Newest Stories by chadski
Home
Recent
Comments
Search
Login
22
Intel x86s hide another CPU that can take over your machine (you can't audit it)
reversing
security
boingboing.net
via
chadski
2 years ago
|
cached
|
3 comments
3
19
My open-source, do-it-yourself cellphone (built with Arduino). (2013)
hardware
blog.arduino.cc
via
chadski
2 years ago
|
cached
|
7 comments
7
1
Three layer cake for shared-memory programming [2010]
pdf
programming
dl.acm.org
via
chadski
2 years ago
|
cached
|
2 comments
2
20
Is curl|bash insecure?
security
sandstorm.io
via
chadski
2 years ago
|
cached
|
44 comments
44
12
Experience Longhorn - A look at a defining Microsoft project
windows
longhorn.ms
via
chadski
2 years ago
|
cached
|
3 comments
3
3
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux (2005)
assembly
c
linux
muppetlabs.com
via
chadski
2 years ago
|
cached
|
2 comments
2
39
One year of Rust - The Rust Programming Language Blog
rust
blog.rust-lang.org
via
chadski
2 years ago
|
cached
|
2 comments
2
18
Jack Whitham: RISC instruction sets I have known and disliked
assembly
blog.jwhitham.org
via
chadski
2 years ago
|
cached
|
1 comment
1
5
Open-Source Processor Core Ready For IoT
hardware
eetimes.com
via
chadski
2 years ago
|
cached
|
no comments
0
23
Uncorrectable freedom and security issues on x86 platforms
hardware
security
mail.fsfeurope.org
via
chadski
2 years ago
|
cached
|
6 comments
6
21
Srinivasa Ramanujan
math
person
en.wikipedia.org
via
chadski
2 years ago
|
cached
|
15 comments
15
14
The Origins of Pattern Theory by Christopher Alexander
philosophy
patternlanguage.com
via
chadski
2 years ago
|
cached
|
10 comments
10
26
d’Oh My Zsh — How I unexpectedly built a monster of an open source project
practices
medium.com
via
chadski
2 years ago
|
cached
|
4 comments
4
8
Sulong: Fast LLVM IR Execution on the JVM with Truffle and Graal
pdf
compilers
llvm.org
via
chadski
2 years ago
|
cached
|
no comments
0
4
Intel x86 Considered Harmful
pdf
hardware
security
blog.invisiblethings.org
via
chadski
2 years ago
|
cached
|
no comments
0
5
Hacking GCN via OpenGL
slides
graphics
reversing
onedrive.live.com
via
chadski
2 years ago
|
cached
|
1 comment
1
10
Compilers that Target C
c
compilers
github.com
via
chadski
2 years ago
|
cached
|
no comments
0
6
Sun, Oracle, Android, Google and JDK Copyleft FUD
android
law
ebb.org
via
chadski
2 years ago
|
cached
|
no comments
0
1
The Anatomy of a Puzzle - Specification Driven Programming in Common Lisp
lisp
programming
chriskohlhepp.wordpress.com
via
chadski
2 years ago
|
cached
|
no comments
0
15
Yeah, we ditched Google Analytics
privacy
spideroak.com
via
chadski
2 years ago
|
cached
|
2 comments
2
14
Reproducible Builds - Provide a verifiable path from source code to binary
practices
programming
reproducible-builds.org
via
chadski
2 years ago
|
cached
|
no comments
0
20
The Bipolar Lisp Programmer
lisp
shenlanguage.org
via
chadski
2 years ago
|
cached
|
8 comments
8
3
Program above and beyond your actual ability by using FreeMind
release
alexkrupp.typepad.com
via
chadski
2 years ago
|
cached
|
1 comment
1
4
1500 Archers on a 28.8: Network Programming in Age of Empires and Beyond (2001)
distributed
games
programming
gamasutra.com
via
chadski
2 years ago
|
cached
|
no comments
0
7
rise4fun - a community of software engineering tools
compilers
compsci
rise4fun.com
via
chadski
2 years ago
|
cached
|
no comments
0
<< Page 4
|
Page 6 >>