Survey of Alternative Displays
> The purpose of this article is to collect and consolidate a list of these alternative methods of working with displays, light and optics. This will by no means be an exhaustive list of the possibilities available — depending on how you categorize, there could be dozens or hundreds of ways. There are historical mainstays, oddball one-offs, expensive failures and techniques that are only beginning to come into their own.
There’s more to life than the LCD.
507 Mechanical Movements
> This is an online edition of the classic technical reference Five Hundred and Seven Mechanical Movements by Henry T. Brown.
> This site contains the original illustrations and text from the 21st edition of the book, published in 1908. It also includes animated versions of the illustrations, and occasional notes by the webmaster.
Browser Side Channels
> Well-known DOM APIs
Only a few dozen issues.
> HTTP/3 is the to-become next generation of the HTTP protocol family. This version is similar to HTTP/2 in features, and is most different than its predecessor primarily by the fact that HTTP/3 will only be done over QUIC.
> QUIC is a new reliable transport protocol that could be viewed as a sort of next generation TCP.
> HTTP/3 explained is a free and open booklet describing the HTTP/3 and QUIC protocols.
Web version: https://http3-explained.haxx.se/en/
Algorithms by Jeff Erickson
> This web page contains a free electronic version of my (soon to be) self-published textbook Algorithms, along with other lecture notes I have written for various theoretical computer science classes at the University of Illinois, Urbana-Champaign since 1998.
> 0th edition (prepublication draft), December 2018
The New Illustrated TLS Connection
> Every byte explained and reproduced. A revised edition in which we dissect the new manner of secure and authenticated data exchange, the TLS 1.3 cryptographic protocol. In this demonstration a client connects to a server, negotiates a TLS 1.3 session, sends “ping“, receives “pong“, and then terminates the session.
Static Program Analysis
> These notes present principles and applications of static analysis of programs. We cover basic type analysis, lattice theory, control flow graphs, dataflow analysis, fixed-point algorithms, widening and narrowing, path sensitivity, relational analysis, interprocedural analysis, context sensitivity, control-flow analysis, several flavors of pointer analysis, and key concepts of semantics-based abstract interpretation. A tiny imperative programming language with pointers and first-class functions is subjected to numerous different static analyses illustrating the techniques that are presented.
MAC Address Age Tracking
> This repository is used to determine an approximate issuance date for IEEE allocated hardware address ranges. The dataset was bootstrapped using a combination of the DeepMAC and Wireshark archives and maintained via daily pulls from the IEEE website.
ActivityPub W3C Recommendation 23 January 2018
> The ActivityPub protocol is a decentralized social networking protocol based upon the [ActivityStreams] 2.0 data format. It provides a client to server API for creating, updating and deleting content, as well as a federated server to server API for delivering notifications and content.
How To Cook Cisco
> This white paper is intended to reveal intricacies of Cisco vulnerabilities exploitation. All the information presented in this research is based on our experience and updates other researchers’ experience and knowledge. The very process of exploiting Cisco vulnerabilities depends heavily on a specific vulnerability and a gadget. We encourage you to think of the information below as of a book of recipes enabling you to execute arbitrary code in any given situation, rather than a complete solution.
Data Viz Project
one of every visualization.
Math and Computation
> This book is devoted to computational complexity theory, and its many connections and interactions with mathematics. This mathematical discipline arose from the quest to understand eﬃcient computation. In its half-century of existence it has developed into a rich, deep and broad theory with remarkable achievements and formidable challenges. It had important practical impact on computer science and industry, and has forged strong connections with a diverse set of mathematical ﬁelds.
How to Be a Know-It-All
> What you learn from the Very Short Introduction series.
> Some of these books are concise introductions to topics you might later wish to pursue in greater depth: Modern India, say, or Shakespeare’s Tragedies. Others, like “Teeth,” contain pretty much everything the average layperson would ever want or need to know. All of them, however, take their Very Short commitment seriously. The length of each book is fixed at thirty-five thousand words, or roughly a hundred and twenty pages. (See Very Short Introduction No. 500, “Measurement.”)
A Stick Figure Guide to the Advanced Encryption Standard (AES)
> A play in 4 acts. Please feel free to exit along with the stage character that best represents you. Take intermissions as you see fit. Click on the stage if you have a hard time seeing it. If you get bored, you can jump to the code. Most importantly, enjoy the show!
The Beer Drinker’s Guide to SAML
> Simply put, Security Assertion Markup Language (better known as its acronym, SAML) is a protocol for authenticating to web applications. Federating identities is a common practice that amounts to having user identities stored across discrete applications and organizations. SAML allows these federated apps and organizations to communicate and trust one another’s users.
> Learn return-oriented programming through a series of challenges designed to teach ROP techniques in isolation, with minimal reverse-engineering and bug-hunting.
Exploring Windows virtual memory management
> Exhausted yet? Compared to the 64-bit paging scheme we talked about in our last article, Windows memory management is significantly more complex and involves a lot of moving parts.
This could be more than a complete chapter in an OS book.
The Alpha AXP, part 1: Initial plunge
The Codex Arundel
> Contents:Notebook of Leonardo da Vinci (‘The Codex Arundel’). A collection of papers written in Italian by Leonardo da Vinci (b. 1452, d. 1519), in his characteristic left-handed mirror-writing (reading from right to left), including diagrams, drawings and brief texts, covering a broad range of topics in science and art, as well as personal notes.
> unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives