How to Handle .pacnew Files in Arch Linux
linuxiac.com·4h
Flag this post
I replaced Microsoft Word with a self-hosted, open-source alternative
gadgeteer.co.za·12h
Flag this post
Half of the World’s Satellites Are Leaking Unencrypted Data From Phones, Planes, and Even the Military
zmescience.com·1d
🛡Cybersecurity
Flag this post
the terminal of the future
🐧Linux
Flag this post
When It Happens
mcsweeneys.net·6h
Flag this post
Build bridges, not walls
bitfieldconsulting.com·7h
Flag this post
🎲 Weeknotes 2025 W45: Polymorphic
denisdefreyne.com·3d
🦀Rust
Flag this post
ETHEL — Emergent Tethered Habitat-aware Engram Lattice -- ok, so it sounds a bit pretentious... but it's literal at least?
Flag this post
Fish 4.2 adds multi-line autosuggestions, default UTF-8, and tab title control
alternativeto.net·2d
🐧Linux
Flag this post
Telegram sues Australia over age verification law − here's what we know
techradar.com·14h
🛡Cybersecurity
Flag this post
Questions about VMs and compartmentalisation
Flag this post
The Code Vault
Flag this post
Sharing My Little Experiment: Code Genie – A Simple Open-Source Tool to Help with Code Ideas
Flag this post
Things that tripped me up doing a fresh installation
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Chinese Hackers Have Burrowed Into Too Many Corporate Systems. Time to Fight Back. - Barron's
news.google.com·9h
🛡Cybersecurity
Flag this post
Loading...Loading more...