Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
noelle
.
38
'Everyone Should Have a Moral Code' Says Developer Who Deleted Code Sold to ICE
culture
philosophy
programming
vice.com
via
noelle
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
82 comments
82
5
New attack on WPA/WPA using PMKID
networking
security
hashcat.net
via
noelle
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Bare Metal K8s Clustering at Chick-fil-A Scale
devops
go
medium.com
via
noelle
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
17
A few thoughts on Ray Ozzie’s “Clear” Proposal
mobile
security
blog.cryptographyengineering.com
via
noelle
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Reverse Engineering APIs: Coffee Meets Bagel
mobile
privacy
security
medium.com
via
noelle
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
21
How I hacked hundreds of companies through their helpdesk
security
medium.freecodecamp.org
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
11
How I Accidentally Framed Myself for a Hacking Frenzy
security
blog.portswigger.net
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
-1
Animus Intelligence
☶
ai
security
animus.io
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Even good bots fight: The case of Wikipedia
compsci
science
journals.plos.org
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Detecting In-Memory Mimikats
security
windows
securityriskadvisors.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Finding PTEs with prefetch on Intel
security
blog.ioactive.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Intel Security: 93% of Companies Can't Triage All Their Threats
security
exabeam.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
6
Hacking In-Flight Entertainment Systems
security
blog.ioactive.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Every Windows 10 in-place Upgrade is a SEVERE Security risk
☶
security
windows
blog.win-fu.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Azure bug bounty: Pwning Red Hat Enterprise Linux
linux
security
ianduffy.ie
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Abusing Protocols in Edge to Load Local Files, bypass the HTML5 Sandbox, Open Popups and more
browsers
security
brokenbrowser.com
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
Analysis and exploitation of Pegasus kernel vulnerabilities (CVE-2016-4655 / CVE-2016-4656)
ios
security
jndok.github.io
via
noelle
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Experimental.GenStage.Flow
elixir
hexdocs.pm
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Visual Studio Code 1.2 Released
☶
release
code.visualstudio.com
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Hacking the Mitsubishi Outlander PHEV hybrid
security
pentestpartners.com
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Dead RATs: Exploiting malware C2 servers
reversing
security
samvartaka.github.io
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
What I Fought For
culture
person
michaelochurch.wordpress.com
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
19
10 SQL Tricks That You Didn’t Think Were Possible
☶
databases
blog.jooq.org
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
The Epic Story of Dropbox’s Exodus From the Amazon Cloud Empire
distributed
hardware
wired.com
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
Scaling to exabytes and beyond
☶
hardware
networking
blogs.dropbox.com
via
noelle
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
Page 2 >>