Forwarded from nuno
URnetwork β’ Say goodbye to your VPN!
https://ur.io/
https://ur.io/
ur.io
URnetwork β’ Say goodbye to your VPN!
Weβre rebuilding the internet so that you can say goodbye to your VPN and never again make the tradeoff between the content you want and privacy.
does someone have matrial of CS 4675 i have found this link but it do not have any kind of study material if you have some information kindly msg me please here @berserkarc https://www.coursicle.com/gatech/courses/CS/4675/
https://citp.princeton.edu/research/memory/
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
Wikipedia
Cold boot attack
means of compromising computer security by restarting the computer
https://meltdownattack.com/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
RISC-V International
RISC-V Ratified Specifications
The RISC-V open-standard instruction set architecture (ISA) defines the fundamental guidelines for designing and implementing RISC-V processors.
https://www.baeldung.com/linux/luks1-vs-luks2
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
Baeldung on Linux
LUKS1 vs. LUKS2 for Partition Encryption | Baeldung on Linux
Learn about the differences between LUKS1 and LUKS2 for partition encryption.
I've gathered a lot of links before I could access Telegram:)
Forwarded from p.file (Π³)
#cpp #programming
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
YouTube
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
http://CppCon.org
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦