Solar Designer

@solardiz

founder. RTs don't imply agreement with points of view.

Unit: agost de 2012

Tuits

Has blocat @solardiz

Estàs segur que vols veure aquests tuits? Això no desblocarà @solardiz.

  1. ha retuitat
    fa 12 hores
    En resposta a i

    Length-extension forgeries were already a thing in 1992 (called padding attacks)

  2. ha retuitat
    19 maig

    The "linux-insides" book is helpful and easy to read. Kudos to :

  3. ha retuitat
    30 maig

    an unnecessary blog post refuting Daniel Bernstein's "Death of Optimizing Compilers"

  4. ha retuitat
    31 maig

    submit your best papers to ROOTS, deadline Aug 5, is the program chair, am happy to be in the PC

  5. ha retuitat
    30 maig

    Almost the same parsing code works with Quake models (using different .ksy: ), the infamous `ogre.mdl`.

  6. ha retuitat
    30 maig

    More 3D models visualized using (kudos to mnakamura1337). This zebra model is parsed from a .3ds file, including texture map.

  7. ha retuitat
    30 maig

    local root exploit via sudo and a 7-digit-CVE, which I find somewhat puzzling and wonder if it's a typo

  8. ha retuitat
    25 maig

    There is an undocumented opcode in the MsMpEng x86 emulator that can access internal emulator commands ¯\_(ツ)_/¯

  9. ha retuitat
    27 maig

    Have AMD processors and interested in hypervisors? Learn how to program AMD-V including Nested Page Tables with:

  10. ha retuitat
    28 maig

    Reminder: most UK mobile carriers' tethering blocks can be beat by changing connected devices' TTL: sudo sysctl net.ipv4.ip_default_ttl=65

  11. ha retuitat
    26 maig

    Dirty COW and why lying is bad even if you are the Linux kernel

  12. ha retuitat
    26 maig

    Happy to announce that , and I decided to launch our own set of hardware security trainings

  13. ha retuitat
    24 maig
  14. ha retuitat
    24 maig

    infosec followers: a CVE was assigned for ASICBOOST. Do you see it as vuln/attack or optimization?

  15. ha retuitat
    24 maig
  16. 24 maig

    "Antivirus" is passe, "endpoint protection" is hot, but still no mention of products' attack surface 's turn?

  17. 21 maig
  18. ha retuitat
    12 maig
  19. ha retuitat
    17 abr.

    Where did the XXX=FIXME convention come from? I went digging through lots of 40-50 year old source code to find out:

  20. ha retuitat
    18 maig

    Just got a $14,000 bounty for an 18 byte file. $778 per byte. Not bad :) I'll celebrate that file's density by sending it along to charity.

Sembla que triga molt a carregar-se.

És possible que el Twitter hagi assolit el límit de capacitat o que experimenti una sobrecàrrega momentània. Torna-ho a provar o vés a l'estat del Twitter si en vols obtenir més informació.

    També et pot interessar

    ·