Forwarded from nuno
URnetwork β’ Say goodbye to your VPN!
https://ur.io/
https://ur.io/
ur.io
URnetwork β’ Say goodbye to your VPN!
Weβre rebuilding the internet so that you can say goodbye to your VPN and never again make the tradeoff between the content you want and privacy.
does someone have matrial of CS 4675 i have found this link but it do not have any kind of study material if you have some information kindly msg me please here @berserkarc https://www.coursicle.com/gatech/courses/CS/4675/
https://citp.princeton.edu/research/memory/
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
Wikipedia
Cold boot attack
means of compromising computer security by restarting the computer
https://meltdownattack.com/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
RISC-V International
RISC-V Ratified Specifications
The RISC-V open-standard instruction set architecture (ISA) defines the fundamental guidelines for designing and implementing RISC-V processors.
https://www.baeldung.com/linux/luks1-vs-luks2
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
Baeldung on Linux
LUKS1 vs. LUKS2 for Partition Encryption | Baeldung on Linux
Learn about the differences between LUKS1 and LUKS2 for partition encryption.
I've gathered a lot of links before I could access Telegram:)
Forwarded from p.file (Π³)
#cpp #programming
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
YouTube
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
http://CppCon.org
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦
Forwarded from Heartbleed
YouTube
DOOM: The Dark Ages | Developer_Direct 2025 (4K) | Coming May 15, 2025
Join Marty, Hugo and the team at id Software as we journey into our first gameplay deep dive for DOOM: The Dark Ages!
Developed by id Software, DOOM: The Dark Ages is the prequel to the critically acclaimed DOOM (2016) and DOOM Eternal that tells an epicβ¦
Developed by id Software, DOOM: The Dark Ages is the prequel to the critically acclaimed DOOM (2016) and DOOM Eternal that tells an epicβ¦