The Protection of Information in Computer Systems (1974)
(cs.virginia.edu)
May 2025 Archive
11821.
11822.
11824.
11825.
How to do research (2013) [pdf]
(people.csail.mit.edu)
11826.
Show HN: The Danger of Prompt Injection; the New SQL Injection
(pub.towardsai.net)
11827.
Simple Web Components Editor
(qeditor.dev)
11828.
No More BYOK
(ampcode.com)
11829.
Linear Programming for Fun and Profit
(modal.com)
11830.
11831.
11832.
Advances and Challenges in Foundation Agents
(arxiv.org)
11833.
Uncovering Academic Espionage at Stanford
(stanfordreview.org)
11834.
Don't Look at Stock Markets. Look at the Ports
(theatlantic.com)
11835.
Ivar: Ruby's Missing Instance Variable Typo Warnings
(avdi.codes)
11836.
If I Started Fresh
(werd.io)
11837.
Which social media sites support which meta tags?
(getoutofmyhead.dev)
11838.
11839.
RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale
(securitylabs.datadoghq.com)
11840.
11841.
11842.
Brain Data Is for Sale, Senators Warn
(gizmodo.com)
11843.
11844.
Blender FBX Importer via Ufbx
(aras-p.info)
11845.
The idea of internal no-code platforms
(anyblockers.com)
11846.
The Internet, Remote Work, AI Ethics, and an American Pope
(blog.slamdunk.software)
11847.
A single page on DoorDash can make upward of 1000 gRPC calls
(gojiberries.io)
11848.
PlainBudget – Minimalist Plain Text Budgeting
(plainbudget.com)
11849.
Globalization did not hollow out the U.S. middle class
(marginalrevolution.com)
11850.
The Molecular Bond That Helps Secure Your Memories
(quantamagazine.org)