[Guest post] The Birkenstock saga continues: Dutch court acknowledges copyright protection in sandal designs
βοΈNordic Design Philosophy
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comΒ·3d
πOSINT Techniques
Flag this post
Actually using ed | Arabesque
blog.sanctum.geek.nzΒ·21h
πΊVT100
Flag this post
NEWS ROUNDUP β 21st November 2025
digitalforensicsmagazine.comΒ·2d
π¨Incident Response
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.orgΒ·2d
π€Advanced OCR
Flag this post
Internet Archive Hits One Trillion Web Pages
hackaday.comΒ·5d
πΎData Preservation
Flag this post
Show HN: Snipets β A browser extension to remember what I read online
πHypermedia APIs
Flag this post
Rep+: A Lightweight Alternative to Burp Suite for Quick Browser Testing
πIndie Hacking
Flag this post
Simple HTTPS Records (2022)
πDNS Security
Flag this post
Show HN: Sliprail β A cross-platform launcher with AI and extensions
πPassword Cracking
Flag this post
LightRAG Tutorial: A Practical Guide to Knowledge Graph-Based RAG
πΈοΈKnowledge Graphs
Flag this post
Loading...Loading more...