Lobsters
Recent
Comments
Search
Login
37
A Road to Common Lisp
lisp
stevelosh.com
authored by
sjl
9 hours ago
|
cached
|
19 comments
19
27
Cracking Litter Box DRM
hardware
reversing
davidhampgonsalves.com
authored by
dhg
12 hours ago
|
cached
|
6 comments
6
13
FOSS: passive consumerism kills our community
culture
carlchenet.com
authored by
chaica
11 hours ago
|
cached
|
19 comments
19
5
SKS keyservers being used as piracy sites
distributed
medium.com
authored by
yakamo
3 hours ago
|
cached
|
no comments
0
12
Test your sysadmin skills
devops
networking
security
unix
github.com
via
superpat
11 hours ago
|
cached
|
4 comments
4
9
Oops, I Wrote a C++ Compiler
c++
compilers
praeclarum.org
via
yumaikas
7 hours ago
|
cached
|
3 comments
3
11
A Critique of Resizable Hash Tables: Riak Core & Random Slicing
distributed
infoq.com
via
SeanTAllen
11 hours ago
|
cached
|
no comments
0
5
Dumping SNES Zelda ROM
hardware
reversing
medium.com
via
pushcx
7 hours ago
|
cached
|
2 comments
2
4
The Abstract is an Enemy: Alternative Perspectives to Computational Thinking
pdf
programming
pdfs.semanticscholar.org
via
pushcx
8 hours ago
|
cached
|
2 comments
2
13
RAII vs Failure to Acquire a Resource Is Not Exceptional / Don't call them Constructors
☶
c++
d
authored by
JohnCarter
19 hours ago
|
13 comments
13
11
The setup - OpenBSD Amsterdam
☶
openbsd
practices
openbsd.amsterdam
via
romanzolotarev
12 hours ago
|
cached
|
no comments
0
4
Overview of unpatched exploits in macOS
mac
security
objective-see.com
via
Yogthos
4 hours ago
|
cached
|
no comments
0
6
Pseudo-bandlimited pixel art filtering in 3D – a mathematical derivation
graphics
math
themaister.net
via
friendlysock
10 hours ago
|
cached
|
1 comment
1
3
Bitslicing S-boxes with the Quine-McCluskey algorithm
crypto
security
timtaubert.de
authored by
ttaubert
10 hours ago
|
cached
|
no comments
0
3
Data retention
practices
privacy
theta.eu.org
authored by
eta
11 hours ago
|
cached
|
no comments
0
3
A Language-Independent Proof System for Full Program Equivalence (2016)
☶
pdf
formalmethods
programming
fsl.cs.illinois.edu
via
nickpsecurity
8 hours ago
|
cached
|
2 comments
2
15
What's in a Production Web Application?
scaling
web
stephenmann.io
via
calvin
21 hours ago
|
cached
|
4 comments
4
4
How good are human planners? (2015)
performance
optaplanner.org
via
hwayne
8 hours ago
|
cached
|
no comments
0
1
syzbot and the tale of thousand kernel bugs
pdf
linux
security
events.linuxfoundation.org
via
alex_gaynor
7 minutes ago
|
cached
|
no comments
0
1
Mes Becomes An Official GNU Project, Mes 0.17 Released To Bootstrap GNU/Linux Distros
release
gnu.org
via
pizzaiolo
23 minutes ago
|
cached
|
no comments
0
1
Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
android
networking
security
atcommands.org
via
neeels
2 hours ago
|
cached
|
no comments
0
1
A little bit of the one-time MacOS version still lingers in ZFS
mac
unix
utcc.utoronto.ca
via
calvin
2 hours ago
|
cached
|
no comments
0
1
Remote pentesting role for company?
☶
security
authored by
mrc0de
3 hours ago
|
no comments
0
2
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls (2010)
☶
pdf
linux
osdev
performance
usenix.org
via
nickpsecurity
8 hours ago
|
cached
|
no comments
0
24
Stop! Don't blindly take that coding challenge
programming
rant
dev.to
via
nanxiao
24 hours ago
|
cached
|
14 comments
14
Page 2 >>