Lobsters
Recent
Comments
Search
Login
42
The Missing Semester of Your CS Education (MIT course)
☶
compsci
education
practices
unix
missing.csail.mit.edu
authored by
jonhoo
6 hours ago
|
cached
|
6 comments
6
27
How To Add CSS Dark Mode To A Website
web
kevq.uk
authored by
kev
11 hours ago
|
cached
|
14 comments
14
35
SerenityOS desktop running on an OpenBSD kernel
openbsd
osdev
twitter.com
via
awesomekling
10 hours ago
|
cached
|
4 comments
4
11
Star - Go but in Python?
go
python
embly.run
authored by
maxm
10 hours ago
|
cached
|
3 comments
3
8
switch to sway
linux
blog.freesources.org
via
raymii
6 hours ago
|
cached
|
4 comments
4
17
Just because it's an RFC ID doesn't mean anything... at all
practices
tools.ietf.org
via
cadey
8 hours ago
|
cached
|
no comments
0
9
Tech salaries are risk premiums
culture
finance
phildini.dev
authored by
phildini
4 hours ago
|
cached
|
1 comment
1
13
Pock: Display macOS Dock in Touch Bar
mac
pock.dev
via
sams
9 hours ago
|
cached
|
3 comments
3
25
shlide—a slide deck presentation tool written in pure bash
☶
linux
unix
github.com
authored by
icyphox
21 hours ago
|
cached
|
7 comments
7
24
HTTP/3 for everyone
networking
person
daniel.haxx.se
via
raymii
19 hours ago
|
cached
|
20 comments
20
44
Things I Believe About Software Engineering
philosophy
programming
blog.wesleyac.com
authored by
wesleyac
31 hours ago
|
cached
|
22 comments
22
40
How I Work From Anywhere in the World
practices
jezenthomas.com
authored by
jgt
30 hours ago
|
cached
|
38 comments
38
8
Conway's Game of Life in Baba is You
video
games
youtube.com
via
cadey
5 hours ago
|
cached
|
no comments
0
3
20 most significant programming languages in history
historical
anarc.at
via
raymii
4 hours ago
|
cached
|
7 comments
7
3
TeamViewer stored user passwords encrypted, not hashed, and the key is now public
security
whynotsecurity.com
via
calvin
4 hours ago
|
cached
|
2 comments
2
8
Honeypot, an alternate to CAPTCHA
web
araweb.co.uk
via
unlit_spark
14 hours ago
|
cached
|
6 comments
6
1
Release v0.15 of Relational pipes
databases
unix
relational-pipes.globalcode.in
fo
authored by
franta
22 minutes ago
|
cached
|
1 comment
1
24
The EARN IT Act: How to Ban End-to-End Encryption Without Actually Banning It
crypto
law
privacy
cyberlaw.stanford.edu
via
mz
25 hours ago
|
cached
|
11 comments
11
3
Finding treacherous encoding permutations with baseperm
programming
security
blog.yossarian.net
authored by
yossarian
7 hours ago
|
cached
|
no comments
0
5
Personal Wireguard VPN on a Freedombox with Debian
linux
networking
security
raymii.org
authored by
raymii
11 hours ago
|
cached
|
no comments
0
3
Structural Templating for Painless YAML
devops
swisspush.org
authored by
lbovet
12 hours ago
|
cached
|
3 comments
3
3
Remote Cloud Execution - Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)
security
research.checkpoint.com
via
lukas
3 hours ago
|
cached
|
no comments
0
2
Zero downtime CNI changes in Kubernetes
devops
medium.com
via
bigdubs
46 minutes ago
|
cached
|
no comments
0
6
Vulkan is coming to Raspberry Pi: first triangle
graphics
hardware
linux
raspberrypi.org
via
sams
9 hours ago
|
cached
|
no comments
0
3
How do you RTFM?
☶
ask
programming
authored by
nalzok
4 hours ago
|
no comments
0
Page 2 >>