Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
hoistbypetard
.
2
Microsoft releases DocumentDB (NoSQL atop Postgres) under MIT license
databases
opensource.microsoft.com
via
hoistbypetard
29 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
40
Framework ships RISC-V board for its 13" laptops along with "boardless" laptop chassis
hardware
arstechnica.com
via
hoistbypetard
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
8
Reverse Engineering Bambu Connect
☶
reversing
wiki.rossmanngroup.com
via
hoistbypetard
1 month ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
19
How We Cracked a 512-Bit DKIM Key for Less Than $8 in the Cloud
cryptography
security
dmarcchecker.app
via
hoistbypetard
2 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
24
qutebrowser: A keyboard-driven, vim-like browser based on Python and Qt
browsers
github.com/qutebrowser
via
hoistbypetard
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
13
The BPF instruction set architecture is now RFC 9669
linux
lwn.net
via
hoistbypetard
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Hundreds of code libraries posted to NPM try to install malware on dev machines
javascript
security
arstechnica.com
via
hoistbypetard
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
36
The Original Author of the Fernflower Java Decompiler, Stiver, has Passed Away
java
person
blog.jetbrains.com
via
hoistbypetard
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Bitwarden "Internal" SDK now being relicensed to GPLv3
release
security
github.com/bitwarden
via
hoistbypetard
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
10
Move Fast and Abandon Things
art
mac
programming
engineersneedart.com
via
hoistbypetard
5 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
AI poisoning could turn open models into destructive “sleeper agents”
ai
programming
security
arstechnica.com
via
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Upgrading an old Alpine Linux VM (or: My Yak Shaving on this Snowy Day)
linux
geoff.tuxpup.com
authored by
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
10 comments
10
19
The Windows 95 team bought 1 of every retail PC program they could get
video
historical
windows
youtube.com
via
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
7
dj-notebook: the REPL I've Always Wanted for Django
☶
python
web
geoff.tuxpup.com
authored by
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
202
Testing a new encrypted messaging app's extraordinary claims
security
crnkovic.dev
via
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
10
Precision, recall and why you shouldn’t crank up the warnings to 11
programming
lemire.me
via
hoistbypetard
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
33
I just learned: Docker edits firewall rules for you
networking
programming
security
geoff.tuxpup.com
authored by
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
20 comments
20
6
John Carmack on Functional Programming in C++
c++
programming
sevangelatos.com
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
5
Some people say 2048-bit RSA is vulnerable to a combo of conventional and current quantum computers
cryptography
security
schneier.com
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
27
Samsung’s Android app-signing key has leaked, is being used to sign malware
android
security
arstechnica.com
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
2
Using VBA Macros (from a Word Document) to Exploit Vulnerable Drivers
programming
security
disrel.com
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Building an ESP32-based Wireless Haptic Communication System
hardware
programming
learn.adafruit.com
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
Bookmarklet to Remove Sticky Elements and Restore Scrolling to Web Pages
browsers
github.com/t-mart
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
Building a Self-Destructing USB Drive
hardware
programming
interruptlabs.ca
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
42
Using Windows after 15 years on [desktop] Linux
linux
rant
windows
duncanlock.net
via
hoistbypetard
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
44 comments
44
Page 2 >>