does someone have matrial of CS 4675 i have found this link but it do not have any kind of study material if you have some information kindly msg me please here @berserkarc https://www.coursicle.com/gatech/courses/CS/4675/
https://citp.princeton.edu/research/memory/
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
https://superuser.com/questions/464297/wipe-ram-on-shut-down-to-prevent-cold-boot-attack
http://static.usenix.org/event/sec08/tech/full_papers/halderman/halderman.pdf
Wikipedia
Cold boot attack
means of compromising computer security by restarting the computer
https://meltdownattack.com/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
https://riscv.org/specifications/ratified/
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/
https://lists.llvm.org/pipermail/llvm-commits/Week-of-Mon-20180101/513630.html
https://ubuntu.com/security/vulnerabilities/spectre-and-meltdown
https://en.wikipedia.org/wiki/Entropy_(computing)
https://en.wikipedia.org/wiki/Hurd
https://en.wikipedia.org/wiki/OpenBSD_security_features
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://en.wikipedia.org/wiki/C_standard_library#Buffer_overflow_vulnerabilities
https://salsa.debian.org/security-tracker-team/security-tracker
https://madaidans-insecurities.github.io/security-privacy-advice.html
https://en.wikipedia.org/wiki/Principle_of_least_privilege
https://www.slashroot.in/how-are-passwords-stored-linux-understanding-hashing-shadow-utils
https://www.kicksecure.com/wiki/Unicode-show
https://www.whonix.org/wiki/Install_Software
https://www.whonix.org/wiki/Time_Attacks
https://www.kicksecure.com/wiki/Verifying_Software_Signatures
https://www.whonix.org/wiki/Advanced_Deanonymization_Attacks
https://www.whonix.org/wiki/Tunnel_UDP_over_Tor
https://www.whonix.org/wiki/Tor_Entry_Guards
https://www.kicksecure.com/wiki/Disable_TCP_and_ICMP_Timestamps
https://www.whonix.org/wiki/YouTube
https://www.whonix.org/wiki/Telegram
https://www.whonix.org/wiki/BitMessage
https://www.whonix.org/wiki/UnstoppableSwap
https://www.whonix.org/wiki/Monero
https://apps.nsa.gov/
RISC-V International
RISC-V Ratified Specifications
The RISC-V open-standard instruction set architecture (ISA) defines the fundamental guidelines for designing and implementing RISC-V processors.
https://www.baeldung.com/linux/luks1-vs-luks2
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
https://linuxsecurity.com/news/security-vulnerabilities/critical-flaws-x-org-xwayland
https://www.securityweek.com/xorg-flaw-exposes-unix-oses-attacks/
https://www.x.org/wiki/Development/Security/
https://ubuntu.com/security/notices/USN-7085-2
https://wiki.xfce.org/releng/wayland\_roadmap
https://wiki.xfce.org/thunar/dev
https://wiki.xfce.org/mousepad/dev
https://hardenedlinux.org/blog/2025-05-07-the-path-to-memory-safety-is-inevitable/
https://github.com/pizlonator/llvm-project-deluge
https://hardenedlinux.org/blog/2024-10-13-container-hardening-process/
https://hardenedlinux.org/blog/2024-08-20-gnu/linux-sandboxing-a-brief-review/
https://hardenedlinux.org/blog/2023-09-07-boot-unguarded-x86-trust-anchor-downfalls-to-the-leaked-oem-internal-tools-and-signing-keys/
https://hardenedlinux.org/blog/2021-02-10-cheap-pcb-story/
Baeldung on Linux
LUKS1 vs. LUKS2 for Partition Encryption | Baeldung on Linux
Learn about the differences between LUKS1 and LUKS2 for partition encryption.
I've gathered a lot of links before I could access Telegram:)
Forwarded from p.file (Π³)
#cpp #programming
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
https://www.youtube.com/watch?v=NH1Tta7purM
YouTube
CppCon 2017: Carl Cook βWhen a Microsecond Is an Eternity: High Performance Trading Systems in C++β
http://CppCon.org
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦
β
Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017
β
Automated trading involves submitting electronic orders rapidly when opportunities arise. But itβs harder thanβ¦
Forwarded from Heartbleed
YouTube
DOOM: The Dark Ages | Developer_Direct 2025 (4K) | Coming May 15, 2025
Join Marty, Hugo and the team at id Software as we journey into our first gameplay deep dive for DOOM: The Dark Ages!
Developed by id Software, DOOM: The Dark Ages is the prequel to the critically acclaimed DOOM (2016) and DOOM Eternal that tells an epicβ¦
Developed by id Software, DOOM: The Dark Ages is the prequel to the critically acclaimed DOOM (2016) and DOOM Eternal that tells an epicβ¦
Forwarded from (Ο (ΞΌ (Ξ»)))
Racket Discourse
Make your own Racket π₯
Did you know you can make your own Racket installer? Racket has so many options, and I have a habit of destroying my configuration file. As some point in the past I started thinking about creating an installer that installed Racket to my specifications.β¦
Forwarded from Programming Deadlock
π A collection of resources about supercompilation
https://github.com/etiams/supercompilation-resources
https://github.com/etiams/supercompilation-resources
GitHub
GitHub - etiams/supercompilation-resources: π A collection of resources about supercompilation
π A collection of resources about supercompilation - etiams/supercompilation-resources