• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Broken
Headscale: Open-source implementation of the Tailscale control server
https://news.ycombinator.com/item?id=28572013
 
networking security zero trust
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
1M context is now generally available for Opus 4.6 and Sonnet 4.6
https://claude.com/blog/1m-context-ga
 
2019-01-03 ai anthropic claude code hackernews
Added 1 week ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
NIST Announces Post-Quantum Cryptography Standards - IEEE Spectrum
https://spectrum.ieee.org/post-quantum-cryptography-2668949802

Today, the National Institute of Standards and Technology (NIST) announced the first standardization of three cryptography schemes that are immune against the threat of quantum computers, known as post-quantum cryptography (PQC) schemes. With these standards, NIST is encouraging computer system administrators to transition as soon as possible.

 
encryption internet standard
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Discussion of the Benefits and Drawbacks of the Git Pre-Commit Hook
https://yeldirium.de/2025/10/09/pre-commit-hooks/index.html
 
git hackernews
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
There were BGP anomalies during the Venezuela blackout
https://loworbitsecurity.com/radar/radar16/

The Low Orbit Security Radar is a weekly security newsletter from an offensive practitioner's perspective. One idea, curated news, and links worth your time.

News: There Were BGP Anomalies During The Venezuela Blackout

When watching the situation in Venezuela unfold, the phrase "It was dark, the lights of Caracas were

 
hackernews
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Announcing n8n version 2.0 - coming soon! - Announcements - n8n Community
https://community.n8n.io/t/announcing-n8n-version-2-0-coming-soon/226475

Announcing n8n version 2.0 - our best n8n ever! :grinning_face_with_smiling_eyes: I’m super excited to share that we’ll soon be releasing n8n version 2.0.0 (v2 for short) It’s been over two years since we released n8n …

 
ai automation orchestration
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The platform engineering toolkit for Kubernetes
https://koreo.dev/
 
k8s orchestration
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Honest Trailers | Kill Bill: Vol 1 & 2 - YouTube
https://youtu.be/tnWWEWC85rA?si=CEepfggfHcuvB2Yk

Kill Bill 1 & 2 are returning to theaters in one super-sized cut called “the Whole Bloody Affair”, so to celebrate we’re finally giving Quentin Tarantino’s s...

 
funny movies youtube
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Dive: A tool for exploring a Docker image layer contents and more
https://github.com/wagoodman/dive

A tool for exploring each layer in a docker image. Contribute to wagoodman/dive development by creating an account on GitHub.

 
containers docker
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Atuin replaces your existing shell history with a SQLite database
https://github.com/ellie/atuin

✨ Magical shell history. Contribute to atuinsh/atuin development by creating an account on GitHub.

 
shell
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
AWS Launches EKS Dashboard to Tackle Multi-Cloud Kubernetes Complexity - InfoQ
https://www.infoq.com/news/2025/06/aws-eks-dashboard-kubernetes/

Introducing the Amazon EKS Dashboard: a centralized management tool delivering unified visibility across multiple Kubernetes clusters in AWS. Simplifying operational oversight, it offers insights on r

 
aws k8s management
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
New CISA tool detects hacking activity in Microsoft cloud services
https://www.bleepingcomputer.com/news/security/new-cisa-tool-detects-hacking-activity-in-microsoft-cloud-services/

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments.

 
active direcotry microsoft security
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Tesla kills Autopilot, locks lane-keeping behind $99/month fee
https://arstechnica.com/cars/2026/01/tesla-wants-recurring-revenue-discontinues-autopilot-in-favor-of-fsd/

With falling sales and shrinking profits, the recurring revenue will be most welcome.

 
hackernews vehicles
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Actions Runner Controller 0.12.0 release - GitHub Changelog
https://github.blog/changelog/2025-06-13-actions-runner-controller-0-12-0-release/

The Actions Runner Controller (ARC) 0.12.0 release introduces several enhancements including: public preview support for Red Hat OpenShift Kubernetes clusters and vault-based secret management, improvements to Docker-in-Docker (DinD) container mode,…

 
cicd docker monitoring secrets
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Secu
https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/

Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it. After reading the description, I found that it states it builds new firmware using an online service.

 
cyber open source pentest security supply chain vulnerability
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
A sufficiently detailed spec is code
https://haskellforall.com/2026/03/a-sufficiently-detailed-spec-is-code

Specifications do not address the limitations of agentic coding

 
ai engineering hackernews llm
Added 5 days ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
operational pgp - draft
https://gist.github.com/grugq/03167bed45e774551155#file-gistfile1-md

operational pgp - draft. GitHub Gist: instantly share code, notes, and snippets.

 
email encryption gnupg security
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Five lessons from building cybersecurity for high-growth companies
https://www.smartcompany.com.au/opinion/five-lessons-building-cybersecurity-high-growth-companies/

SafeStack founder Laura Bell Main shares the cybersecurity lessons she's learned after many years deep inside high-growth companies.

 
security
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Red Hat data breach escalates as ShinyHunters joins extortion
https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/

Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports (CERs) leaked on their data leak site.

 
cyber security
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
NIST Drops Password Complexity Mandatory Reset Rules
https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules
 
cyber passwords security standard
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Lenticular Clock : 7 Steps (with Pictures) - Instructables
https://www.instructables.com/Lenticular-Clock/

Lenticular Clock: After making my Moire Clock a got interested in a very similar effect: lenticular animations. You probably have seen this effect before, e.g. on post cards. I remember having a ruler in primary school with a picture of dinosaurs on it that changed d…

 
maker
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
A GitHub Issue Title Compromised 4k Developer Machines
https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another

A prompt injection in a GitHub issue triggered a chain reaction that ended with 4,000 developers getting OpenClaw installed without consent. The attack composes well-understood vulnerabilities into something new: one AI tool bootstrapping another.

 
cyber github hackernews security vulnerability
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
archive.is
https://archive.is/20250729065259/https://www.nytimes.com/2025/07/23/well/apnimed-sleep-apnea-clinical-trial-ad109.html
 
apnea health sleep
Added 7 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://pritunl.com/
https://pritunl.com/

Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.

 
networking security vpn
Added 9 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • ...
  • 67
  • 68
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks