~hackernews | Bookmarks (12159)
-
IBM orders US sales to locate near customers, RTO for cloud staff, DEI purge
Exclusive IBM, which employees wryly or ruefully say stands for I've Been Moved, is once again...
-
Walled Gardens Can Kill
I'm an Apple ecosystem user, owning an iPhone ever since a past employer got it for...
-
A New ASN.1 API for Python
If you’ve ever worked with cryptography, PKI schemes, or low-level networking in Python, you’ve likely encountered...
-
Using –/.ssh/authorized keys to decide what the incoming connection can do
~/.ssh/authorized_keys allows you to specify the command run by the incoming ssh connection. I was searching...
-
Startup Exercise: What can't be solved with money? (2011)
by Jason Cohen on March 21, 2011 What can’t be solved with money, are the most...
-
CVE fallout: The splintering of the standard vulnerability tracking system
Comment The splintering of the global system for identifying and tracking security bugs in technology products...
-
Multipaint: Draw pictures with color limitations of 8-bit and 16-bit platforms
As Multipaint is written in Processing, it should run in Windows, Mac OS X and Linux...
-
AMP and why emails are not (and should never be) interactive
“Email has largely stayed the same,” wrote Gmail product manager Aakash Shaney in 2019, while the...
-
Deafening Silence from the Cybersecurity Industry
Chris Krebs, former CISA Director, became a symbol of truth in cybersecurity after affirming the ......