Links
AddThe Louvre heist was an instant joke online — a joke that gets even funnier when you learn the museum's video surveillance password.
For as long as I have published my books, one of my overarching goals was to give credit to those who actually invented the hardware and software that we use.
I have spent 10,000+ hours to create an accurate record of their work but I'm not complaining. The 'as-close-to-possible'
Country borders don't return JSON, they return judgment. So I built a state machine for travel when governments won't expose your state.
Feeling like a kid in a candy store, once more
(this is also posted on O’Reilly’s Radar blog. Much thanks to Daniel Schauenberg, Morgan Evans, and Steven Shorrock for feedback on this) Before I begin this post, let me say that this is intended to be a critique of the Five Whys method, not a criticism of the people who are in favor of using…
Read how Google is using System Theoretic Process Analysis (STPA) to analyze pure software systems and discover risks.
Introducing fnox: A secret manager that pairs well with mise
It’s still legal to pick locks, even when you swing your legs.
Scan MCP Servers for vulnerabilities. Contribute to cisco-ai-defense/mcp-scanner development by creating an account on GitHub.
Diagram as Code Tool Written in Rust with Draggable Editing - RohanAdwankar/oxdraw
Design, test, and distribute Agent Skills with reusable templates, collaborative reviews, and multi-surface deployment.
Adding search capabilities your local LLM will make it significantly better.
The Banana Pi BPI-R4 Pro is a new router board based on MediaTek Filogic 880 (MT7988A) Cortex-A73 SoC offering two 10GbE SFP+ cages/RJ45 ports combos,