Software History

Software History

10092 bookmarks
Newest
500 miles
500 miles
·web.mit.edu·
500 miles
Can TrueType Fonts contain malicious code?
Can TrueType Fonts contain malicious code?
I was looking around for information on this and couldn't really find anything that solid. I used the TTX tool in the fonttools library to decompile the font into XML format but couldn't garner any...
·superuser.com·
Can TrueType Fonts contain malicious code?
Surprisingly Turing-Complete
Surprisingly Turing-Complete
A catalogue of software constructs, languages, or APIs which are unexpectedly Turing-complete; implications for security and reliability.
·gwern.net·
Surprisingly Turing-Complete
Sorting algorithms/Sleep sort
Sorting algorithms/Sleep sort
In general, sleep sort works by starting a separate task for each item to be sorted, where each task sleeps for an interval corresponding to the item's sort key...
·rosettacode.org·
Sorting algorithms/Sleep sort
Exploiting the DRAM rowhammer bug to gain kernel privileges
Exploiting the DRAM rowhammer bug to gain kernel privileges
Rowhammer blog post (draft) Posted by Mark Seaborn, sandbox builder and breaker, with contributions by Thomas Dullien, reverse en...
·googleprojectzero.blogspot.com·
Exploiting the DRAM rowhammer bug to gain kernel privileges
·wiki.c2.com·