Finding The File At Point
irreal.org·2d
🐧Linux
Flag this post
My Home (VPN) Network Setup
a14m.dev·1d·
Discuss: Hacker News
🛡Cybersecurity
Flag this post
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
thehackernews.com·9h
🛡Cybersecurity
Flag this post
Building an Automated SAST + DAST Pipeline: Solving One of the Biggest Security Problems in Modern…
blog.devops.dev·13h
🛡Cybersecurity
Flag this post
Tools For Developers
circusscientist.com·2d
🐧Linux
Flag this post
Fun-reliable side-channels for cross-container communication
h4x0r.org·2d·
🛡Cybersecurity
Flag this post
Pi Compute Modules Make for Compact Cluster
hackaday.com·2d
🛡Cybersecurity
Flag this post
Weekly Notes 46/2025
thejeshgn.com·9h
🛡Cybersecurity
Flag this post
Subtle bug. How can I avoid in the future?
reddit.com·1d·
Discuss: r/golang
🦀Rust
Flag this post
Meet Me on My Rotary Phone
hackaday.com·3h
🛡Cybersecurity
Flag this post
FPGA Brings Antique Processor to Life
hackaday.com·15h
🦀Rust
Flag this post
The Science of Detecting Hidden Bugs in Mobile Apps
dev.to·19h·
Discuss: DEV
🦀Rust
Flag this post
Demystifying AI Tools, AI Agents, and Agentic Workflows
cacm.acm.org·3d
🛡Cybersecurity
Flag this post
A Brief Look at FreeBSD
yorickpeterse.com·2d·
🐧Linux
Flag this post
OpenSigner – self-hostable key management for Web3/crypto wallets (OSS release, feedback welcome)
reddit.com·9h·
Discuss: r/opensource
🛡Cybersecurity
Flag this post
Module System
reddit.com·5h·
Discuss: r/embedded
🐧Linux
Flag this post
AI Amplifies Team Strengths and Weaknesses in Software Development
infoq.com·15h
🛡Cybersecurity
Flag this post
Nmap Hands-On: Explore Verbosity, UDP Scanning, and Network Discovery Techniques
dev.to·1d·
Discuss: DEV
🛡Cybersecurity
Flag this post
Git workflow
wiki.postmarketos.org·1d
🛡Cybersecurity
Flag this post
Good morning. I like how things are going in FeedLand and WordLand today. The dots are starting to connect.
scripting.com·1d
🛡Cybersecurity
Flag this post