Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
eBPF
.
69
"Rules" that terminal programs follow
unix
jvns.ca
via
eBPF
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
42 comments
42
9
AES-GCM and breaking it on nonce reuse
cryptography
security
frereit.de
via
eBPF
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
44
Self-Hosting Isn't a Solution; It's A Patch
2
privacy
matduggan.com
via
eBPF
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
60 comments
60
1
The Esc key bug in games with the CJK IMEs
programming
ericswpark.com
via
eBPF
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
79
Zig Reproduced Without Binaries
nix
security
zig
jakstys.lt
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
17
Playing Bad Apple over RSS
javascript
php
ersei.net
authored by
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
CVE-2024-9632 xorg-x11-server: heap-based buffer overflow privilege escalation vulnerability
c
security
bugzilla.redhat.com
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
16 comments
16
10
Podman 5.3 changes for improved networking experience with pasta
networking
release
blog.podman.io
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
16
SERVFAIL: the first 100 days
distributed
sdomi.pl
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
19
The Global Surveillance Free-for-All in Mobile Ad Data
privacy
krebsonsecurity.com
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
18
Blocking code is a leaky abstraction
rust
notgull.net
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
28 comments
28
20
Phucking with Phishers
security
web
obrhubr.org
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
3
A deep dive into the iOS backup/restore system: The Sparserestore exploit
ios
security
gist.github.com
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Deriving the Kelly Criterion to maximise Profits
math
obrhubr.org
via
eBPF
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
116
How to Monetize a Blog
design
satire
modem.io
via
eBPF
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
18 comments
18
1
Small-sized sbrk calls unexpectedly succeed despite low RLIMIT_AS
linux
blog.vashishtha.in
via
eBPF
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Can a Computer Program be a Cruciverbalist?
games
programming
obrhubr.org
via
eBPF
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
83
You should make a new programming language
programming
ntietz.com
via
eBPF
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
30 comments
30
22
Meta-Thunderbolt
hardware
nocoffei.com
via
eBPF
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
3
How Many Languages Does Wikimedia Search Support?
programming
techblog.wikimedia.org
via
eBPF
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
The Contemporary Carphone
historical
computer.rip
via
eBPF
8 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
27
At the Mountains of Madness
linux
nix
antithesis.com
via
eBPF
8 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
5
Reverse Engineering the Verification QR Code on my Diploma
reversing
obrhubr.org
via
eBPF
8 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
12
A Look Back At Stripware
historical
ironicsans.beehiiv.com
via
eBPF
8 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
83
PySkyWiFi: completely free, unbelievably stupid wi-fi on long-haul flights
programming
robertheaton.com
via
eBPF
8 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
<< Page 1
|
Page 3 >>