Links
AddSafely shareable TLS root CA for .internal networks using Name Constraints - nh2/internal-contstrained-pki
Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.
The new sudo-rs is meant to be a near drop-in replacement for sudo, but some of the less secure aspects of sudo will not be supported.
SMBC is a daily comic strip about life, philosophy, science, mathematics, and dirty jokes.
Pulumi and System Initiative Spice Up Infrastructure as Code to challenge IaC leader HashiCorp, which is being acquired by IBM.
Open-source developer platform to power your entire infra and turn scripts into webhooks, workflows and UIs. Fastest workflow engine (13x vs Airflow). Open-source alternative to Retool and Temporal. - windmill-labs/windmill
People gonna people
Department of Justice examining ‘structural remedies’ to challenge tech corporation’s internet search monopoly
New Linux tracer analyzes production performance problems and troubleshoots software.
Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents.
The famed TV artist was one of history’s most prolific painters. But finding Bob Ross paintings for sale is a long shot.
✨ Magical shell history. Contribute to atuinsh/atuin development by creating an account on GitHub.
Here, you'll find a list of free, open-source cybersec tools that are ready to be added to your organization's arsenal.
Mirror a portion of your screen to a virtual monitor for easier screen sharing. - splitbrain/clipscreen
A web extension that redirects YouTube, Twitter, Instagram, etc. requests to alternative privacy-friendly frontends
Dive into Rubin's Cosmic Treasure Chest — there's so much to explore
Read how Google is using System Theoretic Process Analysis (STPA) to analyze pure software systems and discover risks.