How to Modulo on the C64 and Why You Need It
retrogamecoders.com·14h·
Discuss: Hacker News
Systems Programming
Flag this post
New Book Release from Saifedean Ammous - The Gold Standard
stacker.news·3h
🦀Rust
Flag this post
RUSTSEC-2025-0118: Vulnerability in wasmtime
rustsec.org·1d
🕸️WebAssembly
Flag this post
Developers Can Choose the Right AI Coding Tool Without Feeling Overwhelmed
practicalsecurity.substack.com·6h·
Discuss: Substack
🕸️WebAssembly
Flag this post
Trupe: Implementing Actor Model in .NET
dev.to·19h·
Discuss: DEV
🕸️WebAssembly
Flag this post
Java's Funny Little Heresies
dev.to·23h·
Discuss: DEV
🕸️WebAssembly
Flag this post
Builder Design Pattern and Cyclomatic Complexity Reduction
johnjr.dev·4d·
Discuss: Hacker News
🕸️WebAssembly
Flag this post
MCP x Cursor PoC: Rogue MCP Servers, IDE Browsers, and Real Defenses
dev.to·1d·
Discuss: DEV
🕸️WebAssembly
Flag this post
Critical Vulnerability in Fortinet FortiWeb Exploited in the Wild
rapid7.com·1d
🕸️WebAssembly
Flag this post
Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
reddit.com·2h·
🦀Rust
Flag this post
Building "CodeBro": My (Pointless) Adventure into AI Agents with Java
dev.to·2h·
Discuss: DEV
🕸️WebAssembly
Flag this post
Template Interpreters
zackoverflow.dev·3d·
🕸️WebAssembly
Flag this post
The Law of Leaky Abstractions
joelonsoftware.com·3d·
Discuss: Hacker News
Systems Programming
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·1d·
Discuss: Hacker News
🕸️WebAssembly
Flag this post
Code legacy: Analyzing Erlang's C and C++ modules that have been running for decades
dev.to·2d·
Discuss: DEV
🦀Rust
Flag this post
🧠 How User-Space and Kernel-Space Affect Security in Linux
dev.to·2d·
Discuss: DEV
Systems Programming
Flag this post