programming - metaprog
Collects the following groups: https://azorius.net/g/cloudsecAbout
https://azorius.net/g/cryptography
https://azorius.net/g/programming
https://azorius.net/g/webdev
https://azorius.net/g/versioncontrol
https://lemmy.ml/c/cryptography
https://sh.itjust.works/c/cybersecurity
https://programming.dev/c/programming
https://programming.dev/c/rust
https://lemmy.ml/c/rust
https://programming.dev/c/golang
https://lemmy.world/c/netsec
mods: tedu
Software selling, is it viable for indie devs
in programming@programming.dev from Mhad1@lemmy.zip on 31 May 13:06
comments (11)
in programming@programming.dev from Mhad1@lemmy.zip on 31 May 13:06
comments (11)
Quick Survey: Understanding Rust Open Source Contributors
(tripetto.app)
in rust@programming.dev from ExLisper@lemmy.curiana.net on 31 May 11:24
comments (0)
in rust@programming.dev from ExLisper@lemmy.curiana.net on 31 May 11:24
comments (0)
Java at 30: How a language designed for a failed gadget became a global powerhouse
(www.zdnet.com)
in programming@programming.dev from cm0002@lemmy.world on 31 May 07:36
comments (5)
in programming@programming.dev from cm0002@lemmy.world on 31 May 07:36
comments (5)
‘AI’ as Class Warfare
(newintermag.com)
in programming@programming.dev from pylapp@programming.dev on 31 May 07:27
comments (0)
in programming@programming.dev from pylapp@programming.dev on 31 May 07:27
comments (0)
Reinvent the Wheel
(endler.dev)
in programming@programming.dev from learnbyexample@programming.dev on 31 May 04:15
comments (5)
in programming@programming.dev from learnbyexample@programming.dev on 31 May 04:15
comments (5)
parking_lot: ffffffffffffffff...
(fly.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 31 May 02:27
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 31 May 02:27
comments (0)
The radix 2^51 trick
(www.chosenplaintext.ca)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 31 May 00:51
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 31 May 00:51
comments (0)
Surprisingly Fast AI-Generated Kernels We Didn’t Mean to Publish (Yet)
(crfm.stanford.edu)
in programming@programming.dev from Pro@programming.dev on 30 May 23:09
comments (0)
in programming@programming.dev from Pro@programming.dev on 30 May 23:09
comments (0)
Automattic will resume contributing to the WordPress project, after announcing a pause in April
(automattic.com)
in programming@programming.dev from Pro@programming.dev on 30 May 19:36
comments (7)
in programming@programming.dev from Pro@programming.dev on 30 May 19:36
comments (7)
Victoria’s Secret takes down website after security incident
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 18:08
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 18:08
comments (2)
Russian-linked hackers target UK Defense Ministry while posing as journalists
(kyivindependent.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 18:01
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 18:01
comments (1)
CISA Releases Guidance on SIEM and SOAR Implementation - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:57
comments (0)
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:48
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:48
comments (0)
MITRE Publishes Post-Quantum Cryptography Migration Roadmap - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:40
comments (0)
New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:24
comments (0)
ConnectWise breached in cyberattack linked to nation-state hackers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:17
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:17
comments (0)
New Browser Exploit Technique Undermines Phishing Detection - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:09
comments (0)
Threat Actor Claims TikTok Breach, Puts 428 Million Records Up for Sale
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:01
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 17:01
comments (1)
Threat actors abuse Google Apps Script in evasive phishing attacks
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:56
comments (0)
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:49
comments (0)
Cybersecurity Firm SentinelOne Suffers Major Outage
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 16:43
comments (0)
Mandatory Ransomware Payment Disclosure Begins in Australia - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 15:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 15:54
comments (0)
Syft and Grype for SBOM management
in programming@programming.dev from pylapp@programming.dev on 30 May 15:45
comments (0)
in programming@programming.dev from pylapp@programming.dev on 30 May 15:45
comments (0)
US Banks Urge SEC to Repeal Cyber Disclosure Rule - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 15:11
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 15:11
comments (2)
Turning Portal 2 into a Web Server
(www.youtube.com)
in programming@programming.dev from Occhioverde@feddit.it on 30 May 14:10
comments (0)
dupe: programming@programming.dev (1)
in programming@programming.dev from Occhioverde@feddit.it on 30 May 14:10
comments (0)
dupe: programming@programming.dev (1)
A break from programming languages
(lexi-lambda.github.io)
in programming@programming.dev from crmsnbleyd@sopuli.xyz on 30 May 13:51
comments (4)
in programming@programming.dev from crmsnbleyd@sopuli.xyz on 30 May 13:51
comments (4)
Unimed's chat leak exposes health secrets | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:46
comments (0)
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:44
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:44
comments (1)
Malware Analysis Reveals Sophisticated RAT With Corrupted Headers
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 May 13:44
comments (0)
Modern C++ — RAII
(green7ea.github.io)
in programming@programming.dev from namingthingsiseasy@programming.dev on 30 May 13:41
comments (0)
in programming@programming.dev from namingthingsiseasy@programming.dev on 30 May 13:41
comments (0)
April Project Goals Update
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 29 May 16:21
comments (3)
in rust@programming.dev from neme@lemm.ee on 29 May 16:21
comments (3)
Redesigning the Initial Bootstrap Sequence
(blog.rust-lang.org)
in rust@programming.dev from cm0002@lemmy.world on 29 May 15:52
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 29 May 15:52
comments (0)
APT41 malware abuses Google Calendar for stealthy C2 communication
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:43
comments (0)
Hackers Exploit Cloudflare Tunnels to Launch Stealthy Cyberattacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:40
comments (0)
Threat Actors Exploit Top Domain Zones for Cyber Attacks
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:40
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 15:40
comments (0)
Do you actually audit open source projects you download?
in cybersecurity@sh.itjust.works from OhVenus_Baby@lemmy.ml on 29 May 14:26
comments (8)
in cybersecurity@sh.itjust.works from OhVenus_Baby@lemmy.ml on 29 May 14:26
comments (8)
Tangled is a github alternative on atproto.
(tangled.sh)
in programming@programming.dev from irelephant@programming.dev on 29 May 13:56
comments (8)
in programming@programming.dev from irelephant@programming.dev on 29 May 13:56
comments (8)
More than $12 million stolen from crypto platform Cork Protocol
(therecord.media)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 13:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 13:00
comments (0)
364,000 Impacted by Data Breach at LexisNexis Risk Solutions - SecurityWeek
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:59
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:59
comments (1)
Data leak exposes 1.6M Etsy customer emails | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:59
comments (0)
RE/MAX allegedly hit by hacker attack | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 29 May 12:58
comments (0)
Get kde theme colors atyle
in rust@lemmy.ml from Zenlix@lemm.ee on 28 May 16:03
comments (0)
in rust@lemmy.ml from Zenlix@lemm.ee on 28 May 16:03
comments (0)
How Microsoft Developers Use AI in Real-World Coding | BRK103 (YouTube, 1h)
(www.youtube.com)
in programming@programming.dev from Kissaki@programming.dev on 29 May 10:36
comments (5)
in programming@programming.dev from Kissaki@programming.dev on 29 May 10:36
comments (5)
Thousands of Asus routers are being hit with stealthy, persistent backdoors
(arstechnica.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 May 01:49
comments (14)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 29 May 01:49
comments (14)
Made a derive macro to easily get all of an enum's variants
(crates.io)
in rust@programming.dev from AshrafIbrahim03@programming.dev on 29 May 01:11
comments (3)
in rust@programming.dev from AshrafIbrahim03@programming.dev on 29 May 01:11
comments (3)
Requesting Feedback on a Domain Specific Programming Language (DSL) for Network Analysis that I wrote
in rust@programming.dev from thevoidzero@lemmy.world on 28 May 22:26
comments (0)
in rust@programming.dev from thevoidzero@lemmy.world on 28 May 22:26
comments (0)
Texas Cyber Command will mean ‘expanding’ cybersecurity help, state official says
(www.route-fifty.com)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 28 May 21:54
comments (1)
in cybersecurity@sh.itjust.works from Amoxtli@thelemmy.club on 28 May 21:54
comments (1)
Exploring the JavaScript Temporal API - Supported in Firefox 139.0
(kcode.de)
in programming@programming.dev from Kissaki@programming.dev on 28 May 21:07
comments (0)
in programming@programming.dev from Kissaki@programming.dev on 28 May 21:07
comments (0)
Appwrite announced the launch of Appwrite Sites, calling it "The open source Vercel alternative"
(appwrite.io)
in programming@programming.dev from otters_raft@lemmy.ca on 28 May 20:00
comments (1)
in programming@programming.dev from otters_raft@lemmy.ca on 28 May 20:00
comments (1)
Czech Republic accuses China’s APT31 of a cyberattack on its Foreign Ministry
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
Interlock ransomware gang deploys new NodeSnake RAT on universities
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:58
comments (0)
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:38
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 18:38
comments (2)
GitHub becomes go-to platform for malware delivery across Europe - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:56
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:56
comments (0)
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:49
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:49
comments (0)
Vulnerabilities found in NASA's open source software - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:08
comments (0)
MATLAB dev confirms ransomware attack behind service outage
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:00
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 17:00
comments (0)
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Sophos News
(news.sophos.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:32
comments (0)
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption - Infosecurity Magazine
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:08
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 16:08
comments (1)
94 billion browser cookies sold on Telegram | Cybernews
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 15:56
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 28 May 15:56
comments (2)
Requesting Feedback on a Domain Specific Programming Language (DSL) for Network Analysis that I wrote
in rust@lemmy.ml from thevoidzero@lemmy.world on 27 May 23:15
comments (0)
in rust@lemmy.ml from thevoidzero@lemmy.world on 27 May 23:15
comments (0)
UK Envoy Urges Transatlantic Tech Alliance, Cites China Threat
(www.bloomberg.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 06:00
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 06:00
comments (0)
Dutch intelligence report says Russian hacker group stole data on 63,000 police officers, targeted NATO government systems
(theins.ru)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 05:44
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 28 May 05:44
comments (0)
UCSD Pascal In Depth
(markbessey.blog)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 28 May 05:09
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 28 May 05:09
comments (0)
Don't click on that Facebook ad for a text-to-AI-video tool
(go.theregister.com)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 May 02:00
comments (5)
in cybersecurity@sh.itjust.works from PhilipTheBucket@ponder.cat on 28 May 02:00
comments (5)
BIOS under attack: hackers increasingly focus on boot threats
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:36
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:36
comments (7)
Major AT&T leak exposed 31M records, hackers claim
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:30
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:30
comments (0)
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 19:08
comments (0)
Coca-Cola, Bottling Partner Named in Separate Ransomware and Data Breach Claims
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:57
comments (0)
GitHub MCP Server Vulnerability Let Attackers Access Private Repositories
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:43
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:43
comments (0)
Malicious Machine Learning Model Attack Discovered on PyPI
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:26
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:26
comments (0)
Adidas warns of data breach after customer service provider hack
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:20
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:20
comments (0)
Windows Server emergency update fixes Hyper-V VM freezes, restart issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:16
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:16
comments (1)
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:09
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 18:09
comments (0)
New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 17:55
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 May 17:55
comments (1)
Qt Bridges To Take The UI Toolkit To New Programming Languages: Rust, C#, Java & Swift
(www.phoronix.com)
in programming@programming.dev from cm0002@lemmy.world on 27 May 20:43
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 27 May 20:43
comments (2)
FOSS Browser replacement projects?
in programming@programming.dev from peoplebeproblems@midwest.social on 27 May 17:55
comments (14)
in programming@programming.dev from peoplebeproblems@midwest.social on 27 May 17:55
comments (14)
The Copilot Delusion
(deplet.ing)
in programming@programming.dev from exu@feditown.com on 27 May 15:23
comments (20)
in programming@programming.dev from exu@feditown.com on 27 May 15:23
comments (20)
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
(www.microsoft.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 May 11:06
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 27 May 11:06
comments (0)
Intercept and Monitor TLS Traffic with mitmproxy Using Podman - Infosec.Pub
(infosec.pub)
in cybersecurity@sh.itjust.works from starkzarn@infosec.pub on 26 May 18:16
comments (0)
in cybersecurity@sh.itjust.works from starkzarn@infosec.pub on 26 May 18:16
comments (0)
Multiple French govt institutions’ emails, passwords exposed, hackers claim
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:31
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:31
comments (1)
NIST proposes new metric to gauge exploited vulnerabilities - Help Net Security
(www.helpnetsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 12:08
comments (0)
FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 11:49
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 May 11:49
comments (2)
Rust Makes Progress On Async Rust Experience, Stabilizing Tooling For Rust In The Kernel
(www.phoronix.com)
in rust@programming.dev from cm0002@lemmy.world on 26 May 17:10
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 26 May 17:10
comments (0)
Demoting i686-pc-windows-gnu to Tier 2
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 26 May 14:56
comments (8)
in rust@programming.dev from neme@lemm.ee on 26 May 14:56
comments (8)
Sad story of http.DefaultTransport (Golang)
(antonz.org)
in golang@programming.dev from cm0002@lemmy.world on 26 May 17:52
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 May 17:52
comments (0)
You probably don't need a DI framework in Golang
(rednafi.com)
in golang@programming.dev from cm0002@lemmy.world on 26 May 17:51
comments (0)
in golang@programming.dev from cm0002@lemmy.world on 26 May 17:51
comments (0)
Researchers cause GitLab AI developer assistant to turn safe code malicious - Ars Technica
(arstechnica.com)
in programming@programming.dev from otters_raft@lemmy.ca on 26 May 21:00
comments (1)
in programming@programming.dev from otters_raft@lemmy.ca on 26 May 21:00
comments (1)
Hacker News now runs on top of Common Lisp - Lisp journey
(lisp-journey.gitlab.io)
in programming@programming.dev from mesamunefire@piefed.social on 26 May 19:48
comments (2)
in programming@programming.dev from mesamunefire@piefed.social on 26 May 19:48
comments (2)
500 Lines or LessDagoba: An In-Memory Graph Database
(aosabook.org)
in programming@programming.dev from cm0002@lemmy.world on 26 May 16:19
comments (0)
in programming@programming.dev from cm0002@lemmy.world on 26 May 16:19
comments (0)
Why does Codeberg use Woodpecker CI?
in programming@programming.dev from staircase@programming.dev on 26 May 15:31
comments (4)
in programming@programming.dev from staircase@programming.dev on 26 May 15:31
comments (4)
An Elaborate GitHub Comment on Microsoft's new `edit` CLI Text Editor Asking for Simplicity and Predictability
(github.com)
in programming@programming.dev from Kissaki@programming.dev on 26 May 09:23
comments (15)
in programming@programming.dev from Kissaki@programming.dev on 26 May 09:23
comments (15)
Claude Code does our releases now
(www.aluxian.com)
in programming@programming.dev from Pro@programming.dev on 26 May 07:43
comments (19)
in programming@programming.dev from Pro@programming.dev on 26 May 07:43
comments (19)
Jetbrains no longer offer fallback versions?
in programming@programming.dev from liori@lemm.ee on 25 May 23:55
comments (5)
in programming@programming.dev from liori@lemm.ee on 25 May 23:55
comments (5)
I coded an app over 3 months that might be useful for some people. What are the next steps?
in programming@programming.dev from yukaii@programming.dev on 25 May 15:57
comments (18)
in programming@programming.dev from yukaii@programming.dev on 25 May 15:57
comments (18)
Actually stopping AI scrapers from taking down my server
(jade.ellis.link)
in programming@programming.dev from JadedBlueEyes@programming.dev on 25 May 13:22
comments (5)
in programming@programming.dev from JadedBlueEyes@programming.dev on 25 May 13:22
comments (5)
Rust Coreutils 0.1 Released With Big Performance Gains - Can Match Or Exceed GNU Speed
(www.phoronix.com)
in rust@programming.dev from clot27@lemm.ee on 25 May 15:13
comments (27)
in rust@programming.dev from clot27@lemm.ee on 25 May 15:13
comments (27)
Making the rav1d Video Decoder 1% Faster
(ohadravid.github.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 25 May 00:24
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 25 May 00:24
comments (0)
Has anyone created an AI tarpit for images yet?
in programming@programming.dev from hihi24522@lemm.ee on 25 May 00:51
comments (30)
in programming@programming.dev from hihi24522@lemm.ee on 25 May 00:51
comments (30)
List of tutorials to learn videogame development
in programming@programming.dev from Allah@lemm.ee on 24 May 18:25
comments (20)
in programming@programming.dev from Allah@lemm.ee on 24 May 18:25
comments (20)
Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
(www.wired.com)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 May 17:45
comments (1)
in cybersecurity@sh.itjust.works from neme@lemm.ee on 24 May 17:45
comments (1)
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack
(blog.kandji.io)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 May 12:43
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 24 May 12:43
comments (0)
Readers Annoyed When Fantasy Novel Accidentally Leaves AI Prompt in Published Version, Showing Request to Copy Another Writer's Style
(futurism.com)
in programming@programming.dev from recursive_recursion@lemmy.ca on 24 May 06:30
comments (44)
in programming@programming.dev from recursive_recursion@lemmy.ca on 24 May 06:30
comments (44)
A brief history of JavaScript
(deno.com)
in programming@programming.dev from Pro@programming.dev on 24 May 00:48
comments (9)
in programming@programming.dev from Pro@programming.dev on 24 May 00:48
comments (9)
Provision forgejo on k8s with c4k
(repo.prod.meissa.de)
in programming@programming.dev from cm0002@lemmy.world on 23 May 18:05
comments (2)
in programming@programming.dev from cm0002@lemmy.world on 23 May 18:05
comments (2)
German Cyber Agency Sounds Warning on Grid Vulnerabilities across Europe
(www.bankinfosecurity.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 13:08
comments (6)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 13:08
comments (6)
Oxidise Your Command Line (2025 Edition)
(videos.abnormalbeings.space)
in rust@programming.dev from AbnormalHumanBeing@lemmy.abnormalbeings.space on 23 May 06:20
comments (7)
in rust@programming.dev from AbnormalHumanBeing@lemmy.abnormalbeings.space on 23 May 06:20
comments (7)
Denmark finds ‘suspicious’ components in key infrastructure imports, raising concerns about espionage and energy security
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 06:00
comments (5)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 23 May 06:00
comments (5)
This Week in Rust 600
(this-week-in-rust.org)
in rust@programming.dev from cm0002@lemmy.world on 22 May 22:00
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 22 May 22:00
comments (0)
We’ll be ending web hosting for your apps on Glitch
(blog.glitch.com)
in programming@programming.dev from Pro@programming.dev on 22 May 20:22
comments (1)
in programming@programming.dev from Pro@programming.dev on 22 May 20:22
comments (1)
If AI is so good at coding - where are the open source contributions?
(pivot-to-ai.com)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 May 18:17
comments (121)
in programming@programming.dev from HaraldvonBlauzahn@feddit.org on 22 May 18:17
comments (121)
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says
(gbhackers.com)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 May 16:31
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 22 May 16:31
comments (0)
GitHub PR of Copilot AI agent "fixing" a bug in official .NET repo
(github.com)
in programming@programming.dev from vermaterc@lemmy.ml on 22 May 15:10
comments (3)
in programming@programming.dev from vermaterc@lemmy.ml on 22 May 15:10
comments (3)
Hacker who breached communications app used by Trump aide stole data from across US government
(www.reuters.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:42
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:42
comments (1)
Pandas Galore: Chinese Hackers Boost Attacks in Latin America
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:24
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 14:24
comments (0)
Unpatched Windows Server Flaw Threatens Active Directory Users
(www.darkreading.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:55
comments (0)
Russian hackers breach orgs to track aid routes to Ukraine
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 May 13:54
comments (0)
How do I keep all the data I need in one single place for my website?
in programming@programming.dev from dontblink@feddit.it on 22 May 10:07
comments (8)
in programming@programming.dev from dontblink@feddit.it on 22 May 10:07
comments (8)
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
(krebsonsecurity.com)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 May 09:22
comments (3)
in cybersecurity@sh.itjust.works from BrikoX@lemmy.zip on 22 May 09:22
comments (3)
“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall
(arstechnica.com)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 22 May 04:12
comments (5)
in cybersecurity@sh.itjust.works from floofloof@lemmy.ca on 22 May 04:12
comments (5)
Go Scheduler
(nghiant3223.github.io)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 May 22:40
comments (0)
in inks@inks.tedunangst.com from tedu@inks.tedunangst.com on 21 May 22:40
comments (0)
Lumma infostealer malware operation disrupted, 2,300 domains seized
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 May 19:11
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 21 May 19:11
comments (0)
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 17:51
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 17:51
comments (0)
Would this be helpful for you? Help?!
in programming@programming.dev from Kevisthename@lemmy.world on 21 May 17:00
comments (0)
in programming@programming.dev from Kevisthename@lemmy.world on 21 May 17:00
comments (0)
The US, France, Germany, and eight other countries say Russia has stepped up cyber attacks on firms aiding Ukraine, often via Fancy Bear.
(www.cisa.gov)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 16:19
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 21 May 16:19
comments (0)
Rust turns 10: How a broken elevator changed software forever
(www.zdnet.com)
in rust@lemmy.ml from Occhioverde@feddit.it on 21 May 09:14
comments (0)
dupe: rust@programming.dev (4)
in rust@lemmy.ml from Occhioverde@feddit.it on 21 May 09:14
comments (0)
dupe: rust@programming.dev (4)
What's your favorite IDE right now?
in programming@programming.dev from rklm@lemmy.dbzer0.com on 21 May 02:05
comments (111)
in programming@programming.dev from rklm@lemmy.dbzer0.com on 21 May 02:05
comments (111)
Stack overflow is almost dead
(blog.pragmaticengineer.com)
in programming@programming.dev from abobla@lemm.ee on 20 May 21:55
comments (80)
in programming@programming.dev from abobla@lemm.ee on 20 May 21:55
comments (80)
The Dumbest Move in Tech Right Now: Laying Off Developers Because of AI
(ppaolo.substack.com)
in programming@programming.dev from mesamunefire@piefed.social on 20 May 20:36
comments (119)
in programming@programming.dev from mesamunefire@piefed.social on 20 May 20:36
comments (119)
Anyone else dealing with this, hiring freeze for new devs but more work/projects?
in programming@programming.dev from mesamunefire@piefed.social on 20 May 20:27
comments (18)
in programming@programming.dev from mesamunefire@piefed.social on 20 May 20:27
comments (18)
Moneros ASIC resistance failed - but in a different way.
in programming@programming.dev from FreiFiand@monero.town on 20 May 20:03
comments (1)
in programming@programming.dev from FreiFiand@monero.town on 20 May 20:03
comments (1)
SK Telecom says malware breach lasted 3 years, impacted 27 million numbers
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 19:31
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 19:31
comments (1)
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
(research.checkpoint.com)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 May 18:10
comments (0)
in cybersecurity@sh.itjust.works from Pro@programming.dev on 20 May 18:10
comments (0)
New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 17:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 17:35
comments (0)
EU High Level Group (established by EU commission) recommends forcing all devices in the EU to be sold with ”integrated Law Enforcement access” and sanctioning non-EU approved messaging services
(home-affairs.ec.europa.eu)
in cybersecurity@sh.itjust.works from deinu@sh.itjust.works on 20 May 17:16
comments (6)
in cybersecurity@sh.itjust.works from deinu@sh.itjust.works on 20 May 17:16
comments (6)
Service desks are under attack: What can you do about it?
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:52
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:52
comments (1)
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:47
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:47
comments (1)
LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:39
comments (0)
RVTools hit in supply chain attack to deliver Bumblebee malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 16:32
comments (0)
async/await versus the Calloop Model
(notgull.net)
in rust@programming.dev from cm0002@lemmy.world on 20 May 14:37
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 20 May 14:37
comments (0)
Interlock ransomware evolving under the radar
(blog.sekoia.io)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 13:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 13:02
comments (0)
DDoSecrets Adds 410GB of TeleMessage Breach Data to Index
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:34
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:34
comments (2)
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:23
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:23
comments (2)
Windows 10 emergency updates fix BitLocker recovery issues
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:11
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 12:11
comments (1)
O2 UK patches bug leaking mobile user location from call metadata
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 May 11:55
comments (0)
How do i extract encrypted video blobs?
in programming@programming.dev from JiminaMann@lemmy.world on 20 May 08:30
comments (16)
in programming@programming.dev from JiminaMann@lemmy.world on 20 May 08:30
comments (16)
About to build a p2p lemmy client on plebbit. What should I call it ?
in programming@programming.dev from RetiredCoder@lemmy.world on 19 May 22:15
comments (5)
in programming@programming.dev from RetiredCoder@lemmy.world on 19 May 22:15
comments (5)
Go Cryptography Security Audit
(go.dev)
in programming@programming.dev from who@feddit.org on 19 May 18:58
comments (0)
dupe: golang@programming.dev (0)
in programming@programming.dev from who@feddit.org on 19 May 18:58
comments (0)
dupe: golang@programming.dev (0)
This Simple Algorithm Powers Real Interpreters: Pratt Parsing - YouTube
(youtube.com)
in programming@programming.dev from ruffsl@programming.dev on 19 May 18:49
comments (4)
dupe: rust@programming.dev (0)
in programming@programming.dev from ruffsl@programming.dev on 19 May 18:49
comments (4)
dupe: rust@programming.dev (0)
Japan passed a law allowing preemptive offensive cyber actions
(securityaffairs.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 18:11
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 18:11
comments (1)
Apple’s Widget Backdoor
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 19 May 18:10
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 19 May 18:10
comments (1)
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:59
comments (0)
Ransomware gang INC claims recent attack on South African Airways - Comparitech
(www.comparitech.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:28
comments (0)
Russian APT Exploiting Mail Servers Against Government, Defense Organizations
(www.securityweek.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:22
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:22
comments (0)
Ransomware gangs increasingly use Skitnet post-exploitation malware
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 16:14
comments (0)
Massive data leak: 200 billion files exposed in cloud buckets
(cybernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:23
comments (0)
New 'Defendnot' tool tricks Windows into disabling Microsoft Defender
(www.bleepingcomputer.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:12
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 14:12
comments (1)
Detecting malicious Unicode
(daniel.haxx.se)
in programming@programming.dev from floofloof@lemmy.ca on 19 May 13:46
comments (9)
in programming@programming.dev from floofloof@lemmy.ca on 19 May 13:46
comments (9)
How Scattered Spider TTPs are evolving in 2025
(pushsecurity.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 11:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 May 11:05
comments (0)
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine
(web.archive.org)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 07:37
comments (0)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 07:37
comments (0)
Russian hackers are interested in chaos and money, says NATO cyber defense director
(news.err.ee)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 06:57
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 19 May 06:57
comments (1)
I'm thinking of creating a website and l'm thinking of using docker in the process. How do I use it in the creation of my website ?
in programming@programming.dev from Docker@lemmy.world on 19 May 04:38
comments (11)
in programming@programming.dev from Docker@lemmy.world on 19 May 04:38
comments (11)
Lisp. But Why?
(www.youtube.com)
in programming@programming.dev from cm0002@lemmy.world on 18 May 21:11
comments (1)
in programming@programming.dev from cm0002@lemmy.world on 18 May 21:11
comments (1)
This Week in Rust 599
(this-week-in-rust.org)
in rust@programming.dev from cm0002@lemmy.world on 18 May 15:47
comments (0)
in rust@programming.dev from cm0002@lemmy.world on 18 May 15:47
comments (0)
Announcing iceoryx2 v0.6 | True Zero-Copy Inter-Prozess Communication
(ekxide.io)
in rust@programming.dev from elBoberido@programming.dev on 18 May 15:43
comments (2)
dupe: programming@programming.dev (3)
in rust@programming.dev from elBoberido@programming.dev on 18 May 15:43
comments (2)
dupe: programming@programming.dev (3)
C Programming: Pointer Analogy
in programming@programming.dev from Ryick@lemm.ee on 18 May 12:41
comments (15)
in programming@programming.dev from Ryick@lemm.ee on 18 May 12:41
comments (15)
[Embedded] Can someone sanity check my NOR memory structure for me?
in programming@programming.dev from JustEnoughDucks@feddit.nl on 18 May 09:33
comments (7)
in programming@programming.dev from JustEnoughDucks@feddit.nl on 18 May 09:33
comments (7)
ASCII Skyline - a terminal-based recreation of an old screensaver I loved as a kid
in programming@programming.dev from whelk@lemm.ee on 18 May 03:39
comments (9)
in programming@programming.dev from whelk@lemm.ee on 18 May 03:39
comments (9)
Everything Started with the Promise of Loosely Coupled Systems
(newsletter.systemdesignclassroom.com)
in programming@programming.dev from RagingHungryPanda@lemm.ee on 17 May 20:29
comments (7)
in programming@programming.dev from RagingHungryPanda@lemm.ee on 17 May 20:29
comments (7)
Git Your Freedom Back: A Beginner's Guide to SourceHut
(btxx.org)
in programming@programming.dev from Pro@programming.dev on 17 May 20:48
comments (10)
in programming@programming.dev from Pro@programming.dev on 17 May 20:48
comments (10)
Public Money - Public Code
(publiccode.eu)
in programming@programming.dev from lena@gregtech.eu on 17 May 17:27
comments (0)
in programming@programming.dev from lena@gregtech.eu on 17 May 17:27
comments (0)
Seeking to make a dynamic website right from the scratch. This is going to be my very first project. How to begin ?
in programming@programming.dev from Docker_84@lemmy.ml on 17 May 16:51
comments (9)
in programming@programming.dev from Docker_84@lemmy.ml on 17 May 16:51
comments (9)
Don't Guess My Language
(vitonsky.net)
in programming@programming.dev from vitonsky@programming.dev on 17 May 14:52
comments (4)
in programming@programming.dev from vitonsky@programming.dev on 17 May 14:52
comments (4)
The Language That Never Was | Celes' Ramblings
(blog.celes42.com)
in rust@programming.dev from SorteKanin@feddit.dk on 17 May 13:08
comments (19)
in rust@programming.dev from SorteKanin@feddit.dk on 17 May 13:08
comments (19)
Fixrleak: Fixing Java Resource Leaks with GenAI
(www.uber.com)
in programming@programming.dev from Pro@programming.dev on 17 May 12:05
comments (2)
in programming@programming.dev from Pro@programming.dev on 17 May 12:05
comments (2)
A silly contraption using a JavaScript physics engine
(slicker.me)
in programming@programming.dev from monica_b1998@lemmy.world on 17 May 01:59
comments (0)
in programming@programming.dev from monica_b1998@lemmy.world on 17 May 01:59
comments (0)
Healthcare Cyber-Attacks Intensify, Sector Now Prime Target
(www.infosecurity-magazine.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 13:20
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 13:20
comments (1)
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
(thehackernews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:25
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:25
comments (0)
Windows Defender Application Control Bypassed Using Operationalizing Browser Exploits
(cybersecuritynews.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:16
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:16
comments (0)
FrigidStealer Malware Hits macOS Users via Fake Safari Browser Updates
(hackread.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:05
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 May 12:05
comments (1)
Here’s how I use LLMs to help me write code | Simon Willison
(simonwillison.net)
in programming@programming.dev from yo_scottie_oh@lemmy.ml on 16 May 12:04
comments (16)
in programming@programming.dev from yo_scottie_oh@lemmy.ml on 16 May 12:04
comments (16)
Divine mandate: Chinese-linked cyber activity is the most common form of hybrid threat facing Australia
(www.defenceconnect.com.au)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 May 05:40
comments (1)
in cybersecurity@sh.itjust.works from Hotznplotzn@lemmy.sdf.org on 16 May 05:40
comments (1)
How do you implement API Keys?
in rust@programming.dev from ExperimentalGuy@programming.dev on 16 May 00:51
comments (14)
in rust@programming.dev from ExperimentalGuy@programming.dev on 16 May 00:51
comments (14)
Learning Resources - Blessed.rs
(blessed.rs)
in rust@lemmy.ml from greywolf0x1@lemmy.ml on 14 May 10:50
comments (0)
in rust@lemmy.ml from greywolf0x1@lemmy.ml on 14 May 10:50
comments (0)
Announcing Rust 1.87.0 and ten years of Rust!
(blog.rust-lang.org)
in rust@programming.dev from neme@lemm.ee on 15 May 18:37
comments (4)
in rust@programming.dev from neme@lemm.ee on 15 May 18:37
comments (4)