unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
What is an AI agent?
There are two extremes: on the one hand, there are nerds who meddle in dry definitions divorced from...
2024-6-14 03:59:38 | 阅读: 7 |
收藏
|
Hacker Noon - hackernoon.com
agents
software
assistants
autonomous
formal
ProAuth: How I Used Flask and OAuth to Develop a Dynamic Code Authentication App
I grew interested in how the 2FA usually works for quite some time, and of course, in a data-driven...
2024-6-14 03:56:37 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
network
security
proauth
flask
Crypto Just Got Hungrier: DevourGO Now Accepts Payments Via Coinbase Commerce
PHOENIX, United States, June 13th, 2024/Chainwire/--Devour, the leading web3-powered food ordering...
2024-6-14 03:45:21 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
coinbase
devourgo
food
devour
restaurants
Using Console.Log to Its Fullest: Tips and Tricks for Enhanced Debugging and Development
When developing, debugging, or troubleshooting web applications, console.log is one of the most freq...
2024-6-14 02:47:25 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
dhanush
animation
timeend
chess
groupend
Why OpenAI Stole the Show at Apple’s WWDC 2024
Apple swung for the fences by trying to reclaim AI as “Apple Intelligence” at its __annual WWDC __on...
2024-6-14 02:42:6 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
openai
chatgpt
siri
generative
Majority Voting Approach to Ransomware Detection: Related Work
Authors:(1) Simon R. Davies, School of Computing, Edinburgh Napier University, Edinburgh, UK ([ema...
2024-6-14 00:0:25 | 阅读: 9 |
收藏
|
Hacker Noon - hackernoon.com
ransomware
entropy
machine
edinburgh
analysis
Microarchitectural Security of AWS Firecracker VMM: Threat Models
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:38 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
firecracker
worcester
malicious
lübeck
vmm
Microarchitectural Security of AWS Firecracker VMM: Analysis of Microarchitectural Attack & Defenses
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:36 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
firecracker
spectre
pocs
mds
AI, Please Wash My Dishes, Let Me Write: A Desperate Plea for Creative Freedom
So it was a fine evening; I was at my work desk with my coffee, which had just been delivered by a D...
2024-6-13 23:0:34 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
creative
dishes
creativity
dirty
mundane
Microarchitectural Security of AWS Firecracker VMM: Background
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:32 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
mds
firecracker
spectre
memory
attacker
Microarchitectural Security of AWS Firecracker VMM: Analysis of Firecracker's Containment Systems
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:30 | 阅读: 6 |
收藏
|
Hacker Noon - hackernoon.com
firecracker
containment
lübeck
worcester
Microarchitectural Security of AWS Firecracker VMM: Conclusion, Acknowledgments, and References
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:28 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
usenix
security
daniel
symposium
association
Microarchitectural Security of AWS Firecracker VMM: Abstract & Intro
Authors:(1) Zane Weissman, Worcester Polytechnic Institute Worcester, MA, USA {[email protected]};...
2024-6-13 23:0:24 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
firecracker
security
vms
spectre
I Fine-Tuned an Llm With My Telegram Chat History. Here’s What I Learned
For most people I interact with, I’m just another text-based program for the most of the time. If in...
2024-6-13 22:42:5 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
tuning
alexander
smirnov
friend
lora
How to Create a Server Driven UI Engine for Flutter
Hello!Today I will show you how to create a super-duper engine for Server-Driven UI in Flutter, whi...
2024-6-13 17:30:56 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
nui
flutter
widget
widgets
nanc
Choosing the Best Protocol: gRPC vs. Apache Thrift
In the world of distributed systems and microservices, the choice of communication protocol can sign...
2024-6-13 16:31:32 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
thrift
grpc
pb
fatalf
sayhello
How to Regularly Delete Log Instances in DolphinScheduler
After Apache DolphinScheduler has been running for a period of time, the instance scheduling logs in...
2024-6-13 16:22:20 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
truncate
database
referencing
42000
Capitalizing on Uncertainty: 3 Defense Stocks To Look Out For as Geopolitical Tensions Rise
Growing geopolitical unrest can be catastrophic on a humanitarian scale while leading to significant...
2024-6-13 16:18:1 | 阅读: 5 |
收藏
|
Hacker Noon - hackernoon.com
stocks
investors
growth
martin
7 Must-Watch Crypto Films and Documentaries
There’s actually a lot of audiovisual media about cryptocurrencies and related technology that you c...
2024-6-13 16:14:27 | 阅读: 4 |
收藏
|
Hacker Noon - hackernoon.com
film
audience
documentary
rotten
tomatoes
Overview and Practical Examples of CDC Pattern With Kafka Connect
CDC stands for Change Data Capture. The idea of the CDC is to track changes in the database, capture...
2024-6-13 16:6:9 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
database
cdc
connector
outbox
migration
Previous
173
174
175
176
177
178
179
180
Next