Links
AddThere's a million ways to connect to your home lab, but some options are better for your needs.
A tale of taming unruly documents to create the ultimate GPT-based chatbot
ASIO boss Mike Burgess says he may soon use powers to compel tech companies to cooperate with warrants and unlock encrypted chats to aid national security investigations.
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
Cloudflare suffered a service outage on November 18, 2025. The outage was triggered by a bug in generation logic for a Bot Management feature file causing many Cloudflare services to be affected.
How to use and configure a Yubikey
The homepage of the work for which I'm best known — a model Boeing 777, made entirely from manila folders!
LACK Side table, white stained oak effect. Easy to assemble. Low weight; easy to move.
Visualise your CSV files in seconds without sending your data anywhere
I recently learned an interesting fact about Fibonacci numbers while watching a random number theory video on YouTube. Fibonacci numbers can be used to approximately convert from miles to kilometers and back. Here is how. Take two consecutive Fibonacci numbers, for example 5 and 8. And you're done converting. No...
Jon DiMaggio used sockpuppet accounts, then his own identity, to infiltrate LockBit and gain the trust of its alleged admin, Dmitry Khoroshev.
Minesweeper is a new technique for automating root cause analysis (RCA) that identifies the causes of bugs based on their symptoms.
Personal blogs are back, should niche blogs be next? Might good old fashion niche blogs be the solution to rampant social media misinformation, AI slop, and more?
Browse Certificate Transparency logs