Inside the Time-to-exploit -1 days era, How Self-Updating malware exploits vulnerabilities before patches are deployed
⚙️Systems Programming
Flag this post
Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers
🧮Memory Allocators
Flag this post
Rewriting google datastore emulator.
🌐WebAssembly
Flag this post
'Systems that have a secure boot process, in reality, do not': Major backdoors have been discovered in Framework Linux machines and it might just be the tip of ...
pcgamer.com·4h
🐧Linux
Flag this post
Introducing GenosDB: a P2P Graph Database with Built-In Zero-Trust Security
hackernoon.com·15h
🗂️IPFS
Flag this post
Introducing Amazon EBS Volume Clones: Create instant copies of your EBS volumes
aws.amazon.com·22h
🗂️IPFS
Flag this post
Amazon AWS Working On Linux "PCSC" To Help With Dense SR-IOV Deployments
phoronix.com·1d
🏗System Design
Flag this post
How I Organize My Self-Hosted Apps and Dev Environment
noted.lol·5h
🖥Self-hosting
Flag this post
[lwn] Enhancing FineIBT
⚙️Systems Programming
Flag this post
Secure LUKS containers on Linux
🏠Self-Hosting
Flag this post
The Dreamseeker’s Vision of Tomorrow
soatok.blog·7h
🔒Digital Privacy
Flag this post
Want to run your AI model locally? Here’s what you should know
blog.logrocket.com·7h
⚡WebGPU Compute
Flag this post
Reliability, reliability, reliability. How would you go about do it all from the start?
🏠Self-Hosting
Flag this post
After sharing SystemCraft here, I wrote my first deep-dive article about it
🏗System Design
Flag this post
Patch Tuesday, October 2025 ‘End of 10’ Edition
🐧Linux
Flag this post
NAT traversal, and how we're improving it
tailscale.com·6h
🕸️Mesh Networks
Flag this post
Loading...Loading more...