inks

rss

best

tags

sources

random

Enlightening the I/O path: A holistic approach for application performance

https://blog.acolyer.org/2017/03/13/enlightening-the-io-path-a-holistic-approach-for-application-performance/ - [blog.acolyer.org]
2017-03-13 19:17:30
tags: compsci paper perf storage systems

> What we really need instead is an end-to-end view of I/O priority that can be taken into account at each layer.

^

Chat Systems

https://xkcd.com/1810/ - [xkcd.com]
2017-03-13 19:00:18
tags: comic life networking social

Kickstarter idea: an address book of messaging systems.

^

GIF MD5 hashquine

http://www.rogdham.net/2017/03/12/gif-md5-hashquine.en - [www.rogdham.net]
2017-03-13 18:52:17
tags: graphics hash programming

> This is the method that I used to create the following GIF MD5 hashquine

https://github.com/rogdham/gif-md5-hashquine

source: solar

^

Getting Code Execution on Windows by Abusing Default Kernel Debugging Setting

https://tyranidslair.blogspot.com/2017/03/getting-code-execution-on-windows-by.html - [tyranidslair.blogspot.com]
2017-03-13 18:47:08
tags: admin hardware investigation swtools windows

And the COM1 port.

> So this is a fun, but not particularly serious issue if someone’s got physical access to your machine and you’ve covered a number of the common attack vectors (like HDD access, BIOS, Firewire).

source: grugq

^

Crazy Eddie Fraud

https://whitecollarfraud.com/crazy-eddie/crazy-eddie-fraud/ - [whitecollarfraud.com]
2017-03-13 18:40:01
tags: article business finance history hoipolloi series

> We reasoned that with Crazy Eddie as a public company, we could unload our stock at inflated prices on unsuspecting victims. This would be more profitable than skimming cash sales, tax evasion, and paying employees “off the books.” We anticipated getting a “bigger bang for the buck” by inflating earnings as a public company.

Part of a series: https://whitecollarfraud.com/crazy-eddie/

source: grugq

^

BIOS Based Rootkits

https://n0where.net/bios-based-rootkits/ - [n0where.net]
2017-03-13 18:30:09
tags: cpu exploit hardware programming security systems virtualization

> My first goal was to reproduce the findings made by Core Security in 2009, and then my second task was to investigate how I could extend their findings. My ultimate goal was to create some sort of BIOS based rootkit which could easily be deployed.

source: grugq

^

Ghost Recon Wildlands Terrain Technology and Tools

https://666uille.files.wordpress.com/2017/03/gdc2017_ghostreconwildlands_terrainandtechnologytools-onlinevideos1.pdf - [666uille.files.wordpress.com]
2017-03-13 18:00:38
tags: gaming graphics pdf slides

Making a virtual country’s worth of terrain and roads.

source: L

^

How I ended up writing a new real-time kernel

https://dmitryfrank.com/articles/how_i_ended_up_writing_my_own_kernel - [dmitryfrank.com]
2017-03-13 17:29:56
tags: c compsci concurrency cpu programming systems

A good introduction to what exactly a kernel is. A stack switcher.

source: L

^

Introduction to Video Coding

https://people.xiph.org/~tterribe/pubs/lca2012/auckland/intro_to_video1.pdf - [people.xiph.org]
2017-03-13 17:24:19
tags: compression compsci graphics math pdf slides

It says introduction, but it’s 170 text heavy slides.

source: L

^

OpenBSD vmm/vmd Update

https://www.openbsd.org/papers/asiabsdcon2017-vmm-slides.pdf - [www.openbsd.org]
2017-03-13 17:18:53
tags: openbsd pdf slides update virtualization

Better CPU support, better guest support, better configuration.

source: L

^

A fashionable lamp for our times

http://lcamtuf.coredump.cx/geiger/ - [lcamtuf.coredump.cx]
2017-03-13 05:58:36
tags: hardware life solder

A floor lamp, some LEDs, and a Soviet SBM-20 Geiger-Müller tube walk into a bar...

^

Complexity and Strategy

https://hackernoon.com/complexity-and-strategy-325cd7f59a92 - [hackernoon.com]
2017-03-12 18:48:26
tags: best development essay retro turtles

Great essay about incremental cost of features and essential complexity.

> Unfortunately, Preview view ended up being a gift that kept on giving. The complexity it introduced had nothing to do with any failure in the initial programming of the feature. The challenges were that as we added new functionality, Preview required special consideration

> Features interact — intentionally — and that makes the cost of implementing the N+1 feature closer to N than 1.

source: L

^

Flatland II, curved landscape panoramas

http://kottke.org/17/03/flatland-ii-curved-landscape-panoramas - [kottke.org]
2017-03-12 05:37:17
tags: architecture photos

> Aydın Büyüktaş has continued his Flatland project with more of these photographic panoramas folded over on themselves.

https://www.facebook.com/pg/aydinbuyuktasphotography/photos/?tab=album&album_id=1876524709296325

source: K

^

Window Maker Version 0.95.8 released

http://windowmaker.org/news.php - [windowmaker.org]
2017-03-11 23:37:35
tags: release unix x

Well aged.

source: HN

^

Can Someone Be Tried for Trying to Harm a Mannequin?

https://www.wsj.com/articles/unusual-attempted-murder-charge-in-las-vegas-raises-questions-about-criminal-intent-1489237202 - [www.wsj.com]
2017-03-11 23:27:59
tags: hoipolloi policy

> At the same intersection weeks earlier, two homeless men had been bludgeoned to death by a hammer in back-to-back attacks. To catch the killer, police came up with the idea of using a dummy homeless man as bait.

> Police say the defendant, Shane Allen Schindler, thought he was striking a sleeping man. An arrest report says he concealed his face with a pulled-up hood before swinging the hammer and that he had no way of knowing his victim was a decoy.

> Mr. Schindler told police he wasn’t tricked but knew it was a mannequin underneath the blanket.

^

When Should the Government Disclose "Stockpiled" Vulnerabilities?

http://www.crypto.com/blog/between_immediately_and_never/ - [www.crypto.com]
2017-03-11 15:24:21
tags: essay policy security

> Somewhere between immediately and never.

^

Rust's Type System is Turing-Complete

https://sdleffler.github.io/RustTypeSystemTuringComplete/ - [sdleffler.github.io]
2017-03-11 03:01:00
tags: compiler compsci programming rust turtles type-system

> I constructed a proof in the form of an implementation of Smallfuck – a known Turing-complete language – entirely in the Rust type system. This blog post is an attempt to explain the inner workings of that Smallfuck implementation, as while as what this means for the Rust type system.

source: L

^

The little-known iPhone feature that lets blind people see with their fingers

http://finance.yahoo.com/news/david-pogue-on-iphone-voiceover-163733668.html - [finance.yahoo.com]
2017-03-11 02:37:46
tags: iphone life tech ux

> A few years ago, backstage at a conference, I spotted a blind woman using her phone. The phone was speaking everything her finger touched on the screen, allowing her to tear through her apps. My jaw hit the floor. After years of practice, she had cranked the voice’s speed so high, I couldn’t understand a word it was saying.

source: DF

^

Devirtualization in LLVM and Clang

http://blog.llvm.org/2017/03/devirtualization-in-llvm-and-clang.html - [blog.llvm.org]
2017-03-11 02:28:36
tags: compiler cpp perf programming

> This blogpost will show how C++ devirtualization is performed in current (4.0) clang and LLVM and also ongoing work on -fstrict-vtable-pointers features.

^

A Study of MAC Address Randomization in Mobile Devices and When it Fails

https://arxiv.org/abs/1703.02874v1 - [arxiv.org]
2017-03-10 21:26:35
tags: android hardware iphone networking opsec paper pdf random security wifi

> In this paper, we present the first wide-scale study of MAC address randomization in the wild, including a detailed breakdown of different randomization techniques by operating system, manufacturer, and model of device. We then identify multiple flaws in these implementations which can be exploited to defeat randomization as performed by existing devices.

source: HN

^

page two