Newest Stories
Home
Recent
Comments
Search
Login
1
wideNES - Peeking Past the Edge of NES Games
games
reversing
prilik.com
via
calvin
1 hour ago
|
cached
|
no comments
0
1
syzbot and the tale of thousand kernel bugs
pdf
linux
security
events.linuxfoundation.org
via
alex_gaynor
2 hours ago
|
cached
|
no comments
0
3
Mes Becomes An Official GNU Project, Mes 0.17 Released To Bootstrap GNU/Linux Distros
release
gnu.org
via
pizzaiolo
2 hours ago
|
cached
|
no comments
0
2
Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
android
networking
security
atcommands.org
via
neeels
4 hours ago
|
cached
|
no comments
0
1
A little bit of the one-time MacOS version still lingers in ZFS
mac
unix
utcc.utoronto.ca
via
calvin
4 hours ago
|
cached
|
no comments
0
5
SKS keyservers being used as piracy sites
distributed
medium.com
authored by
yakamo
5 hours ago
|
cached
|
no comments
0
0
Remote pentesting role for company?
☶
security
authored by
mrc0de
5 hours ago
|
no comments
0
5
Overview of unpatched exploits in macOS
mac
security
objective-see.com
via
Yogthos
7 hours ago
|
cached
|
no comments
0
5
Dumping SNES Zelda ROM
hardware
reversing
medium.com
via
pushcx
9 hours ago
|
cached
|
3 comments
3
9
Oops, I Wrote a C++ Compiler
c++
compilers
praeclarum.org
via
yumaikas
10 hours ago
|
cached
|
4 comments
4
4
The Abstract is an Enemy: Alternative Perspectives to Computational Thinking
pdf
programming
pdfs.semanticscholar.org
via
pushcx
10 hours ago
|
cached
|
2 comments
2
2
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls (2010)
☶
pdf
linux
osdev
performance
usenix.org
via
nickpsecurity
10 hours ago
|
cached
|
no comments
0
4
How good are human planners? (2015)
performance
optaplanner.org
via
hwayne
10 hours ago
|
cached
|
no comments
0
3
A Language-Independent Proof System for Full Program Equivalence (2016)
☶
pdf
formalmethods
programming
fsl.cs.illinois.edu
via
nickpsecurity
11 hours ago
|
cached
|
2 comments
2
42
A Road to Common Lisp
lisp
stevelosh.com
authored by
sjl
11 hours ago
|
cached
|
19 comments
19
3
Bitslicing S-boxes with the Quine-McCluskey algorithm
crypto
security
timtaubert.de
authored by
ttaubert
12 hours ago
|
cached
|
no comments
0
7
Pseudo-bandlimited pixel art filtering in 3D – a mathematical derivation
graphics
math
themaister.net
via
friendlysock
12 hours ago
|
cached
|
1 comment
1
3
Data retention
practices
privacy
theta.eu.org
authored by
eta
13 hours ago
|
cached
|
no comments
0
11
A Critique of Resizable Hash Tables: Riak Core & Random Slicing
distributed
infoq.com
via
SeanTAllen
13 hours ago
|
cached
|
no comments
0
12
Test your sysadmin skills
devops
networking
security
unix
github.com
via
superpat
13 hours ago
|
cached
|
4 comments
4
13
FOSS: passive consumerism kills our community
culture
carlchenet.com
authored by
chaica
14 hours ago
|
cached
|
19 comments
19
3
On Constructor Over-injection
programming
blog.ploeh.dk
via
calvin
14 hours ago
|
cached
|
no comments
0
29
Cracking Litter Box DRM
hardware
reversing
davidhampgonsalves.com
authored by
dhg
14 hours ago
|
cached
|
6 comments
6
12
The setup - OpenBSD Amsterdam
☶
openbsd
practices
openbsd.amsterdam
via
romanzolotarev
15 hours ago
|
cached
|
no comments
0
1
Electropolis: Communication and Community On Internet Relay Chat
culture
mediensprache.net
via
sin
16 hours ago
|
cached
|
no comments
0
Page 2 >>