$1 Million Tax Payer Grant for “Gender Inclusive Open Source”
A cancelled grant, worth a million bucks, for Oregon State University to create “best practices for fixing gender-bias bugs”. ⌘ Read more
She does this everytime she goes in this bathroom ⌘ Read more
On the relationship between Qt and KDE
Volker Hilsheimer, chief maintainer of the Qt project, says he has learned lessons from the painful Qt 5 to Qt 6 transition, the importance of Qt Bridges for using Qt from any language, and the significance of the relationship with the Linux KDE desktop. ↫ Tim Anderson at Dev Class Qt plays a significant role in the open source desktop world in particular, because it’s the framework KDE uses. Hilsheimer notes that KDE’s role in the Qt community is actual … ⌘ Read more
How to make switching between tabs browser like? ⌘ Read more
A milestone for lightweight Kubernetes: k0s joins CNCF sandbox
Member post originally published on the Mirantis blog by Prithvi Raj We are excited to announce that k0s, our lightweight, zero dependencies, and fully open-source Kubernetes distribution, has officially joined the Cloud Native Computing Foundation (CNCF) as a Sandbox project!… ⌘ Read more
I really wish they wouldn’t do this ⌘ Read more
I made a vim fork of Microsoft’s new “edit” terminal editor ⌘ Read more
My girl Frog! ⌘ Read more
should i let him in? he comes everyday and just stands there ⌘ Read more
Show me your sleepy kitties ⌘ Read more
Find and replace one copied text with another? ⌘ Read more
The Coalition Has ENDED ⌘ Read more
Protip: hvis man tager kasket på, er man immun over for at fylde 30 ⌘ Read more
She wanted me to meet her kitten ⌘ Read more
10 Normal Items You Didn’t Know Were Once Part of Burial Rituals
We tend to think of everyday objects—pillows, perfumes, makeup—as inventions born from comfort, beauty, or practicality. But dig through the layers of history, and you’ll find that some of these now-ordinary items have surprising ties to ancient burial rites, funerary customs, or corpse preparation. To be clear: not all of these items were originally invented […]
The post [10 Normal Items You Didn’t Know … ⌘ Read more
10 Misconceptions in Art & Architectural History
Art history is filled with captivating stories, iconic masterpieces, and legendary artists—but not everything you’ve heard is true. From misattributed paintings to misunderstood movements, the art world has its fair share of myths and mix-ups. In this list, we’re setting the record straight by debunking some of the most common misconceptions in art and architecture. […]
The post [10 Misconceptions in Art & Architectural History](https: … ⌘ Read more
The look says: ‘Touch my kitten and you will need a new face.’ ⌘ Read more
Rabbit Store | TryHackMe Medium
Problems: What is user.txt? What is root.txt? Solution: First of all we get a IP address so I preformed an NMAP scan discovering ports…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/rabbit-store-tryhackme-medium-f9f5069fbb50?source=r … ⌘ Read more
Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.
[Continue reading … ⌘ Read more
Build Your Own AI SOC — Part 7 Build a Security Knowledge Assistant With RAG + GPT
From Search to Understanding
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/build-you … ⌘ Read more
Exciting Cybersecurity Careers That Don’t Require Coding
Do you believe that cybersecurity is only for programmers who are bent over keyboards, typing code after code to ward off hackers? Rethink…
[Continue reading on InfoSec Write-ups »] … ⌘ Read more
Writing Pentest Reports | TryHackMe Write-Up | FarrosFR
Non-members are welcome to access the full story here. Write-Up by FarrosFR | Cybersecurity
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/writing-pentest-reports-tryhackme-wri … ⌘ Read more
Part 3:2 — Electron-Based App Security Testing Fundamentals — Case Study of Extract & Analyze .asar ⌘ Read more
Part 3:1 — Electron-Based App Security Testing Fundamentals - Extract & Analyze .asar ⌘ Read more
Part 2 — Electron-Based App Security Testing Fundamentals — Installing and Detecting… ⌘ Read more
Part 1 — Electron-Based App Security Testing Fundamentals — Introduction to Electron Framework ⌘ Read more
Friendly neighbor returning my cat ⌘ Read more
My girlfriend’s child ⌘ Read more
My baby recently got diagnosed with heart failure and his hind legs stopped working. He a fighter tho, we doin bicycle kicks n tons of meds daily, movement is slowly coming back🫡 ⌘ Read more
Backyard kitten one year later! ⌘ Read more
The derp is strong with two of these..just the cheesiest smile and brain fart…. ⌘ Read more
Telum II at Hot Chips 2024: mainframe with a unique caching strategy
Mainframes still play a vital role in today, providing extremely high uptime and low latency for financial transactions. Telum II is IBM’s latest mainframe processor, and is designed unlike any other server CPU. It only has eight cores, but runs them at a very high 5.5 GHz and feeds them with 360 MB of on-chip cache. IBM also includes a DPU for accelerating IO, along with an on-board AI accelerat … ⌘ Read more