unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
《苏世民:我的经验与教训》:如何通过市场周期识别投资时机,判断市场顶部与底部
最近在看《苏世民:我的经验与教训》这本书,让我对投资理财又有了一点新的思考和总结。这篇文章总结了书中“周期:通过市场涨落判断投资机会”的关键内容,聚焦在投资过...
2024-10-29 22:35:51 | 阅读: 0 |
收藏
|
阿小信的博客 - blog.axiaoxin.com
投资者
世民
风险
教训
自信
DigiCert – It’s a Matter of Trust
Starlink encountered a high-profile outage in April that caused service to go down for several h...
2024-10-29 22:31:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
digicert
security
software
nelson
lifecycle
Getting the Insights You Need: How to Conduct Customer Research for a Business
What could be more refreshing than knowing your customers so well that you can predict their next mo...
2024-10-29 22:27:19 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
audience
identify
ideal
buyer
conducting
Node.js v23.0.0 Released: The End of 32-bit Windows Support
On October 16, 2024, the Node.js community reached a significant milestone with the release of Node....
2024-10-29 22:21:43 | 阅读: 0 |
收藏
|
Hacker Noon - hackernoon.com
v23
windows
subtract
mjs
brings
AI Language Models Learn from Conversations, Improving Task Performance Without External Feedback
Artificial intelligence is taking a significant leap forward in its ability to learn and improve thr...
2024-10-29 22:20:1 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
respect
implicit
multiref
humans
2024年NSSCTF秋季招新赛-Reverse
2024-10-29 22:20:1 | 阅读: 0 |
收藏
|
先知安全技术社区 - xz.aliyun.com
南非发现最古老的岩石微生物
在南非布什维尔德火成岩复合体(Bushveld Igneous Complex,BIC)中发掘的一块 20 亿年历史的岩石中,研究人员发现了封存在岩石裂缝中的活微生物。这是目前已知在古老岩...
2024-10-29 22:19:8 | 阅读: 1 |
收藏
|
奇客Solidot–传递最新科技情报 - www.solidot.org
微生物
岩石
古老
亿年
显微
A Guide to Romantic Relationships for ̶d̶u̶m̶m̶i̶e̶s̶ Tech People
A few weekends ago, I had lunch with some friends.We were having our quarterly life catch-up just di...
2024-10-29 22:18:24 | 阅读: 2 |
收藏
|
Hacker Noon - hackernoon.com
software
honest
knew
delighters
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
Oct 29, 2024Better TLS implementations with Rust, fuzzing, and managingcerts, appsec lessons from t...
2024-10-29 22:17:0 | 阅读: 0 |
收藏
|
Security Weekly Podcast Network (Audio) - sites.libsyn.com
okta
oktane
security
generative
agents
Crypto Trends in 2024: From Tap-to-Earn Games to Blockchain in Education
In 2024, the cryptocurrency industry is developing rapidly under the influence of various trends: fr...
2024-10-29 22:15:49 | 阅读: 3 |
收藏
|
Hacker Noon - hackernoon.com
blockchain
adoption
sports
exchanges
Russia arrests hacker accused of preventing electronic voting during local election
Russia’s Federal Security Service (FSB) announced that it had detained a Moscow resident for conduc...
2024-10-29 22:15:48 | 阅读: 0 |
收藏
|
Over Security - Cybersecurity news aggregator - therecord.media
russia
ukraine
ukrainian
moscow
fsb
Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts
ProductsFor Enterprises(B2B)...
2024-10-29 22:15:46 | 阅读: 4 |
收藏
|
Over Security - Cybersecurity news aggregator - cyble.com
cyble
security
threats
monitoring
UL NO. 456: A Deep-dive on Prompt Injection
SECURITY | AI | PURPOSEUNSUPERVISED LEARNING is a newsletter about upgrading to thrive in a world fu...
2024-10-29 22:15:0 | 阅读: 5 |
收藏
|
Unsupervised Learning - danielmiessler.com
security
injection
llm
whisper
alzheimer
How to Achieve a Secure and Resilient IT Infrastructure in 6 Steps
Securing IT infrastructur...
2024-10-29 22:15:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
resilient
cimcor
security
continual
predictable
Elevate Your Flutter App: A Guide to Subject Segmentation Using Google ML Kit
In the ever-evolving landscape of mobile app development, the ability to process and analyse images...
2024-10-29 22:10:45 | 阅读: 8 |
收藏
|
Hacker Noon - hackernoon.com
foreground
flutter
inputimage
mlkit
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
IntroductionOrganizations often rely on a layered defense strategy, yet breaches stil...
2024-10-29 22:0:40 | 阅读: 5 |
收藏
|
Securelist - securelist.com
security
attacker
network
webs
software
Migrating billions of records: moving our active DNS database while it’s in use
2024-10-2914 min readAccording to a survey done by W3Techs, as of October 2024, Cloudflare is used a...
2024-10-29 22:0:0 | 阅读: 4 |
收藏
|
The Cloudflare Blog - blog.cloudflare.com
rec
cf
database
cfdb
dnsdb
New crazy payloads in the URL Validation Bypass Cheat Sheet
Published: 29 October 2024 at 13:59 UTC...
2024-10-29 21:59:13 | 阅读: 3 |
收藏
|
PortSwigger Research - portswigger.net
cheat
bypass
attacker
decimal
userinfo
Selenium Versus Karate: a Solid Comparative Approach
In the world of software architecture, which is still in its infancy in absolute terms, change is st...
2024-10-29 21:49:53 | 阅读: 1 |
收藏
|
Hacker Noon - hackernoon.com
selenium
karate
cucumber
grid
gherkin
We are joining forces with Google Cloud to accelerate AI and software development with privacy-first data solutions on Google Cloud Marketplace
We’re excited to announce th...
2024-10-29 21:45:16 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
tonic
synthetic
marketplace
workflows
Previous
242
243
244
245
246
247
248
249
Next