Links
AddLog4Shell proved that open source security isn't guaranteed and isn’t just a code problem.
VMware has announced that its VMware Fusion and VMware Workstation desktop hypervisors are now free to everyone for commercial, educational, and personal use.
Iroh connections are dumb pipes: easy, direct connections that punch through NATs & stay connected as network conditions change.
A robotic lunar lander built by Texas-based Firefly has successfully landed on the moon, becoming only the second private-sector company ever to complete such a feat.
learn-c.org is a free interactive C tutorial for people who want to learn C, fast.
A Python tool to visualize + enforce dependencies, using modular architecture 🌎 Open source 🐍 Installable via pip 🔧 Able to be adopted incrementally - ⚡ Implemented with no runtime impact ♾️ Interoperable with your existing systems 🦀 Written in rust - gauge-sh/tach
Today marks two years since I first set up an e-ink display in my mom’s apartment to help her live on her own with amnesia.
OXO is a vulnerability scanning orchestrator that automatically binds tools together allowing for rapid scale.
AWS has released a new whitepaper that has been requested by many AWS customers: AWS Policy Perspectives: Data Residency. Data residency is the requirement that all customer content processed and stored in an IT system must remain within a specific country’s borders, and it is one of the foremost concerns of governments that want to […]
A completely private and local AI coding assistant, developed by Gensyn. It helps you practice programming problems and train a novel assistant to help you code. - gensyn-ai/codeassist
This is what happens when AI finds out it’s an AI
A test-automation framework is a set of best practices, common tools, and libraries that help quality-assurance testers assess the functionality, security, usability, and a
I recently learned an interesting fact about Fibonacci numbers while watching a random number theory video on YouTube. Fibonacci numbers can be used to approximately convert from miles to kilometers and back. Here is how. Take two consecutive Fibonacci numbers, for example 5 and 8. And you're done converting. No...
Evolving threats require security solutions that match the sophistication of modern threats. Learn more about how Wazuh, the open-source XDR and SIEM, tackles these threats.
In the first of a new series focusing on DevOps monitoring tools, we review the various types of system observability tools.
Cybercriminals connected to a recent string of ransomware attacks on major British retailers said on Friday they had stolen almost 1 billion records from cloud technology giant Salesforce, opens new tab by focusing on companies that use its software
Auto activating a python virtualenv. GitHub Gist: instantly share code, notes, and snippets.