-
anouarbensaad/vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of...
-
The Consul outage that never happened
The Consul outage that never happened Imagine when it’s time to renew your cert and you...
-
Using TLA+ to understand Xen vchan - Thomas Leonard's blog
Using TLA+ to Understand Xen Vchan Also checkout a talk about TLA+ on Elixir: Modeling Systems...
-
Build your own React
Build your own React We are going to rewrite React from scratch. Step by step. Following...
-
Chaos Order - Simple Thread
Randomizing Queries to Uncover Order-Dependency If ORDER BY is not given, the rows are returned in...
-
a13xp0p0v/linux-kernel-defence-map
Linux Kernel Defence Map Linux kernel security is a very complex topic. Some defence technologies are...
-
From zero to main(): Bootstrapping libc with Newlib
From zero to main(): Bootstrapping libc with Newlib This is the third post in our zero...
-
How We Built a Vectorized SQL Engine - Cockroach Labs
How CockroachDB Built a Vectorized SQL Engine Using vectorized processing in an execution engine makes more...
-
CCPA and GDPR comparison chart(PDF)
CCPA and GDPR comparison chart(PDF) Anyone build a product have to deal with GDPR and CCPA...
-
Preloading fonts: when does it make sense?
Preloading fonts: when does it make sense? In the past, when loading custom fonts we couldn’t...
-
Kayzaks/HackingNeuralNetworks
Hacking Neural Networks: A Short Introduction This is a short introduction on methods that use neural...
-
-
-
-
-
-
-
-
-
Diving into Merkle Trees
Diving into Merkle Trees Introduced in 1979 by Ralph C. Merkle in his Thesis: Secrecy, Authentications,...