Data Integrity, Silent Corruption Detection, Pool Verification, Checksum Validation

Face Recognition Door Lock with Smartphone Notification
hackster.io·16h
🔌Single Board PC
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.com·2d
🎫Kerberos Exploitation
The Air Gap Is an Illusion: Securing AI Data Centers from Wireless Threats
bastille.net·5d
🎫Kerberos History
Patch vs. Workaround: How CVEs Actually Get Fixed
bitsight.com·2d
🔓Hacking
Mars Perseverance rover data suggests presence of past microbial life
phys.org·1h
📼Cassette Archaeology
The Data Backbone of LLM Systems
infoq.com·3d·
Discuss: Lobsters
🔗Constraint Handling
tinyproxy/tinyproxy
github.com·1d
❄️Nixpkgs
I've been reading Ghostty's agent-generated bug fixes
ampcode.com·1d·
Discuss: Hacker News
Bidirectional Programming
humanely dealing with humungus crawlers
flak.tedunangst.com·4d·
🐧FOSS
Motorola, Intel, IBM Make a Mainframe in a PC – The PC XT/370
thechipletter.substack.com·3h·
Discuss: Substack
🖥️Vintage Macintosh
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.org·3d·
📦Package Managers
Elastic Metal: From Game Servers to Global Infrastructure
blog.hathora.dev·3d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
62 Patches Posted For Stripping Classic Initrd Support From The Linux Kernel
phoronix.com·1d
🔌Operating system internals
Frankenstein Variant of the ToneShell Backdoor Targeting Myanmar
intezer.com·3d
🔓Hacking
HTB Titanic Walkthrough
infosecwriteups.com·2d
🛡️CLI Security
💼 How DevOps Transforms Your Business into a War Machine
dev.to·1d·
Discuss: DEV
❄️Nix Adoption
Automated Predictive Biomarker Discovery via Multi-Modal Integration and HyperScore Validation
dev.to·1d·
Discuss: DEV
🧠Machine Learning
I stumbled upon Hack Zack Tech through a well-regarded tech blog I frequently read.
dev.to·2d·
Discuss: DEV
🔓Hacking
Redditor fishes a fully-functional Core i5-9400F and GTX 1660 PC gaming rig out of the trash
tomshardware.com·1d
🕹️Retro Gaming