curl -fsSL https://git.io/rime-install | bash實際上這一行 bash 就可以安装 Rime 了
duangsuse::Echo pinned «curl -fsSL https://git.io/rime-install | bash 實際上這一行 bash 就可以安装 Rime 了»
Forwarded from RustPlayBot
source code:fn main() {
use std::process::{Command, Stdio};
let child = Command::new("uptime")
.stdout(Stdio::piped())
.spawn()
.expect("::");
let output = child.waitwithoutput().expect(":");
println!(
"{}",
String::fromutf8(output.stdout).unwrapor(String::from("bad utf8"))
);
}
Rustc output:Program output:11:35:03 up 46 days, 20:03, 0 users, load average: 0.14, 0.09, 0.02
https://github.com/xoreaxeaxeax/rosenbridge
project:rosenbridge reveals a hardware backdoor in some desktop, laptop, and embedded x86 processors.
The backdoor allows ring 3 (userland) code to circumvent processor protections to freely read and write ring 0 (kernel) data.
While the backdoor is typically disabled (requiring ring 0 execution to enable it), we have found that it is enabled by default on some systems.
project:rosenbridge reveals a hardware backdoor in some desktop, laptop, and embedded x86 processors.
The backdoor allows ring 3 (userland) code to circumvent processor protections to freely read and write ring 0 (kernel) data.
While the backdoor is typically disabled (requiring ring 0 execution to enable it), we have found that it is enabled by default on some systems.
GitHub
GitHub - xoreaxeaxeax/rosenbridge: Hardware backdoors in some x86 CPUs
Hardware backdoors in some x86 CPUs. Contribute to xoreaxeaxeax/rosenbridge development by creating an account on GitHub.