How to set up Emacs as an SVG editor
monospace.games·4h·
Discuss: Hacker News
🦀Rust
Flag this post
The Randy Hall Problem
thefiddler.substack.com·9h·
Discuss: Substack
🔒Security
Flag this post
Learning to trust with Hanabi
bojidar-bg.dev·8h
🔒Security
Flag this post
Added lazy loading to all images.
threadreaderapp.com·8h
🦀Rust
Flag this post
Masked Softmax Layers in PyTorch
mcognetta.github.io·4d·
Discuss: Hacker News
💥Exploit Development
Flag this post
Russian hackers use fake CAPTCHA tests to spread new malware families across multiple targets
foxnews.com·10h
🌐Browser Exploitation
Flag this post
How to Set Up Valkey, The Alternative to Redis
percona.com·7h
💥Exploit Development
Flag this post
How to handle secrets on the command line
smallstep.com·52m·
Discuss: Hacker News
🔒Security
Flag this post
Using the probabilistic method to bound the performance of toy transformers by Alex Gibson
greaterwrong.com·22h
🦀Rust
Flag this post
5 Sweaters That Would Make Truly Excellent Gifts
nytimes.com·7h
🔒Security
Flag this post
Rasterizer Project - Part: BASIC_END
dev.to·22m·
Discuss: DEV
🦀Rust
Flag this post
TwIST: Rigging the Lottery in Transformers with Independent Subnetwork Training
arxiv.org·17h
🦀Rust
Flag this post
A File Format Uncracked for 20 Years
landaire.net·1d·
💥Exploit Development
Flag this post
Deciphering the molecular mechanisms of FET fusion oncoprotein–DNA hollow co-condensates
nature.com·11h
🦀Rust
Flag this post
Building Trust in Virtual Immunohistochemistry: Automated Assessment of Image Quality
arxiv.org·17h
🦀Rust
Flag this post
Unlocking Simplicity: Skeletonizing Boolean Networks for Enhanced Performance by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🦀Rust
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
blogger.com·6h
🔒Security
Flag this post
Unlock Dual Revenue: How to Monetize Your LLM Apps with AI Conversations
dev.to·13h·
Discuss: DEV
🌐Browser Exploitation
Flag this post