Visualizing the locations of malicious login attempts



Accedi per aggiungere un commento

Altri post in questo gruppo

Ask HN: People that use jq extensively, I'd like to talk to you

Hi HN,

For the past few months, I've been working on porting jq into different settings. For example, I've made a jq extension for SQLite (https://github.com/Florents-Tselai/liteJQ) and another

6 mag 2024, 12:10:10 | Hacker news
Show HN: Supertone Shift – AI powered Real-time voice changer

Supertone's Shift offers real-time voice changing technology. It lets users immediately switch to any selected voice. Just pick a voice and begin speaking. Shift is suited for VTubers, content cre

6 mag 2024, 07:40:15 | Hacker news