Medzinárodný projekt Erasmus+ o výučbe slovenčiny
Projekt Inovácia a optimalizácia vzdelávacích nástrojov a prostriedkov výučby slovenčiny mimo územia Slovenska ponúkol možnosti zlepšenia spôsobu výučby slovenčiny v zahraničí a vytvoril nové a lepšie učebné pomôcky, metódy a materiály, ktoré pomôžu i učiteľom i študentom. Záverečné multiplikačné podujatie tohto trojročného medzinárodného Erasmus+ projektu prebiehalo 11. apríla 2025 na Filozofickej fakulte Univerzity … ⌘ Read more
TacOS: an x86_64 UNIX-like OS from scratch
TacOS is a UNIX-like kernel which is able to run DOOM, among various other smaller userspace programs. It has things like a VFS, scheduler, TempFS, devices, context switching, virtual memory management, physical page frame allocation, and a port of Doom. It runs both on real hardware (tested on my laptop) and in the Qemu emulator. ↫ TacOS GitHub page TacOS – great name – is written in C, and explicitly a hobby and toy project. The code’s licensed … ⌘ Read more
Ladies and gentlemen, it is with a great pleasure to inform you that I was adopted today ⌘ Read more
I wrote to the address in the GPLv2 license notice and received the GPLv3 license
Comments ⌘ Read more
Stonean spaces, projective objects, the Riesz representation theorem, and (possibly) condensed mathematics
Comments ⌘ Read more
How old is this kitten? ⌘ Read more
An emotional goodbye to a beautiful friend ⌘ Read more
A guide to deciding what AI model to use in GitHub Copilot
What to look for with each model and how to test them in your workflows—with tips, tricks, and pointers.
The post A guide to deciding what AI model to use in GitHub Copilot appeared first on The GitHub Blog. ⌘ Read more
Prepare your application landscape for zero trust with Keycloak 26.2
Strong identity and access management is a key component of a zero trust architecture for cloud native applications. Keycloak is well-known for its single-sign-on capabilities based on open standards. It provides you all the building blocks… ⌘ Read more
Erlang Solutions: Reduce, Reuse… Refactor: Clearer Elixir with the Enum Module
“When an operation cannot be expressed by any of the functions in the Enum module, developers will most likely resort to reduce/3.”
From the docs for Enum.reduce/3
In many Elixir applications, I find
Enum.reduceis used frequently.Enum.reducecan do anything, but that doesn’t mean it should. In many cases, otherEnumfunctions are more readable, practically as fast, and easier … ⌘ Read more
When you open your eyes and see this at 3AM ⌘ Read more
Protecting NATS and the integrity of open source: CNCF’s commitment to the community
When a company contributes a project to the Cloud Native Computing Foundation (CNCF), it’s not just sharing code—it’s making a commitment to the open source community. It’s a pledge to uphold open collaboration, shared community ownership,… ⌘ Read more
MIT called. They want their professor back ⌘ Read more
My roommate is unemployed and has a bad posture, roast him ⌘ Read more
Meetings then and now ⌘ Read more
Now there is r/Vimux. Feel free to join. ⌘ Read more
Show me your sleeping kitties! ⌘ Read more
japanese cat ⌘ Read more
Careless People
Article URL: https://pluralistic.net/2025/04/23/zuckerstreisand/#zdgaf
Comments URL: https://news.ycombinator.com/item?id=43780363
Points: 520
# Comments: 286 ⌘ Read more
next-20250424: linux-next
Version:next-20250424 (linux-next)Released:2025-04-24 ⌘ Read more
10 Comic Book Film Characters Based on Something Else Entirely
The comic book-to-movie adaptation is far from a fine art. In this hero-centric cinematic world, moviemakers and actors are inclined to bend the rules and break away from the source material when bringing characters to the big screen. Indeed, many writers, directors, and stars have all but ignored the comics they are adapting to suit […]
The post [10 Comic Book Film Characters Based on Something Else Entire … ⌘ Read more
10 Conceptions of What Extraterrestrial Could Look Like
The demands of everyday life, in the form of natural stimuli, prompt the development of the various behavioral traits and physical structures of plants and animals. In trying to envision the appearance of extraterrestrial beings, scientists once turned to Earth’s fossil record. After all, it provided evidence as to how organisms had already evolved on […]
The post [10 Conceptions of What Extraterrestrial Could Look Like] … ⌘ Read more
** How I discovered a hidden user thanks to server responses ?**
My first real step into web hacking and it wasn’t what i thought it would be.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-i-discovered-a-hidde … ⌘ Read more
PNPT Exam Review — 2025 ⌘ Read more
How to Build a Threat Detection Pipeline from Scratch (Like a Cyber Ninja!)
Hey, cyber fam! Have you ever asked yourself:
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/how-to-build-a-threat … ⌘ Read more
Nothing changed… except for one detail. And that was enough to hack
Sometimes, hacking doesn’t require any exploit… just good observation.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/nothing-c … ⌘ Read more
Email Verification Bypass during Account Creation | Insecure Design ⌘ Read more
How to Create a Botnet Using One Tool: A Proof of Concept for Educational Purposes Aspiring…
Learn how attackers build and control botnets — safely and ethically — using … ⌘ Read more
**Burp, Bounce, and Break: How Web Cache Poisoning Let Me Control the App **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/burp-bounce-and-break-how-web-cache-poisoning-let-me-con … ⌘ Read more
OWASP Juice Shop | Part 2 — Bully Chatbot ⌘ Read more
OWASP Juice Shop | Part 1 — ScoreBoard Solution — StrawHat Hackers ⌘ Read more
How to Set Up a Honeypot for Your Apache2 Server ⌘ Read more