@movq@www.uninformativ.de Yeah, we’ve seen how this plays out in practice 🤣 @dce@hashnix.club My advice, do what @movq@www.uninformativ.de has hinted at and don’t change the 1st # url = field in your feed. I’m not sure if you had already, but the first url field is kind of important in your feed as it is used as the “Hashing URI” for threading.
Practical study material OSWP Part 3: WEP Walkthrough ⌘ Read more
Practical study material OSWP Part 2: WPA2-MGT Walkthrough ⌘ Read more
Practical study material OSWP Part 1: WPA2-PSK Walkthrough ⌘ Read more
Part 3: How to Become a Pentester in 2025:Practical Practice: Labs & CTFs ⌘ Read more
How to Adjust Font Smoothing in macOS Sequoia & macOS Sonoma
Font Smoothing is a longstanding feature in MacOS that aims to make rendered screen text more legible, and it works by subtly blending the edges of display fonts with the background by using anti-aliasing. The idea is to reduce the jaggedness of screen text, but in practice nowadays it basically makes screen fonts on the … [Read More](https://osxdaily.com/2025/06/04/how-adjust-font-smoothing-macos-sequoia-sonoma-v … ⌘ Read more
10 Iconic “Temporary” Structures That Still Stand Today
Some of the world’s most iconic structures were never meant to stick around. Built for the World’s Fairs, quick fixes, or temporary exhibitions, these buildings were supposed to be dismantled or demolished after serving their short-term purpose. But fate—and sometimes public opinion—had other plans. Whether due to popularity, practicality, or sheer indifference, these “temporary” constructions […]
The post [10 Iconic “Temp … ⌘ Read more
The Copilot delusion
And the “copilot” branding. A real copilot? That’s a peer. That’s a certified operator who can fly the bird if you pass out from bad taco bell. They train. They practice. They review checklists with you. GitHub Copilot is more like some guy who played Arma 3 for 200 hours and thinks he can land a 747. He read the manual once. In Mandarin. Backwards. And now he’s shouting over your shoulder, “Let me code that bit real quick, I saw it in a Slashdot comment!” At that point, you’re not working … ⌘ Read more
Beyond best practices: Using OWASP ASVS to bake security into your delivery pipeline for 2025
How to turn a community-driven checklist into a living part of your SDLC.
[Cont … ⌘ Read more
Agent mode 101: All about GitHub Copilot’s powerful mode
A full look at agent mode in GitHub Copilot, including what it can do, when to use it, and best practices.
The post Agent mode 101: All about GitHub Copilot’s powerful mode appeared first on The GitHub Blog. ⌘ Read more
CNCF Shares Schedule for Open Observability Summit North America, Gears Up for Inaugural Event
The event will unite observability leaders, developers, and end users to drive progress in observability tools and best practices SAN FRANCISCO, Calif., May 22, 2025 — The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems… ⌘ Read more
$1 Million Tax Payer Grant for “Gender Inclusive Open Source”
A cancelled grant, worth a million bucks, for Oregon State University to create “best practices for fixing gender-bias bugs”. ⌘ Read more
10 Normal Items You Didn’t Know Were Once Part of Burial Rituals
We tend to think of everyday objects—pillows, perfumes, makeup—as inventions born from comfort, beauty, or practicality. But dig through the layers of history, and you’ll find that some of these now-ordinary items have surprising ties to ancient burial rites, funerary customs, or corpse preparation. To be clear: not all of these items were originally invented […]
The post [10 Normal Items You Didn’t Know … ⌘ Read more
Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.
[Continue reading … ⌘ Read more
Strengthening Web service security with Apache2: Best practices for 2025
Keeping your Apache2 web services safe: What you need to know this year
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
5 Linux Commands You’ve Probably Never Heard Of
In this article, I will show you five Linux commands you’ve probably never heard of. They’re simple, practical, and designed to make your…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c … ⌘ Read more
Crosscompiling for OpenBSD arm64
Following on from OpenBSD/arm64 on QEMU, it’s not always practical to compile userland software or a new kernel on some systems, particularly small SoCs with limited space and memory – or indeed QEMU, in fear of melting your CPU. There are two scenarios here – the first, if you are looking for a standard cross-compiler for Aarch64, and the second if you want an OpenBSD-specific environment. ↫ Daniel Nechtan Exactly what it says on the tin. ⌘ Read more
10 Evil Religions in Fiction
Religion is a source of comfort and conscience. As people look to their respective gods for guidance, their conclusions inform their values, drive their actions, and give meaning to events. However, that pattern isn’t always a good thing, as some religious practices aren’t so righteous. An ignoble doctrine could be a cheap excuse to set […]
The post 10 Evil Religions in Fiction appeared first on [Listverse](h … ⌘ Read more
** Collaboration is a scary word **
I like programming partially because it’s a practice I can, with appropriate to unhealthy application of effort, usually accomplish something at least proximal to my intention.
This isn’t true for visual art, nor music. Lately I’ve been feeling like the little games and toys I wanna make are sorta hampered by my total inability to make stuff I find aesthetically appealing…so…I’ve been thinking about collaboration. Which is a scary word because, you know, other people and all, but I figured I’d … ⌘ Read more
Building a Secure Home Network in 2025: Practical Tips ⌘ Read more
Securing Apache2 + PHP: Practical guide for safer web hosting
A practical security checklist to harden your Apache2 + PHP stack and protect your web applications from common vulnerabilities.
[Continue reading on InfoSec Write-ups »](https:// … ⌘ Read more
Secure your Python applications: Best practices for developers
Practical security tips every Python developer should know — from dependency safety to protecting against injection attacks and securing…
[Continue reading on InfoSec Write … ⌘ Read more
Copilot ask, edit, and agent modes: What they do and when to use them
An introduction to the three distinct modes of GitHub Copilot and a practical guide for integrating them effectively into your workflow.
The post Copilot ask, edit, and agent modes: What they do and when to use them appeared first on The GitHub Blog. ⌘ Read more
@andros@twtxt.andros.dev You know, I’d really love to see how/if location-based addressing works in practice. I might fork jenny to judy and run both things in parallel for a while … 🤔
Erlang Solutions: Reduce, Reuse… Refactor: Clearer Elixir with the Enum Module
“When an operation cannot be expressed by any of the functions in the Enum module, developers will most likely resort to reduce/3.”
From the docs for Enum.reduce/3
In many Elixir applications, I find
Enum.reduceis used frequently.Enum.reducecan do anything, but that doesn’t mean it should. In many cases, otherEnumfunctions are more readable, practically as fast, and easier … ⌘ Read more
CNCF Announces OpenObservabilityCon North America to Accelerate Open Source Innovation and Tame Infrastructure Complexity
New event will convene observability leaders, developers, and end users to advance open source observability tools and practices SAN FRANCISCO, April 22, 2025 — The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud… ⌘ Read more
Exploring GitHub CLI: How to interact with GitHub’s GraphQL API endpoint
Discover practical tips and tricks for forming effective GraphQL queries and mutations.
The post Exploring GitHub CLI: How to interact with GitHub’s GraphQL API endpoint appeared first on The GitHub Blog. ⌘ Read more
Cracking the code: How to wow the acceptance committee at your next tech event
Want to speak at a tech conference? These four practical tips will help your session proposal stand out—and land you on the stage.
The post Cracking the code: How to wow the acceptance committee at your next tech event appeared fi … ⌘ Read more
https://github.com/codr7/hacktical-c A practical hacker’s guide to the #C programming language
GitHub for Beginners: Security best practices with GitHub Copilot
Learn how to leverage GitHub Copilot to make your code more secure.
The post GitHub for Beginners: Security best practices with GitHub Copilot appeared first on The GitHub Blog. ⌘ Read more
Run Gemma 3 with Docker Model Runner: Fully Local GenAI Developer Experience
Explore how to run Gemma 3 models locally using Docker Model Runner, alongside a Comment Processing System as a practical case study. ⌘ Read more
Topaz Tz170 J484 Development Kit with 256 Mbit x32 LPDDR4 at 1.6 Gbps & MIPI D-PHY
The Topaz Tz170 J484 Development Kit is a compact platform for evaluating and prototyping with the Efinix Tz170 FPGA. It integrates onboard memory, configurable I/O, and a preloaded reference design, providing a practical setup for testing and demonstration across a range of FPGA applications. The development kit is built around the Tz170 FPGA, which uses […] ⌘ Read more
10 Crazy Cultural Practices from Deep History
Culture includes everything we do, believe, and have done to us. Culture comprises everything humanity has achieved and learned. Looking back into the deep past, we can better appreciate how our civilization has evolved over the vast sweep of millennia. Some of the following findings stretch back to the dawn of humanity itself, while others […]
The post [10 Crazy Cultural Practices from Deep History](https://listverse.com/2025/04/03/10-craz … ⌘ Read more
Tell HN: Announcing tomhow as a public moderator
Hi all,
Tom Howard is going public as HN moderator today. He has been doing HN moderation work for years already and knows the site and its practices inside-out, so the only new thing you’ll see is mod comments from Tom showing up in the threads the way mine do. I’m not going anywhere, so you’ll have two of us to put up with going forward :)
I’ve known Tom since he was sctb’s and my batchmate back in YC W09. Many of you know him as the kind and thoughtful community member … ⌘ Read more
Open Policy Agent: Best Practices for a Secure Deployment
Thanks to its performance and adaptability, Open Policy Agent (OPA) is a common choice for managing policy-as-code. Nonetheless, security flaws can develop if OPA is abused or improperly designed, much as with any tool handling important… ⌘ Read more
10 Pharmaceutical Scandals That Will Leave You Fuming
When large amounts of money are involved, companies have proven to do whatever it takes to protect their profits, even if It’s unethical and illegal. The pharmaceutical industry is no stranger to illegal practices and scandals involving shady businesses, leading to more money. Some of the largest drug companies have faced backlash for price hikes, […]
The post [10 Pharmaceutical Scandals That Will Leave You Fuming](https://l … ⌘ Read more
Automating NIS2 Compliance in Kubernetes with Kyverno: A Practical Guide
2025 is the year when NIS2 measures will start to bite. Is your platform team ready for the challenge? This post gives a brief overview of NIS2 in the context of platform engineering. Then it gives… ⌘ Read more
Full exposure: A practical approach to handling sensitive data leaks
Treating exposures as full and complete can help you respond more effectively to focus on what truly matters: securing systems, protecting sensitive data, and maintaining the trust of stakeholders.
The post Full exposure: A practical approach to handling sensitive data leaks appeared first on [The GitHu … ⌘ Read more
10 Male Characters Played by Women
Casting can be counterintuitive. Studios often hire male actors for female characters and vice versa. Such decisions aren’t that unusual, especially in this age of gender-swapping established stories. For better or worse, they’re a fairly common practice nowadays, meaning they no longer draw the widespread attention they once did. Ironically, it’s the less overt examples […]
The post [10 Male Characters Played by Women](https://listverse.com/2025/03/09/10-male-c … ⌘ Read more
Microsoft discovers massive malvertising campaign on GitHub
Like the other Chrome skins, Microsoft Edge is also moving to disable Manifest v2 extensions, restricting the effectiveness of ad blockers like uBlock Origin. As an advertising company, Microsoft was obviously never going to do the work to keep Manifest v2 support around in Chrome, so this was inevitable. Blocking ads might be a necessary security practice, but why cry over spilled user data, am I right? Anyway, … ⌘ Read more
10 Everyday Fashion Items That Were Originally Designed for War
History has a funny way of taking battlefield necessities and turning them into fashion statements. Some of the most stylish and essential pieces in our wardrobes started with a much more practical and sometimes downright deadly purpose. From keeping soldiers warm to ensuring they had room for extra ammo (or snacks, as we now use […]
The post [10 Everyday Fashion Items That Were Originally Designed for Wa … ⌘ Read more
Aligning Language Practices for KubeCon + CloudNativeCon Japan and KubeCon + CloudNativeCon China
The global cloud native community thrives on diversity and collaboration, bringing together contributors, users, and enthusiasts worldwide. As we continue to grow and expand, we are committed to creating an inclusive and effective environment for learning… ⌘ Read more
Apple Shareholders Vote to Continue Illegal DEI Practices
“Apple may need to make DEl changes in the future as the legal landscape evolves,” says Apple CEO Tim Cook. ⌘ Read more