Blogs tagged "cybersecurity"

(54 blogs)View Posts

(Fabio Alessandro Locati|Fale)

(https://fale.io/)
#cybersecurity#go#python#personal life#shell#unix#git#aws#cloud computing#linux#devops#software development#databases#go#python#kubernetes#api#bash#cloud computing#performance#performance#sql#docker

Latest post: MACCHIATObin boot on serial port (13 days ago)

(https://aadityapurani.com/)
#cybersecurity

Latest post: [UTCTF 2019] Writeups (4 years ago)

(https://abhyrama.com/)
#engineering management#entrepreneurship#cybersecurity#software architecture#engineering leadership#management#personal life#distributed systems#software development

Latest post: Old and not jaded (6 months ago)

(https://alanstorm.com/)
#php#cybersecurity#node.js#python

Latest post: Accessing Docker Desktop’s Virtual Machine (3 months ago)

(https://andrewhoffman.me)
#cybersecurity#software architecture#javascript#software development#node.js#node.js

Latest post: Trusted Types: Future-proof XSS Defense (3 months ago)

(https://ankane.org)
#databases#machine learning#r#cybersecurity#ruby

Latest post: TensorFlow Object Detection in PHP (7 months ago)

(https://xn--izc.com/)
#cybersecurity#cpp#software architecture#engineering management#engineering leadership#software development#shell#math

Latest post: Promise Fatigue (5 months ago)

(https://ben.balter.com/)
#engineering management#cybersecurity

Latest post: Intro to GitHub for non-technical roles (17 days ago)

(https://benscheirman.com)
#git#swift#cybersecurity#ios

Latest post: Async/Await and the Future of Combine (2 years ago)

(https://www.bjornjohansen.com/)
#wordpress#cybersecurity

Latest post: Memento mori (4 years ago)

(https://bohops.com/)
#cybersecurity

Latest post: Investigating .NET CLR Usage Log Tampering Techniques For EDR Evasion (Part 2) (7 months ago)

(https://cloudberry.engineering)
#cybersecurity#cloud computing#cloud computing

Latest post: Foundations of a Multi-Cloud Security Strategy (2 years ago)

(https://emmanuelhayford.com/)
#web development#bash#cybersecurity#ruby#software testing

Latest post: 4 Books For Intermediate Ruby And Rails Developers. (9 months ago)

(https://ericlippert.com/)
#csharp#cybersecurity

Latest post: Bean Machine Retrospective, part 8 (23 days ago)

(https://blog.erratasec.com/)
#cybersecurity

Latest post: C can be memory-safe (2 months ago)

(https://danielpecos.com/)
#blockchain#cybersecurity#go#software architecture#node.js#java#kotlin#aws#typescript

Latest post: FOSDEM 2023 (a month ago)

(https://www.gkbrk.com/)
#cybersecurity#python#software development#cryptography#rust#unix

Latest post: Earthquake data for Turkey (4 months ago)

(https://blog.ovalerio.net/)
#python#cybersecurity#cryptocurrency#linux#web development#software development#personal life

Latest post: New release of “inlinehashes” (2 months ago)

(https://gru.gq/)
#cryptography#cybersecurity

Latest post: Albanian Cyber War (6 months ago)

(https://blog.codinghorror.com/)
#cloud computing#cybersecurity#software development

Latest post: The 2030 Self-Driving Car Bet (a year ago)

(https://jerrygamblin.com/)
#api#cybersecurity

Latest post: 2022 CVE Data Review (3 months ago)

(https://blog.jessfraz.com/)
#docker#linux#kubernetes#cybersecurity#cloud computing

Latest post: DUM-E and U (2 years ago)

(https://joshspicer.com)
#cybersecurity#shell#unix#linux#.net#personal life#docker

Latest post: Transparent Apple Watch Auth (with CloudFlare Client Certificates) (13 days ago)

(http://ocramius.github.io/)
#cybersecurity#git#performance

Latest post: BetterReflection version 2.0.0 released (6 years ago)

(https://matt.aimonetti.net/)
#machine learning#linux#cybersecurity

Latest post: Solving real time collaboration using Eventual Consistency (3 years ago)

(https://mattcasmith.net)
#cybersecurity#python#aws#cloud computing#sql

Latest post: Using winget to automate software deployment to a new laptop (a month ago)

(https://nelsonfigueroa.sh)
#cybersecurity#ruby#rails#devops#go

Latest post: Redirect One Domain to Another Using AWS S3 and CloudFront (a month ago)

(https://nfrechette.github.io/)
#performance#cybersecurity#linux#cpp

Latest post: Dominance based error estimation (21 days ago)

(http://www.client9.com/)
#css#go#linux#cybersecurity#php

Latest post: Logging Packages in Golang (5 years ago)

(https://www.shore.co.il/blog/)
#devops#linux#python#shell#docker#cloud computing#cybersecurity

Latest post: PEP 621 and Setuptools (a year ago)

(http://www.windytan.com/)
#cybersecurity

Latest post: Using HDMI radio interference for high-speed data transfer (19 days ago)

(http://blog.orange.tw/)
#python#cybersecurity

Latest post: A New Attack Surface on MS Exchange Part 4 - ProxyRelay! (5 months ago)

(https://privacylog.blogspot.com/)
#cybersecurity#databases

Latest post: Log4j2 more zero days (a year ago)

(https://rpadovani.com)
#cybersecurity#git#aws

Latest post: No heroes needed (9 days ago)

(https://mensfeld.pl)
#blockchain#engineering leadership#cybersecurity#ruby

Latest post: Kafka topics as code – declarative Kafka topics management in Ruby (4 days ago)

(https://sandrino.dev/)
#cybersecurity#node.js

Latest post: JWT Bearer Authentication and Authorization for ASP.NET Core 5 (2 years ago)

(https://www.schneier.com/)
#cybersecurity

Latest post: Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level (a day ago)

(https://www.scottbrady91.com)
#javascript#csharp#kotlin#cybersecurity#.net

Latest post: Challenges 7-12: Implementing and breaking AES ECB (a month ago)

(https://seanjziegler.com)
#api#aws#linux#cybersecurity#devops

Latest post: How to setup budget alerts and send weekly budget reports on AWS (2 years ago)

(https://serhack.me)
#blockchain#cryptocurrency#cybersecurity

Latest post: Reverse Engineering the OMNIVISION OS12D40 Driver (3 months ago)

(https://simon-frey.com/blog)
#entrepreneurship#go#cybersecurity#performance

Latest post: Closing down VitalFrog: 3 mistakes and 3 learnings (6 months ago)

(http://blog.joda.org/)
#java#cybersecurity

Latest post: Java on-ramp - Fully defined Entrypoints (5 months ago)

(https://www.cs.columbia.edu/~smb/blog/control/)
#cybersecurity

Latest post: Facebook, Abuse, and Metadata (3 years ago)

(https://flak.tedunangst.com/)
#cybersecurity#c#software development#cryptography

Latest post: from apples to pears (9 months ago)

(https://matt.copperwaite.net/blog/)
#cybersecurity

Latest post: Social Marketing (a day ago)

(https://the-empire.systems)
#linux#cybersecurity#unix#shell

Latest post: Sync Skyrim Mods Between Devices (with Syncthing) (2 months ago)

(https://www.thomasjost.com)
#cybersecurity#software architecture#software development#php#personal life

Latest post: 200 Sucess (a month ago)

(https://www.troyhunt.com)
#.net#cloud computing#cybersecurity

Latest post: Weekly Update 339 (2 days ago)

(https://victorzhou.com)
#machine learning#javascript#git#cybersecurity#node.js

Latest post: 2022 Update (5 months ago)

(https://dustri.org/b/)
#cybersecurity#c#python#php

Latest post: How to throw your ebook library at ipfs (17 days ago)

(https://bradleyjkemp.dev)
#cybersecurity

Latest post: Are you building features for phishers? (a year ago)

(https://eiken.dev/blog/)
#cybersecurity#linux#cryptography

Latest post: Cracking With Hashcat in the Cloud (a year ago)

(https://blog.etopiei.com)
#software development#personal life#bash#cybersecurity

Latest post: Welcome to my blog (6 years ago)

(https://www.packetmischief.ca/)
#unix#cybersecurity#aws#cloud computing

Latest post: Careful Control of Keys: How I Use MFA with the AWS CLI (21 days ago)