id,blogroll_id,tag 216,29,CTF 217,29,pwn 218,29,reverse engineering 219,29,security 220,29,CS theory 221,29,machine learning 222,29,Linux 223,29,law 224,29,crypto 225,29,productivity 226,29,university 227,29,V8