• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Broken
Linux/4004 - Dmitry.GR
https://dmitry.gr/?r=05.Projects&proj=35.%20Linux4004

Dmitry.GR: Slowly booting full Linux on the intel 4004 for fun, art, and absolutely no profit

 
history linux
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Install EKS-D with MicroK8s - General Discussions / microk8s - Discuss Kube
https://discuss.kubernetes.io/t/install-eks-d-with-microk8s/21479

What is EKS-D Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (Amazon EKS). It provides latest upstream updates as well as extended security patching support…

 
authentication aws k8s
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
NONO - Secure Shell for AI Agents
https://nono.sh/

OS-enforced capability sandbox for running untrusted AI agents. No escape hatch. Works with Claude, GPT, and any AI agent.

 
ai llm security
Added 1 week ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
LearnAwesome.org
https://learnawesome.org/
 
learning online training
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks
https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/

A vulnerability in the popular open-source firewall software pfSense has been identified, allowing for remote code execution (RCE) attacks.

 
pfsense security vulnerability
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
ASD releases joint advice on AI data security – ARN
https://www.arnnet.com.au/article/3993677/asd-releases-joint-advice-on-ai-data-security.html

The Australian Securities Directorate (ASD), in collaboration with international partners, has come with new advice on best practices for securing data throughout the artificial intelligence (AI) and machine learning (ML) system lifecycle.

 
ai cyber data security
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
AWS Federated Authentication with Active Directory Federation Services (AD
https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/

Today we’d like to walk you through AWS Identity and Access Management (IAM), federated sign-in through Active Directory (AD) and Active Directory Federation Services (ADFS). With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which resources users can access. Customers have the option of creating users and […]

 
authentication aws federation security
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Do not download the app, use the website
https://idiallo.com/blog/dont-download-apps

Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.

 
data mobile privacy
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
JunoCam : Processing - Mission Juno
https://www.missionjuno.swri.edu/junocam/processing?source=all&ob_from=2024-10-01&ob_to=2024-11-01&phases%5B%5D=PERIJOVE+66&perpage=16
 
photography space
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
pyx | Astral
https://astral.sh/pyx

A Python-native package registry from the creators of uv.

 
packaging python
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Network Automation and the Lack of Innovation in the Management Plane - The
https://thenewstack.io/network-automation-and-the-lack-of-innovation-in-the-management-plane/

The latest news and resources on cloud native technologies, distributed systems and data architectures with emphasis on DevOps and open source projects.

 
automation networking
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Show HN: Jless a command-line JSON viewer
https://pauljuliusmartinez.github.io/

jless | plaintextsports.com

 
cli json tools
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
GitHub - affaan-m/everything-claude-code: Complete Claude Code configuration collection - agents, skills, hooks, commands, rules, MCPs. Battle-tested configs from an Anthropic hackathon winner.
https://github.com/affaan-m/everything-claude-code

Complete Claude Code configuration collection - agents, skills, hooks, commands, rules, MCPs. Battle-tested configs from an Anthropic hackathon winner. - affaan-m/everything-claude-code

 
ai anthropic claude code llm
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
How to create a third-party Microsoft Installer package
http://support.microsoft.com/kb/257718
 
application packaging
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Windows Notepad App Remote Code Execution Vulnerability
https://www.cve.org/CVERecord?id=CVE-2026-20841
 
hackernews
Added 3 days ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
IAM Best Practices - AWS Identity and Access Management
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsiambestpractices&sc_category=AWS_Identity_and_Access_Management&linkId=46957150

Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.

 
amazon aws process security
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Sorting JSON by Value with JQ (Command Line JSON Processor) - Big Datums
http://bigdatums.net/2016/11/29/sorting-json-by-value-with-jq/

jq is a lightweight command line JSON processor that is very easy to use. Sometimes it is helpful to see your data sorted by a particular field value. Luckily jq makes this easy to do. Here are some sample JSON records we will be working with in this post: Sorting JSON by value with jq […]

 
jq json
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The worst of the two worlds: Excel meets Outlook
https://adepts.of0x.cc/vba-outlook/

Turning Outlook into a keylogger via VBA macros

 
exfiltration microsoft security vba
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
What goes into making an OS to be Unix compliant certified? - Quora
https://www.quora.com/What-goes-into-making-an-OS-to-be-Unix-compliant-certified?top_ans=332121621
 
macos unix
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Looking Glass: Run a Windows VM on Linux in a Window with Native Performanc
https://looking-glass.io/
 
linux virtualisation windows
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Local Networks Go Global When Domain Names Collide – Krebs on Security
https://krebsonsecurity.com/2024/08/local-networks-go-global-when-domain-names-collide/

The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn't exist at the time. Meaning, they are continuously sending…

 
active direcotry ad cyber dns proxy security
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Bluetooth Trackball Mark II
https://blog.jfedor.org/2021/01/bluetooth-trackball-mark-ii.html
 
hacking hardware hci trackball
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Programming Guides
https://roadmap.sh/guides

Detailed guides on Software Engineering Topics

 
diagrams technical visualisation
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://www.abc.net.au/news/2024-07-10/underwater-canyons-super-highways-seafloor-research-science/104072182?utm_source=abc_news_app&utm_medium=content_shared&utm_campaign=abc_news_app&utm_content=other
https://www.abc.net.au/news/2024-07-10/underwater-canyons-super-highways-seafloor-research-science/104072182?utm_source=abc_news_app&utm_medium=content_shared&utm_campaign=abc_news_app&utm_content=other

Ever wondered what the ocean floor around Australia's coast looks like? A first-of-its-kind survey has uncovered new information about underwater canyons.

 
investigation ocean
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 45
  • 46
  • 47
  • ...
  • 61
  • 62
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks