Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
wizardishungry
.
18
Templates of Doom
games
historical
lock.cmpxchg8b.com
via
wizardishungry
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
33
binpash/try
linux
security
unix
github.com
via
wizardishungry
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
22
Tutorial for extracting the GameBoy ROM from photographs of the die
hardware
reversing
github.com
via
wizardishungry
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Launch OpenBSD vmd Guests on Demand from SSH
openbsd
virtualization
jonwillia.ms
authored by
wizardishungry
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
hash-prospector: Automated integer hash function discovery
ai
math
github.com
via
wizardishungry
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
22
Transparent Telemetry for Open-Source Projects (Transparent Telemetry, Part 1)
go
privacy
research.swtch.com
via
wizardishungry
10 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
53 comments
53
2
Multi-ciphertext security degradation for lattices
pdf
cryptography
cr.yp.to
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Linux: What can you epoll?
linux
darkcoding.net
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
17
The feasibility of pledge() on Linux
api
c
linux
openbsd
security
blog.gnoack.org
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
11
maskromtool: A tool for extracting bits from Mask ROM photographs
graphics
hardware
reversing
github.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
18
redefining for loop variable semantics
go
github.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
20
TIL: You Can Access A User's Camera with Just HTML
browsers
web
austingil.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
46
Using Landlock to Sandbox GNU Make
linux
programming
security
justine.lol
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
28 comments
28
9
google/go-flow-levee
go
programming
security
github.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
11
Help pick a syntax for CSS nesting
browsers
css
web
developer.chrome.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
27
Intel Microcode Decryptor
assembly
cryptography
hardware
security
github.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
15
Infinite Mac: An Instant-Booting Quadra in Your Browser
browsers
historical
mac
wasm
blog.persistent.info
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
16
MelrÅse, a language to program and play music
art
browsers
go
ernestmicklei.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
OpenSSL Security Advisory: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
cryptography
release
security
openssl.org
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Inspecting Web Views in macOS
mac
web
blog.jim-nielsen.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
41
microsoft/mimalloc
programming
github.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
3
Mapping GPS/GNSS Interference Through ADS-B Data
science
visualization
rtl-sdr.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Investigating Influencer VPN Ads on YouTube
pdf
networking
security
cs.umd.edu
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Isolating problematic Cgo code
go
graphics
unix
jonwillia.ms
authored by
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Predicting developments in real world conflict from patterns of failed logins
security
bsdly.blogspot.com
via
wizardishungry
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>