Newest Stories by fcbsd
Home
Recent
Comments
Search
Login
5
SRI Demonstrates Abacus, a New Rotary Transmission
☶
science
spectrum.ieee.org
via
fcbsd
1 year ago
|
cached
|
1 comment
1
6
Sheep and Goats, Bullies and Allies.
culture
linuxcodemonkey.blogspot.com
via
fcbsd
1 year ago
|
cached
|
3 comments
3
4
The Ops Identity Crisis
culture
devops
susanjfowler.com
via
fcbsd
1 year ago
|
cached
|
no comments
0
15
a single byte write opened a root execution exploit
android
c
security
daniel.haxx.se
via
fcbsd
1 year ago
|
cached
|
no comments
0
32
Google's "Director of Engineering" Hiring Test
☶
practices
gwan.com
via
fcbsd
1 year ago
|
cached
|
29 comments
29
31
The New Minimalism
programming
prog21.dadgum.com
via
fcbsd
1 year ago
|
cached
|
9 comments
9
4
Snagging Active Directory credentials over WiFi
security
windows
zone13.io
via
fcbsd
1 year ago
|
cached
|
no comments
0
9
Simple testing can prevent most critical failures
☶
debugging
blog.acolyer.org
via
fcbsd
1 year ago
|
cached
|
no comments
0
1
Spying on Android events without modifying source code
android
java
programming
kamalmarhubi.com
via
fcbsd
1 year ago
|
cached
|
no comments
0
86
How to Crash Systemd in One Tweet
linux
security
systemd
agwa.name
via
fcbsd
1 year ago
|
cached
|
64 comments
64
29
KrebsOnSecurity Offline
☶
security
twitter.com
via
fcbsd
1 year ago
|
cached
|
5 comments
5
27
Oh, shit, git!
☶
vcs
ohshitgit.com
via
fcbsd
1 year ago
|
cached
|
19 comments
19
6
Lessons Learned from Using Regexes At Scale
practices
programming
loggly.com
via
fcbsd
2 years ago
|
cached
|
no comments
0
10
Keystroke Recognition Using WiFi Signals
pdf
security
sigmobile.org
via
fcbsd
2 years ago
|
cached
|
2 comments
2
3
Top Eight Must-Listen Developer Podcasts
☶
javascript
programming
ruby
dev.to
via
fcbsd
2 years ago
|
cached
|
no comments
0
18
PoC||GTFO 0x12
☶
pdf
reversing
alchemistowl.org
via
fcbsd
2 years ago
|
cached
|
2 comments
2
8
Binary Keyboard
☶
hardware
hackaday.com
via
fcbsd
2 years ago
|
cached
|
2 comments
2
12
The Architecture of Open Source Applications
programming
aosabook.org
via
fcbsd
2 years ago
|
cached
|
1 comment
1
8
Exploring and exploiting Lenovo firmware secrets
reversing
security
blog.cr4.sh
via
fcbsd
2 years ago
|
cached
|
no comments
0
9
Penetration Testing Tools
☶
security
highon.coffee
via
fcbsd
2 years ago
|
cached
|
no comments
0
3
Deliberate Practice in the Acquisition of Expert Performance (1993)
☶
pdf
practices
projects.ict.usc.edu
via
fcbsd
2 years ago
|
cached
|
no comments
0
12
International Journal of PoC || GTFO 0x12
☶
pdf
reversing
openwall.info
via
fcbsd
2 years ago
|
cached
|
2 comments
2
3
Moore’s law reprieve
☶
hardware
arstechnica.co.uk
via
fcbsd
2 years ago
|
cached
|
no comments
0
2
The Impact of Browser Warning Storage Policies
pdf
browsers
security
drive.google.com
via
fcbsd
2 years ago
|
cached
|
2 comments
2
11
Restoring software's good name with a humble script
practices
cs.uni.edu
via
fcbsd
2 years ago
|
cached
|
4 comments
4
<< Page 6
|
Page 8 >>