Active
Recent
Comments
Search
Login
Login
Stories with
tags
in the
practices
categories
Tip: read stories across multiple categories with
/categories/foo,bar
40
pypush: Cross-platform iMessage POC
mac
reversing
github.com
via
eBPF
2 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
18 comments
18
169
Train firmware reverse engineering discovers bogus lock up code
reversing
social.hackerspace.pl
via
itamarst
2 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
37 comments
37
25
Go Testing By Example
go
testing
research.swtch.com
via
paulsmith
2 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
3
A Spooky Performance Regression in AWS EBS Volumes
databases
performance
dolthub.com
via
jorgelbg
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Writing confident code
practices
ruby
practicingruby.com
via
MatheusRich
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Fast, small, robust: pick three. Introducing a novel branchless partition implementation
performance
github.com
via
itamarst
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
O11y toolkit
show
devops
o11y.tools
via
fbegyn
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
16
A Security Kernel Based on the Lambda Calculus
lisp
security
mumble.net
via
dustyweb
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
50
A few words about Blameless culture
practices
gybe.ca
via
adamshaylor
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
30
Why Kubernetes needs an LTS
devops
matduggan.com
via
maduggan
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
18 comments
18
13
Profiling Rust programs the easy way
debugging
rust
ntietz.com
via
eBPF
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
8
Recursive ZkSNARKs: A Practical Deep Dive Without Maths
cryptography
javascript
privacy
programming
illya.sh
authored by
iluxonchik
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
That's FAR-out, Man
ios
security
blog.dfsec.com
via
fro
3 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections
pdf
linux
security
kylebot.net
via
fro
4 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Toolchain security features status update
pdf
slides
linux
security
outflux.net
via
fro
4 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
57
Build Stupid Tools
culture
practices
blog.stulta.dev
authored by
aae
4 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
29
A wigwam is a small-but-mighty project that reduces public reliance on battleships
practices
github.com
via
schmudde
4 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
42 comments
42
6
SLSA Security Levels
security
slsa.dev
via
quad
4 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Optimizing Go string operations with practical examples
go
performance
medium.com
via
knl
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
All I want is to know what's different [re: validating metrics]
databases
practices
benn.substack.com
via
squadette
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Documentation unit tests
testing
simonwillison.net
via
nc
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
16
Nerd Snipe: Small Integer Parsing
c
performance
blog.loadzero.com
authored by
loadzero
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
Binding Source Code Files Together Like A Book
practices
1a-insec.net
authored by
iacore
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
35
reaction, in replacement of fail2ban
networking
security
blog.ppom.me
via
xvello
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
4
Implementing a Lock-Free Snowflake ID Generator
performance
programming
lu.sagebl.eu
authored by
lu
5 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
<< Page 1
|
Page 3 >>