Strengthening Web service security with Apache2: Best practices for 2025
Keeping your Apache2 web services safe: What you need to know this year
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more
Ayllu Code Forge 0.4 Has Been Released
Ayllu’s self-hosted instance https://ayllu-forge.org/ayllu/ayllu
Codeberg mirror https://codeberg.org/ayllu/ayllu
“Do you have game on your phone?” ⌘ Read more
10 Most Devastating Computer Viruses
Long before computers made their way into workplaces and homes everywhere, people theorized about a destructive kind of program that could replicate itself and spread between networked machines. In the 1980s and early 1990s, those programs became popularly known as “computer viruses.” You’ve probably had one at some point. All it takes is one wrong […]
The post [10 Most Devastating Computer Viruses](https://listverse.com/2025/05/19/10-most-devastating-comput … ⌘ Read more
If it fits, I sits ⌘ Read more
Boardcon Idea3576 SBC Showcases RK3576 SoC with CAN Bus and Dual Gigabit Ethernet
Boardcon has recently introduced the Idea3576, a compact single-board computer built around the Rockchip RK3576. Key features include CAN, RS485, 4G connectivity, and support for Debian 12. The SoC features an octa-core configuration with four Cortex-A72 cores clocked at 2.2GHz and four Cortex-A53 cores at 1.8GHz, enabling a hybrid big.LITTLE setup. It also integrates a […] ⌘ Read more
Avaota Previews C1 SBC in Raspberry Pi A Form Factor with Allwinner H618
Avaota has recently shared details about the C1, a compact single-board computer in the Raspberry Pi A form factor. Based on the Allwinner H618 processor, the board is a variant of the Yuzuki Chameleon and expands the Avaota SBC lineup with a small-footprint, feature-rich design aimed at embedded development and multimedia applications. Based on the watermark […] ⌘ Read more
Keep scrolling, nothing to see here XD ⌘ Read more
My new rescue kitty named Hunter ⌘ Read more
Renormalization
⌘ Read more
What were the MS-DOS programs that the moricons.dll icons were intended for?
Last time, we looked at the legacy icons in progman.exe. But what about moricons.dll? Here’s a table of the icons that were present in the original Windows 3.1 moricons.dll file (in file order) and the programs that Windows used the icons for. As with the icons in progman.exe, these icons are mapped from executables according to the information in the APPS.INF file. ↫ Raymond Chen … ⌘ Read more
France Endorses UN Open Source Principles
Article URL: https://social.numerique.gouv.fr/@codegouvfr/114529954373492878
Comments URL: https://news.ycombinator.com/item?id=44024759
Points: 500
# Comments: 153 ⌘ Read more
This is my wife’s cat. He’s 16 and we’ve lived together for the last 9 or so years. He’s always liked me but never wanted to “hang out” with me. For some reason that changed a couple days ago. 🤷🏻♂️ ⌘ Read more
Update: Kitty I rescued Saturday Morning feels right at home already. ⌘ Read more
6.15-rc7: mainline
Version:6.15-rc7 (mainline)Released:2025-05-18Source:linux-6.15-rc7.tar.gzPatch:full ( incremental) ⌘ Read more
Anyone else’s cat do this? ⌘ Read more
Joey’s 1st time meeting a kitten ⌘ Read more
My best friend Stella crossed the rainbow bridge last year on the 18th of May from cancer. She was 14. I miss her so much. ⌘ Read more
Bypassing Login via NoSQL Operator Injection: A MongoDB Authentication Hack ⌘ Read more
Build Your Own AI SOC — Part 6 Daily AI-Powered Threat Briefings With n8n + GPT
Introduction: Information Without Overload
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/buil … ⌘ Read more
** Redirect Roulette: How Poor OAuth Redirect Handling Gave Me Account Takeover **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/redirect-roulette-how-poor-oauth-red … ⌘ Read more
5 Linux Commands You’ve Probably Never Heard Of
In this article, I will show you five Linux commands you’ve probably never heard of. They’re simple, practical, and designed to make your…
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.c … ⌘ Read more
Here’s everything you need to know about ARP Poisoning. ⌘ Read more
$750 Bounty: for HTTP Request Smuggling on Data.gov
How a cleverly crafted desync attack revealed a hidden path to client-side compromise, JS injection and potential cookie theft
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ … ⌘ Read more