Links
Add
Hooks - Anthropic
https://docs.anthropic.com/en/docs/claude-code/hooks
Customize and extend Claude Code's behavior by registering shell commands
Added 3 weeks ago
An Astronaut's Guide to Mental Models
https://fs.blog/2020/02/mental-models-in-space/
Saturday Morning Breakfast Cereal - Humanity
https://www.smbc-comics.com/comic/humanity
SMBC is a daily comic strip about life, philosophy, science, mathematics, and dirty jokes.
Broken
www.smithsonianmag.com
https://www.smithsonianmag.com/smart-news/james-webb-space-telescope-reveals-its-first-direct-image-discovery-of-an-exoplanet-180986886/
Added 3 weeks ago
Cyber ransom payments will need to be disclosed by businesses under new law
https://www.abc.net.au/news/2024-07-30/cyber-ransom-payments-new-laws-before-parliament/104113038
Australian businesses are paying untold amounts in ransom to hackers but the government hopes to regain some control with a landmark cybersecurity law.
Added 1 month ago
https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc
https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc
An illustrated guide to explain OAuth and OpenID Connect!
Added 1 month ago
Addon: Trivy - General Discussions / microk8s - Discuss Kubernetes
https://discuss.kubernetes.io/t/addon-trivy/23797
Compatibility:
Source: See Trivy website for details.
Trivy is an all-in-one open source security scanner that can help you identify vulnerabilities and IaC misconfigurations, discover SBOMs, perform cloud scanni…
Added 1 month ago
STRIDE GPT - AI-powered Tool LLMs To Generate Threat Models
https://cybersecuritynews.com/stride-gpt-ai-powered-tool/
A new tool has emerged that promises to revolutionize the way organizations approach threat modeling. STRIDE GPT, an AI-powered threat modeling tool, leverages the capabilities of large language models (LLMs) to generate comprehensive threat models
Added 1 month ago
Urtext /ˈʊrtekst/
https://urtext.co/
Urtext /ˈʊrtekst/ is an open-source Python library for writing and knowledge management. It wraps an API around a simple, freeform syntax whose contents can be accessed and manipulated to the extent of the Python language. Freeform, Flexible Syntax Syntax Overview _ (the single underscore character denotes the node title) Most of the syntax is freeform!...
Added 1 month ago
The Internet Archive is under attack with a popup claiming a ‘catastrophic’ breach - The Verge
https://www.theverge.com/2024/10/9/24266419/internet-archive-ddos-attack-pop-up-message
The Internet Archive has suffered a data breach affecting 31 million accounts and is now offline after its site was defaced and DDoS’d.
https://academy.apnic.net/en/virtual-training/
https://academy.apnic.net/en/virtual-training/
Added 1 month ago
Microsoft formally deprecates the 39-year-old Windows Control Panel | Ars T
https://arstechnica.com/gadgets/2024/08/microsoft-formally-deprecates-the-39-year-old-windows-control-panel/
The Settings app has taken over, but Control Panels aren’t going anywhere yet.
Added 1 month ago
Area 5150 by CRTC & Hornet (Party Version) / IBM PC+CGA Demo Hardware Capture
https://www.youtube.com/watch?v=fWDxdoRTZPc
AREA 5150: a demo for the original IBM PC (4.77MHz 8088), CGA video (RGBI monitor), PC speaker, 570K+ free RAM.This is the party version, released by CRTC+Ho...
Ubuntu Adds a New Authentication Feature
https://news.itsfoss.com/ubuntu-authd/
Better security for Ubuntu users. A good step.
Added 1 month ago
This Meme Does Not Exist - Imgflip
https://imgflip.com/ai-meme
Memes Generated by an Artificial Neural Network
https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabotage.pdf
https://www.cia.gov/static/5c875f3ec660e092cf893f60b4a288df/SimpleSabotage.pdf
Added 1 month ago
Google launches Sec-Gemini v1. A new experimental cybersecurity model
https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?m=1
Fish Have a Brain Microbiome. Could Humans Have One Too? | Quanta Magazine
https://www.quantamagazine.org/fish-have-a-brain-microbiome-could-humans-have-one-too-20241202/
Added 1 month ago
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
Use roles to grant an IAM user access through identity federation (authorization by an external service).
skarnet.org: a word about systemd
https://skarnet.org/software/systemd.html
skarnet.org: a word about systemd
Added 1 month ago
Focalboard – a self-hosted alternative to Trello Notion and Asana
https://www.focalboard.com/
Added 1 month ago
IAM Best Practices - AWS Identity and Access Management
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsiambestpractices&sc_category=AWS_Identity_and_Access_Management&linkId=46957150
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
Broken
60 Open Source Replacements for Communications Software
http://t.co/1I1WYtFz
Added 1 month ago