So that was 2016
https://blog.acolyer.org/2016/12/19/so-that-was-2016/ [blog.acolyer.org]
2016-12-19 15:52
If you don’t have time to read 200 papers, maybe just the best 20?
random
So that was 2016
https://blog.acolyer.org/2016/12/19/so-that-was-2016/ [blog.acolyer.org]
2016-12-19 15:52
If you don’t have time to read 200 papers, maybe just the best 20?
Some links to cool CIA articles
https://medium.com/@thegrugq/some-links-to-cool-cia-articles-852a675b8192 [medium.com]
2017-10-19 13:22
Building Dacein
https://szymonkaliski.com/log/2019-03-01-building-dacein/ [szymonkaliski.com]
2019-04-07 16:43
Dacein is an experimental creative coding IDE combining a few different ideas that I’ve been thinking about: functional creative coding library, time travel abilities, livecoding editor, direct manipulation
http://szymonkaliski.github.io/dacein/
source: L
How to Print Integers Really Fast
https://www.pvk.ca/Blog/2017/12/22/appnexus-common-framework-its-out-also-how-to-print-integers-faster/ [www.pvk.ca]
2017-12-25 04:37
Human readable formats wasting CPU cycles to print integers is a common problem, and we quickly found a few promising approaches and libraries.
source: L
CVE-2017-5850 - Remote DoS against OpenBSD http server
https://pierrekim.github.io/blog/2017-02-07-openbsd-httpd-CVE-2017-5850.html [pierrekim.github.io]
2017-02-06 20:17
SSL renegotiation and range request DOS.
source: L
Tracking Down a Freaky Python Memory Leak
https://benbernardblog.com/tracking-down-a-freaky-python-memory-leak/ [benbernardblog.com]
2016-12-07 19:54
It’s not easy. But after some promising leads fizzle out, progress at last.
Cache-Control for Civilians
https://csswizardry.com/2019/03/cache-control-for-civilians/ [csswizardry.com]
2019-03-07 21:35
The best request is the one that never happens: in the fight for fast websites, avoiding the network is far better than hitting the network at all. To this end, having a solid caching strategy can make all the difference for your visitors.
So many headers, so little time.
source: L
How to make compressed file quines, step by step
https://blog.matthewbarber.io//2019/07/22/how-to-make-compressed-file-quines.html [blog.matthewbarber.io]
2019-07-27 16:22
Much of the credit goes to folks much smarter than myself (they will be introduced); this tutorial is meant to curate previous work and literature as much as it is for myself to educate you. The goal here is to allow for any curious, technically-minded newcomer to make sense of all the concepts involved in creating compression quines.
source: L
Forced rhubarb – a vegetable deprived of sunlight for extra sweetness
http://www.bbc.com/travel/story/20190424-the-english-vegetable-picked-by-candlelight [www.bbc.com]
2019-04-25 15:16
A notoriously fickle vegetable to harvest, Yorkshire forced rhubarb is anything but easy to grow. It thrives in the county’s cold winters, but if the soil is too wet, it can’t be planted. If the temperature is too hot, it won’t grow; and 10 or more frosts are needed before a farmer can even think about forcing it. Only then can horticulturalists remove the heavy roots from the field, then clean and replant them inside the forcing sheds where photosynthesis is limited, encouraging glucose stored in the roots to stimulate growth. It demands patience, expertise and good fortune, and, ultimately, it is engineered for maximum taste: once deprived of light, the vegetable is forced to use the energy stored in its roots, making it far sweeter than the normal variety.
source: HN
OpenBSD 6.0 VPN Endpoint for iOS and OSX
http://blog.gordonturner.ca/2016/12/10/openbsd-6-0-vpn-endpoint-for-ios-and-osx/ [blog.gordonturner.ca]
2016-12-12 17:00
IPsec forever remains in the realm of things that aren’t terribly difficult to setup if you know what you’re doing, but nigh impossible if you’re starting from scratch and trying to wade through hundreds of pages of possible configuration options. Here’s one example config to help.
Anime floppy disks
https://animefloppies.tumblr.com/ [animefloppies.tumblr.com]
2017-10-29 17:09
Shadow Stack to fight buffer overflows
http://deroko.phearless.org/shadow_stack.txt [deroko.phearless.org]
2016-12-05 20:18
Shadow stack (lets call it like that for now) is a new mitigation present
Cloak & Dagger
http://cloak-and-dagger.org/ [cloak-and-dagger.org]
2017-05-25 06:48
Cloak & Dagger is a new class of potential attacks affecting Android devices.
Tapjacking for fun and profit.
source: L
XS-Searching Google’s bug tracker to find out vulnerable source code
https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549 [medium.com]
2019-03-19 00:32
This article is a detailed explanation of how I could have exploited Google’s Monorail issue tracker to leak sensitive information (vulnerable source code files and line numbers) from private bug reports through a XS-Search attack.
Back When Pizza Hut Was an Experience
http://retroramblings.com/pizza-hut/ [retroramblings.com]
2017-09-14 05:25
I miss the “glory days” of Pizza Hut. That magical time in the 80’s and early 90’s when it was a destination, and not just somewhere to eat. I’ve found recently that those days of yore are long gone, and what is left is what seems like a company struggling to hang on.
source: K
Your Makefiles are wrong
https://tech.davis-hansson.com/p/make/ [tech.davis-hansson.com]
2019-12-17 23:29
Your Makefiles are full of tabs and errors. An opinionated approach to writing (GNU) Makefiles that I learned from Ben may still be able to salvage them.
I don’t agree with everything, or even most of this, but worth considering.
source: HN
Writing a Formally-Verified Porn Browser in Coq and Haskell
http://www.michaelburge.us/2017/08/25/writing-a-formally-verified-porn-browser-in-coq.html [www.michaelburge.us]
2017-08-27 01:12
Hopefully this example shows that there’s nothing really stopping anyone from using Coq in their Haskell programs today.
source: L
Evolution of the x86 context switch in Linux
http://www.maizure.org/projects/evolution_x86_context_switch_linux/index.html [www.maizure.org]
2019-01-15 05:34
While researching archaic facts about the 80386 hardware context switch last weekend, I remembered that early versions of the Linux kernel relied on it. I was promptly sidetracked for hours reading code I hadn’t seen in years. This weekend, I’ve decided to write down the journey to consolidate all the nuggets of fun stuff I discovered along the way.
The exercise: Trace the context switch through the Linux kernel from the earliest (0.01) to the most recent LTS release (4.14.67) -- with special emphasis on the first and last versions.
source: L
Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply
http://www.righto.com/2017/12/repairing-1960s-mainframe-fixing-ibm.html [www.righto.com]
2017-12-25 23:03
The problem started when the machine was powered up at the same time someone shut down the main power, apparently causing some sort of destructive power transient. The computer’s core memory completely stopped working, making the computer unusable. To fix this we had to delve into the depths of the computer’s core memory circuitry and the power supplies.
Building the System/360 Mainframe Nearly Destroyed IBM
https://spectrum.ieee.org/building-the-system360-mainframe-nearly-destroyed-ibm [spectrum.ieee.org]
2025-04-09 06:25
In the years leading up to its 7 April 1964 launch, however, the 360 was one of the scariest dramas in American business. It took a nearly fanatical commitment at all levels of IBM to bring forth this remarkable collection of machines and software. While the technological innovations that went into the S/360 were important, how they were created and deployed bordered on disaster. The company experienced what science policy expert Keith Pavitt called “tribal warfare”: people clashing and collaborating in a rapidly growing company with unstable, and in some instances unknown, technologies, as uncertainty and ambiguity dogged all the protagonists.
source: HN