The Web3 Fraud programming |
- The Web3 Fraud
- "Putting a JNDI log4j trigger in my email signature so I can see if anyone’s logging copies of my mail"
- Log4Shell Update: Full bypass found in log4j 2.15.0, enabling RCE again (CVSS score 3.7 -> 9.0)
- PinePhone Malware Surprises Users, Raises Questions
- Software Engineering Idioms You Should Know
- This blog post describes "recently" found Log4j2 vulnerability written on... January, 2019
- Here is a searchable list of 6000+ programming resources !!
- Patch fixing critical Log4J 0-day has its own vulnerability that’s under exploit
- A Nintendo Switch Christmas ornament, with a 240x135 1.14" LCD and wifi
- Deep-copying in JavaScript using structuredClone
- State of CSS 2021
- From Node to Ruby on Rails
- Mining Financial Stock News Using SpaCy Matcher
- Follow-up on the moderation issue | Inside Rust Blog
- Overview of Serialization Technologies
- Xmake v2.6.2 released, Support building Linux kernel driver module
- ContextKeeper 1.2 | I made a Visual Studio plugin which lets you switch between different programming contexts - last opened files, pinned tabs and documents state&position. All contexts are saved in simple JSON files. I'd love to know what you think!
- Log4j: Major IT vendors rush out fixes for this flaw and more ahead of Christmas
- ARM’s Scalable Vector Extensions: A Critical Look at SVE2 For Integer Workloads
- Auth0 Fine Grained Authorization: Developer Community Preview Release
- Tools for Monitoring Microservices
- Meme Generator - my first decent website
- Desjardins data breach: Class action lawsuit agreement reaches $201 million
- [Elixir Tutorial Series] Honest chat - Part V - Sending and receiving messages
- An Empirical Lower Bound on the Overheads of Production Garbage Collectors
You are subscribed to email updates from programming. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment