Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·1d
💣ZIP Vulnerabilities
Flag this post
Valuable News – 2025/11/03
discoverbsd.com·2h
🔌Operating system internals
Flag this post
Writing a DOS Clone in 2019
🔩Systems Programming
Flag this post
On Designing Low-Latency Systems for High-Traffic Environments
hackernoon.com·2h
🌊Stream Processing
Flag this post
[$] Namespace reference counting and listns()
lwn.net·3h
🕵️Domain Enumeration
Flag this post
Building blobd: single-machine object store with sub-millisecond reads and 15 GB/s uploads
🗃️Database Storage
Flag this post
Some Fun Videos on Optimizing NES Code
bumbershootsoft.wordpress.com·1d
🎯Emulator Accuracy
Flag this post
Dive into Systems
🔩Systems Programming
Flag this post
xb.sql and xbi.sql - Explain Oracle Execution Plans Better! (Part 3 - Cardinality Misestimates)
tanelpoder.com·12h
🧠Query Planners
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·11h
🛡️ARM TrustZone
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·3d
🔓Decompilation
Flag this post
Making a C64/C65 compatible computer: MEGAphone contact list and Dialer
📺VT100 Emulation
Flag this post
Kitty Terminal 0.44 Released with Unicode 17 Support
linuxiac.com·4h
🖥️Terminal Emulators
Flag this post
The true pro tax: M5 Pro vs. M5 Max - why that extra 275GB/s of memory bandwidth is worth thousands of dollars for video and AI workflows
techradar.com·1d
🖥️Modern Terminals
Flag this post
How KVM and QEMU run VMs in Linux
🎯Emulator Accuracy
Flag this post
A Roller Coaster Of Emotions
deprogrammaticaipsum.com·15h
🖥Retro Computing
Flag this post
Loading...Loading more...