- My Favorite Books in the Order I Read Them
by horeszko on 2/26/25, 6:42 AM, with comments
- I Wrote a "Toy" Computer Worm: The First Iteration
by horeszko on 2/18/25, 10:32 PM, with comments
- Enigma Cipher Machine: An Object Oriented Python Implementation
by horeszko on 1/24/25, 1:13 AM, with comments
- BOLO: Mirai Attack Against IoT Devices (2025)
by horeszko on 1/7/25, 7:12 AM, with comments
- Splunk Bots – A Defend the Flag Full Mock Exercise
by horeszko on 11/27/24, 4:26 AM, with comments
- Show HN: DDoS Photon Cannon – A Toy DDoS
by horeszko on 11/20/24, 4:21 AM, with comments
- Cybersec: Homemade DDoS – Development and Infiltration
by horeszko on 11/19/24, 1:47 AM, with comments
- The Front Line of the Tech War is in Asia
by horeszko on 10/13/24, 12:43 AM, with comments
- Poland Stops 400k Cyberattacks YTD (2024)
by horeszko on 9/12/24, 1:03 PM, with comments
- Extending the Efficient Frontier of Office Automation with Google Workspace
by horeszko on 8/22/24, 10:50 PM, with comments
- Cybersecurity: An Unsolved Problem, a New Chapter
by horeszko on 8/20/24, 4:21 AM, with comments
- What is Up Phone? is it Legit?
by horeszko on 7/24/24, 4:27 AM, with comments
- What happened to the AI revolution? (2024)
by horeszko on 7/2/24, 7:34 PM, with comments
- Show HN: CNS – Cryptographic Network Service (key vault)
by horeszko on 5/15/24, 11:48 PM, with comments
- Ask HN: Where to find Lisp programming jobs?
by horeszko on 1/30/24, 1:34 AM, with comments
- Ask HN: How did Codeberg recover from DDoS attack?
by horeszko on 1/12/24, 9:52 PM, with comments
- Security Quick-Start How to for Linux
by horeszko on 12/26/23, 5:34 AM, with comments
- Ask HN: Good Engineering/Tech Publications?
by horeszko on 12/18/23, 3:07 PM, with comments