• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1
https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/

Unauthorized TLS certificates were issued for 1.1.1.1 by a Certification Authority without permission from Cloudflare. These rogue certificates have now been revoked. Read our blog to see how this could affect you.

 
certificates cloudflare incident security
Added 4 days ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Unimog - Cloudflare’s edge load balancer
https://blog.cloudflare.com/unimog-cloudflares-edge-load-balancer/

Unimog is the Layer 4 Load Balancer for Cloudflare’s edge data centers. This post explains the problems it solves and how it works.

 
balancing load
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
 
malware privacy security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Wonk post: chosen ciphertext security in public-key encryption (Part 1) – A
https://blog.cryptographyengineering.com/2018/04/21/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-1/

In general I try to limit this blog to posts that focus on generally-applicable techniques in cryptography. That is, I don't focus on the deeply wonky. But this post is going to be an exception. Today, I'm going to talk about a topic that most "typical" implementers don't -- and shouldn't -- think about. Specifically:…

 
encryption
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://blog.docker.com/2018/12/simplifying-kubernetes-with-docker-compose-and-friends/
https://blog.docker.com/2018/12/simplifying-kubernetes-with-docker-compose-and-friends/

This year at Microsoft Build, Docker will blend developer experience, security, and AI innovation with our latest product announcements. Whether you attend in person at the Seattle Convention Center or tune in online, you’ll see how Docker is redefining the way teams build, secure, and scale modern applications. Docker’s Vision for Developers At Microsoft Build...

 
docker k8s
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Announcing Flux by Black Forest Labs: The Next Leap in Text-to-Image Models
https://blog.fal.ai/flux-the-largest-open-sourced-text2img-model-now-available-on-fal/

Experience Flux the largest open-source text-to-image model with 12B parameters, now on fal! Generate stunning visuals faster and with exceptional quality. Try the demo today!

 
ai image open source text
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
GitHub Actions Security Best Practices [cheat sheet included]
https://blog.gitguardian.com/github-actions-security-cheat-sheet/

Learn how to secure your GitHub Actions with these best practices! From controlling credentials to using specific action version tags, this cheat sheet will help you protect against supply-chain attacks. Don't let a malicious actor inject code into your repository - read now!

 
best practises cicd github security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Gemini CLI GitHub Actions: AI coding made for collaboration
https://blog.google/technology/developers/introducing-gemini-cli-github-actions/

Today, we’re introducing Gemini CLI GitHub Actions. It’s a no-cost, powerful AI coding teammate for your repository. It acts both as an autonomous agent for critical routine coding tasks, and an on-demand collaborator you can quickly delegate work to.

 
actions ai github google llm
Added 1 month ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Google announces Gemini CLI: your open-source AI agent
https://blog.google/technology/developers/introducing-gemini-cli-open-source-ai-agent/

Free and open source, Gemini CLI brings Gemini directly into developers’ terminals — with unmatched access for individuals.

 
ai cli google llm open source technology
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Netcat – All you need to know
https://blog.ikuamike.io/posts/2021/netcat/

Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc… If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.

 
networking tools
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
OpenSSH Backdoors
https://blog.isosceles.com/openssh-backdoors/

Imagine this: an OpenSSH backdoor is discovered, maintainers rush to push out a fixed release package, security researchers trade technical details on mailing lists to analyze the backdoor code. Speculation abounds on the attribution and motives of the attacker, and the tech media pounces on the story. A near miss

 
history ssh vulnerability
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Bluetooth Trackball Mark II
https://blog.jfedor.org/2021/01/bluetooth-trackball-mark-ii.html
 
hacking hardware hci trackball
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Writing Toy Software Is A Joy
https://blog.jsbarretto.com/post/software-is-joy

Why you should write more toy programs

 
fun software
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The Ultimate Guide to Error Handling in Python - miguelgrinberg.com
https://blog.miguelgrinberg.com/post/the-ultimate-guide-to-error-handling-in-python

miguelgrinberg.com

 
programming python
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Celebrating An Important Step Forward For Open Source AI
https://blog.mozilla.org/en/mozilla/ai/open-source-ai-definition/

TL;DR: Mozilla is excited about today’s new definition of open source AI, and we endorse it as an important step forward. This past year has been marked

 
ai open source
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
NGINX Introduces Native Support for ACME Protocol  – NGINX Community Blog
https://blog.nginx.org/blog/native-support-for-acme-protocol
 
http
Added 3 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
blog.openpolicyagent.org
https://blog.openpolicyagent.org/note-from-teemu-tim-and-torin-to-the-open-policy-agent-community-2dbbfe494371
 
open source policy
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Exploiting CI / CD Pipelines for fun and profit – Razz Security Blog
https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/
 
cicd security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Aerc: a Well-Crafted Tui for Email
https://blog.sergeantbiggs.net/posts/aerc-a-well-crafted-tui-for-email/
 
email tui
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://blog.summercat.com/configuring-mixed-dpi-monitors-with-xrandr.html
https://blog.summercat.com/configuring-mixed-dpi-monitors-with-xrandr.html

I use xrandr to configure a dual monitor setup with a high DPI and low DPI monitor on Linux. I also use it to switch back and forth between a dual monitor and a single monitor setup.

 
display dpi linux
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Introducing Kubernetes Academy Brought to You by VMware—A Free Cloud Native
https://blogs.vmware.com/cloudnative/2019/08/27/introducing-kubernetes-academy-free-cloud-native-education-platform/
 
k8s training
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Our audit of Homebrew | Trail of Bits Blog
https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/

This is a joint post with the Homebrew maintainers; read their announcement here! Last summer, we performed an audit of Homebrew. Our audit’s scope included Homebrew/brew itself (home of the brew CLI), and three adjacent repositories responsible for various security-relevant aspects of Homebrew’s operation: Homebrew/actions: a repository of custom GitHub Actions used […]

 
macos security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Introducing Rezolus
https://blog.twitter.com/engineering/en_us/topics/open-source/2019/introducing-rezolus.html
 
performance
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
DOOM: The Gallery Experience
https://bobatealee.itch.io/doom-the-gallery-experience

An artistic parody of the ultimate classic

 
art games
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • ...
  • 44
  • 45
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks