How to create a Mastodon account for your WordPress blog in five minutes Article 838 words, published Sep 20 2023 6 votes
What to know before you implement public-facing APIs programming Article 1685 words, published May 29 2024 9 votes
"Badness 0", a suckerpinch/tom7 video dive into typesetting, LLMs, and Donald Knuth Video 22:15 29 votes
Four in five CISOs have been told to downplay a potential risk’s severity security.cyber Article 661 words 9 votes
How we used esbuild to reduce our browser extension build times by 90% web development Article 3157 words 12 votes
Significant cyber incidents | Strategic technologies program security.cyber Article 8881 words 1 vote
Cloudflare uses deceptive business practices to bully customers into unnecessary enterprise plans Video 44:41 18 votes
Cybercriminals pose as "helpful" Stack Overflow users to push malware security.cyber Article 488 words 19 votes
Secrets from the algorithm: Google Search’s internal engineering documentation has leaked Link 30 votes
The little Linux distro that could - Tom's Root Boot (2001) linux Article 890 words, published Dec 20 2001 12 votes
React, Electron, and LLMs have a common purpose: the labour arbitrage theory of dev tool popularity programming web development Article 2138 words 31 votes
On the XZ Utils backdoor (CVE-2024-3094): FOSS delivered on its pitfalls and strengths security linux open source Link 27 votes
Write alternative text as if you’re describing the image to a friend web development Article 1153 words 19 votes
Bug in glibc's iconv() function allows for RCE in PHP servers by setting charset to ISO-2022-CN-EXT to trigger buffer overflow (CVE-2024-2961) security.cyber Link 9 votes
When provided with CVE descriptions of 15 different vulnerabilities and a set of tools useful for exploitation, GPT-4 was capable of autonomously exploiting 13 of which, yielding an 87% success rate security.cyber PDF 17 votes
Twitter replaces twitter.com with x.com without user consent. Bad implementation invites an influx of Phishing attacks. (german source) security.cyber Article 271 words 48 votes
Critical vulnerability in Rust's Command library allows for command injection when using its API to invoke batch scripts with arguments on Windows systems (CVE-2024-24576) security.cyber programming languages Article 450 words 18 votes
Backdoor in upstream libxz targeting sshd linux security.cyber open source Article 1967 words 104 votes
Windows Copilot key is secretly from the IBM era — but you can remap it with the right tools Link 10 votes