Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
zod000
.
15
µTorrent has included an automatic cryptocoin-miner in their latest update.
merkle-trees
security
reddit.com
via
zod000
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
1
The Brave New World of Bodacious Assumptions in Cryptography [pdf]
pdf
security
ams.org
via
zod000
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Mining Bitcoin with pencil and paper: 0.67 hashes per day [blog]
merkle-trees
programming
righto.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Video: How to Multiply in C Programming [2012]
video
c
programming
satire
ehow.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
1
Making a "Simple" Site is Damn Hard
practices
programming
programming.tudorconstantin.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Mechanical Sympathy: CPU Cache Flushing Fallacy
compsci
programming
mechanical-sympathy.blogspot.dk
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
security
arxiv-web3.library.cornell.edu
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
23
Why age in software is bullshit
culture
rant
scripting.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
8
Can I replace a LAMP stack with SWI-Prolog?
linux
programming
swi-prolog.org
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
Simon Peyton Jones - Haskell is useless
video
haskell
programming
youtube.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
8
iSEC Completes TrueCrypt Audit
security
isecpartners.github.io
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
BetterCrypto⋅org
security
bettercrypto.org
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Go’s Type System Is An Embarrassment
go
programming
functionwhatwhat.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
1
Go Binary Sizes Are Growing out of Control
go
programming
donatstudios.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
The (Coming) Age Of The Developer-King
philosophy
programming
veracode.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
The second operating system hiding in every mobile phone
mobile
security
osnews.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
3
A portscan by email – HTTP over X.509 revisited
security
blog.nruns.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Google's Shell Style Guide
linux
programming
google-styleguide.googlecode.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
existential type crisis : Don't Pipe to your Shell
linux
security
blog.existentialize.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
Use multiple CPU Cores with your Linux commands -- awk, sed, bzip2, grep, wc, etc.
linux
rankfocus.com
via
zod000
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
The US government has betrayed the internet. We need to take it back
security
theguardian.com
via
zod000
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Building our fast search engine in Go
go
tamber.com
via
zod000
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A Comparison Between Perl and Haskell
haskell
programming
ocharles.org.uk
via
zod000
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Malware Hidden Inside JPG EXIF Headers
security
blog.sucuri.net
via
zod000
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
7
Fuck Off As A Service (FOAAS)
javascript
foaas.herokuapp.com
via
zod000
10 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>