ASD – Barriers and Pathways in Formal and Self-Diagnosis
codeberg.org·17h·
Discuss: Hacker News
🛸Paranormal
Flag this post
National 211 hotline calls for food assistance quadrupled in a matter of days, a magnitude typically seen during disasters
theconversation.com·1d
🌱Permaculture
Flag this post
Comparing ECDSA signature validation in OpenSSL vs. libsecp256k1 - The Stack
delvingbitcoin.org·19h
🗝️Lock Picking
Flag this post
NYC Voters Reject ‘Unofficial’ City Council Vetos of Housing Projects
planetizen.com·2d
🍊Donald Trump
Flag this post
America’s crime problem hasn’t grown, but it has aged
thehill.com·21h
🐾Tracking Skills
Flag this post
Poker Strategies and Security Essentials for Online Gaming Platforms
netnewsledger.com·3d
🗝️Lock Picking
Flag this post
The State of Indie Games in 2025 and Beyond, Part 2
superjumpmagazine.com·1h
🛩️Drone Warfare
Flag this post
I still pay for a password manager
melvinsalas.com·1d
🗝️Lock Picking
Flag this post
The idea that people aren't stupid
theseedsofscience.pub·19h·
Discuss: Hacker News
🍊Donald Trump
Flag this post
The Best Self-Hosted Web Application Firewalls (WAFs) in 2026
blog.devops.dev·1d
⚔️Gray Zone Warfare
Flag this post
Completed a Three Level Demo of a Procedural Generated Cave Exploration Game
thatguypaul.itch.io·2d·
Discuss: r/godot
🔥Primitive Technology
Flag this post
The Agentic Leap: Key Announcements and Demos from the Google I/O 2025 Developer Keynote
io.google·5h·
Discuss: DEV
💻CLI Tools
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.edu·3d
🕵OSINT
Flag this post
A CIO’s First Principles Reference Guide for Securing AI by Design
paloaltonetworks.com·2d
🔍Intelligence Analysis
Flag this post
Worth the switch from Claude to GLM 4.6 for my coding side hustle?
reddit.com·1h·
Discuss: r/LocalLLaMA
💻CLI Tools
Flag this post
This Fourth Light Could Finally Free Us From Endless Red Lights
carscoops.com·1h
🚀Elon Musk
Flag this post
Breaking Free from Dark UX: Strategies for Honest App Design
dev.to·1d·
Discuss: DEV
🍃Camouflage
Flag this post
Cargo Theft Goes Digital as Cybercrime Invades the Supply Chain
pymnts.com·2d
👁️Surveillance Detection
Flag this post
Improved swarm model with informed agents to prevent stealth attackers based on a vigilance mechanism
sciencedirect.com·4d
⚔️Gray Zone Warfare
Flag this post
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation
dev.to·5d·
Discuss: DEV
⚔️Gray Zone Warfare
Flag this post