Active
Recent
Comments
Search
Login
Login
dustri.org: 16 stories from 8 submitters
2
Book review: Applied Math for Security
book
math
security
dustri.org
via
calvin
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Musings on the security fixes from SPIP 4.1.8
php
security
dustri.org
via
jmillikin
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Ten years of MAT
practices
dustri.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Paper notes - Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
security
dustri.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
24
My favourite C++ footgun
c++
dustri.org
via
raymii
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
17
Spectre exploits in the "wild"
security
dustri.org
authored by
jvoisin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
3
Paper review: Statistical and Combinatorial Analysis of the TOR Routing Protocol
networking
privacy
security
dustri.org
via
calvin
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
25
PHP8, from a security point of view
php
security
dustri.org
via
raymii
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
27
Security features of musl
c
security
dustri.org
via
raymii
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
16
On the pervasive presence of military language elements in computer security
culture
security
dustri.org
via
dijit
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
58
I won't buy ebooks anymore
rant
dustri.org
via
dijit
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
29 comments
29
5
Snuffleupagus versus recent high-profile vulnerabilities
php
security
dustri.org
via
calvin
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
19
Firefox own linker on Android
android
browsers
performance
programming
dustri.org
via
dw
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
4
How to radare2 a fake openssh exploit
assembly
reversing
security
dustri.org
via
mulander
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Reverse engineering a compromised TOR browser bundle
☶
dotnet
reversing
security
dustri.org
via
jm
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0