Anticheat: a non-technical look without psychoanalysis
lesswrong.comยท1d
โlaw
Flag this post
Base64 Decoder โ Unwrap Your Data Like a Secret Message ๐ต๏ธโโ๏ธ๐
๐คtypography
Flag this post
Why Colts QB Daniel Jones isn't to blame for all 5 turnovers vs. Steelers: Watch video
nytimes.comยท23h
โlaw
Flag this post
How to handle secrets on the command line
๐Open Source
Flag this post
pdxscript: VCS edition
blog.birbpara.deยท15h
๐Open Source
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.comยท23h
๐คtypography
Flag this post
My return to Rust is going well, other than my freakish Guns N' Roses-loving neighbor shooting me every time I try to hang string lights on my roof
pcgamer.comยท15h
โlaw
Flag this post
How to Choose a Dependency: Build vs Buy, Risk Management, and More
hackernoon.comยท1d
๐Open Source
Flag this post
Foreign hackers breach U.S. Congressional Budget Office - WaPo
nordot.appยท1d
๐Data Visualization
Flag this post
A File Format Uncracked for 20 Years
๐คtypography
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.netยท2d
๐Open Source
Flag this post
Russian hackers use fake CAPTCHA tests to spread new malware families across multiple targets
foxnews.comยท1d
๐Open Source
Flag this post
This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.comยท1d
๐Open Source
Flag this post
Show HN: Computational Metaphysics: Zeroth Implementation of Grover's and Shor's
๐คtypography
Flag this post
Thoughts on bug bounty programs
blog.birbpara.deยท4h
๐Open Source
Flag this post
Loading...Loading more...