Links
AddAmazon CloudFront announced support for Amazon Route 53 HTTPS DNS alias record across its global network, enabling clients to discover the optimal HTTP protocol during the initial DNS resolution phase rather than in a subsequent connection step. This helps users improve performance and security, and simultaneously reduce operational expenses. This post explores the implementation details, […]
My childhood consisted of about 20% Dungeons & Dragons (D&D) and 80% LEGOs, with a pretty strong crossover of the two.
Internet Archive's "The Wayback Machine" has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.
Provided to YouTube by Horus Music LtdThe Little Drummer Boy · Christopher LeeA Heavy Metal Christmas℗ 2012 Charlemagne Productions LtdReleased on: 2012-12-1...
An easy-to-use secure configuration generator for web, database, and mail software. Simply select the software you are using and receive a configuration file that is both safe and compatible.
Security shouldn't wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.
A wise colleague once told me I should never have anything on in the background just to have it on. He’s probably right, but I still like to pop on a show
A collection of production-ready subagents for Claude Code - wshobson/agents
There's a new contender for your holiday fireplace video.
Enhance your cybersecurity skills
A hilarious macOS app that plays fart sounds as you open and close your MacBook lid - iannuttall/fartscroll-lid
I went hands-on with Android 16’s new Desktop Mode, testing real-world performance, multitasking, and peripheral support in a full workday setup.
Monitor your entire IT environment securely. Full-stack SaaS-based monitoring combined with the power of AIOps.
Diagram as Code Tool Written in Rust with Draggable Editing - RohanAdwankar/oxdraw
Sticking to container security best practices is critical for successfully delivering secure software.