Notes on strategy and audience as a media business
baldurbjarnason.comยท1d
๐ฐFeed Readers
Flag this post
Ejabberd 25.10 / ProcessOne โ Erlang Jabber/XMPP/Matrix Server โ Communication
๐ฆDeflate
Flag this post
GMDSOFT Tech Letter Vol 15. Analyzing Anti-Forensic Traces Left By Location Spoofing Apps
forensicfocus.comยท1d
๐ง Memory Forensics
Flag this post
๐ข๐ณ ๐ช๐ฎ๐๐ ๐๐ผ ๐๐ป๐ต๐ฎ๐ป๐ฐ๐ฒ ๐ฌ๐ผ๐๐ฟ ๐๐ถ๐ด๐ถ๐๐ฎ๐น ๐ฃ๐ฟ๐ฒ๐๐ฒ๐ป๐ฐ๐ฒ ๐ง๐ต๐ฟ๐ผ๐๐ด๐ต ๐๐๐๐๐ผ๐บ ๐ฆ๐ผ๐ณ๐๐๐ฎ๐ฟ๐ฒ
๐Open Source Software
Flag this post
Debugging Like a Pro: Direct Network Access to Containers in Kubernetes with VeilNet
๐ฆContainer Security
Flag this post
SQL Injection Leads to dump the Student PII
infosecwriteups.comยท1d
๐๏ธDatabase Forensics
Flag this post
Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know
rapid7.comยท1d
๐ต๏ธPenetration Testing
Flag this post
Robust GNN Watermarking via Implicit Perception of Topological Invariants
arxiv.orgยท1d
๐ณ๏ธPersistent Homology
Flag this post
The age verification effect: adult site traffic plummets, VPN use soars
techradar.comยท18h
๐คEBCDIC Privacy
Flag this post
Nextcloud PAM authentication
๐ฏNTLM Attacks
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.comยท1d
๐งRISC-V Assembler
Flag this post
ProstNFound+: A Prospective Study using Medical Foundation Models for Prostate Cancer Detection
arxiv.orgยท1d
๐๏ธOCR Enhancement
Flag this post
Monitoring Software Checkmk: Update Closes Critical Cross-Site Scripting gap
heise.deยท1d
๐Hacking
Flag this post
Show HN: AI Resource Manager
๐ฆPackage Managers
Flag this post
Loading...Loading more...