Piping In And Out Of Emacs Buffers
irreal.org·4h
🧩Shell Metaprogramming
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·4d
🔐Archive Encryption
Flag this post
IT Security Weekend Catch Up – October 24, 2025
badcyber.com·4d
🔓Hacking
Flag this post
Hacking the WiFi-enabled color screen GitHub Universe conference badge
🔌Single Board PC
Flag this post
Amazon Nova Multimodal Embeddings: State-of-the-art embedding model for agentic RAG and semantic search
🧮Vector Embeddings
Flag this post
PMPP-Eval Journey
🔍Concolic Testing
Flag this post
Kubesafe now shows how many times it saved you from targeting the wrong cluster
📦Container Security
Flag this post
Exclusive: OpenAI’s Atlas browser — and others — can be tricked by manipulated web content
cyberscoop.com·3h
🚀Indie Hacking
Flag this post
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
arxiv.org·16h
🌊Stream Ciphers
Flag this post
Recent Rust Changes
🦀Rust Borrowing
Flag this post
AGI is a Long Ways Off. Anyone who says otherwise is Selling Something
🧠Intelligence Compression
Flag this post
Should you repair permissions?
eclecticlight.co·1d
🔌Operating system internals
Flag this post
DM-VERITY Change For Linux 6.19: "On Some CPUs This Nearly Doubles Hashing Performance"
phoronix.com·10h
🔓Password Cracking
Flag this post
🧩 Building a Powerful Multi-Threaded PDF Downloader with Tkinter and Python
📄PDF Internals
Flag this post
🏢 Enterprise Design Patterns: Building Scalable Systems with Fowler’s Patterns in Go
📦CBOR Extensions
Flag this post
Rust Coreutils 0.3.0: Up to 3.7x Faster Than GNU Tools
heise.de·1d
🦀Rust Macros
Flag this post
Checking Network Vulnerability
🏠Homelab Pentesting
Flag this post
Loading...Loading more...