10hΒ·
Discuss: Hacker News
🏠Homelab Compression
Flag this post
The Loss of Control Playbook: Degrees, Dynamics, and Preparedness
arxiv.orgΒ·2d
πŸ”²Cellular Automata
Flag this post
Recent 7-Zip Vulnerability Exploited in Attacks
securityweek.comΒ·2dΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Flag this post
Understanding LLMs as Pattern Machines, Not Thinking Partners
practicalsecurity.substack.comΒ·23hΒ·
Discuss: Substack
πŸ’»Programming languages
Flag this post
Fair Screen – Detect Cluely/Interview Coder Kind of Interview Cheating Tools
fairscreen.coΒ·8hΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Programs
Flag this post