Windows Defender
forums.anandtech.com·4d
🛡️eBPF Security
22.00.0132 Personal and work systems: how do they interact?
johnnydecimal.com·15h
🏠Personal Archives
Shepherd × Goblins update
spritely.institute·2d
Effect Handlers
Trusting builds with Bazel remote execution
blogsystem5.substack.com·1h·
Discuss: Substack
🛡️WebAssembly Security
We’re In the Windows 95 Era of AI Agent Security
secondthoughts.ai·1d
🔓Hacking
The Treasury Is Expanding the Patriot Act to Attack Bitcoin Self Custody
tftc.io·4h·
Discuss: Hacker News
🎫Kerberos Attacks
SaaS Ethics Manifesto
mdubakov.me·3h·
Discuss: Hacker News
🏠Personal Archives
Angular with Jessica Janiuk
softwareengineeringdaily.com·1d
🔩Systems Programming
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
huntress.com·3d·
Discuss: Hacker News
🎯Threat Hunting
I built my own CDN with Varnish and Nginx
polso.info·1d·
Discuss: Hacker News
🏎️Varnish Cache
Automated Life Support System Analysis: Predicting & Mitigating Physiological Drift
dev.to·1d·
Discuss: DEV
🛡️Error Boundaries
Enhanced Real-time Cardiac Mapping via Adaptive Wavelet Decomposition and Bayesian Inference
dev.to·1d·
Discuss: DEV
🌊Digital Signal Processing
FEPI ETF Explained: Balancing Big Tech Exposure, Covered Calls & Risks
seekingalpha.com·5h
🔍BitFunnel
Dispelling Myths of Open Source Complexity With Apache Iceberg
thenewstack.io·1d
🔌Interface Evolution
AuraSight: Generating Realistic Social Media Data
arxiv.org·13h
📰RSS Archaeology
Samsung fixed actively exploited zero-day
securityaffairs.com·5h
🔓Hacking
SWE-Mirror: Scaling Issue-Resolving Datasets by Mirroring Issues Across Repositories
arxiv.org·1d
🎓Academic Torrents
Top AI Tools for Software Development Teams in 2025
dev.to·1d·
Discuss: DEV
Proof Automation
What to Look for When Choosing an ICO Marketing Agency in 2025
dev.to·1d·
Discuss: DEV
Time Capsule Networks
Future Trends in Advanced File Transfer 2030 & Beyond
dev.to·3h·
Discuss: DEV
🔐Archive Encryption