Will we EVER learn? The most common passwords are revealed - with '123456' topping the list yet again
dailymail.co.ukยท2d
๐ปHacking Games Puzzles Programming Skills Competition
Flag this post
SonicWall says state-sponsored hackers behind September security breach
๐๏ธResilient Infrastructure
Flag this post
What Artifacts Teach Us
systemsapproach.orgยท3d
๐๏ธResilient Infrastructure
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.eduยท5h
๐ปHacking Games Puzzles Programming Skills Competition
Flag this post
How does HTTP work?
๐๏ธResilient Infrastructure
Flag this post
AI Papers to Read in 2025
towardsdatascience.comยท10h
๐งฎAlgorithmic Puzzles
Flag this post
Vitria / FutureNet World Telco Focus Webinar Series: Knowledge-Driven AI Accelerates Autonomous Networks, Delivers Massive Telecom Savings
prnewswire.comยท15h
๐Offline Computing
Flag this post
An Analysis of Early-Stage Functional Safety Analysis Methods and Their Integration into Model-Based Systems Engineering
arxiv.orgยท2h
๐Offline Computing
Flag this post
A New Ion-Based Quantum Computer Makes Error Correction Simpler
tech.slashdot.orgยท4h
๐Offline Computing
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท6d
๐Offline Computing
Flag this post
I Coded a Digital ID System for 450M People (Using ONLY My Mom's Phone & GitHub)
๐Offline Computing
Flag this post
Evaluating Generative AI as an Educational Tool for Radiology Resident Report Drafting
arxiv.orgยท2h
๐งฎAlgorithmic Puzzles
Flag this post
Trustworthy Quantum Machine Learning: A Roadmap for Reliability, Robustness, and Security in the NISQ Era
arxiv.orgยท1d
๐Offline Computing
Flag this post
Unlocking Logic's Secrets: BoolSkeleton โ Streamlining Boolean Networks for Peak Performance by Arvind Sundararajan
๐งฎAlgorithmic Puzzles
Flag this post
map-of-shame - Unsafe operations on type-erased maps (Experimental)
๐ฆRust Programming Language
Flag this post
Extensive FPGA and ASIC resource comparison for blind I/Q imbalance estimators and compensators
sciencedirect.comยท1d
๐Offline Computing
Flag this post
Migration to Post-Quantum Cryptography: From ECDSA to ML-DSA
eprint.iacr.orgยท6d
๐Offline Computing
Flag this post
Loading...Loading more...