Tweetovi

Blokirali ste korisnika/cu @sunnyc7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sunnyc7

  1. proslijedio/la je Tweet
    5. velj

    Here's my conversation with Jim Keller (), a legendary microprocessor engineer, who has worked at AMD, Apple, Tesla, and now Intel. He makes the argument that Moore's Law is not dead yet and may still live on for a while. Full conversation:

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Very useful tool if you are studying Drivers. Also really enjoyed the book: Windows Kernel Programming

    Poništi
  3. 3. velj

    Today is 02020202 A date palindrome !!

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Our group at MSR now has 3 Dans (, Berger and Crankshaw), so we have enough Dans for a consensus protocol that tolerates at least one Dan failure.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    I always had a hard time finding writeups beacuse they were all over the place in different blog posts, so I made this. If you know of something that is not in there, you are more than welcome to contribute! 🎉

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Tech has disrupted by inventing... handkerchiefs? They’ve discovered handkerchiefs.

    Poništi
  7. proslijedio/la je Tweet
    26. sij
    Poništi
  8. proslijedio/la je Tweet
    25. sij

    Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    Ep 57: MS08-067 With special guest . Hear what goes on internally when Microsoft discovers a major vulnerability within Windows.

    Poništi
  10. proslijedio/la je Tweet
    1. lis 2019.

    Examining access token privileges with Microsoft Defender ATP + Kusto and why this can be interesting from a blue team perspective. @WindowsATP

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    ⏲️ As of today, we have about eighteen years to go until the Y2038 problem occurs. But the Y2038 problem will be giving us headaches long, long before 2038 arrives. I'd like to tell you a story about this.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. sij

    email: "I got ransomware" Gmail suggested response: "I'm so proud of you!" 😆

    Poništi
  14. proslijedio/la je Tweet
    17. sij
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi
  15. proslijedio/la je Tweet
    19. sij

    An inspiring story about a pioneering mathematician spanning and uniting the globe from Iran to the United States. Check out the preview at the bottom!

    Poništi
  16. proslijedio/la je Tweet
    18. sij

    Need something to bootstrap your detection use case lib for ? has got you covered with this treasure trove of a document on common attack techniques 👊

    Poništi
  17. 18. sij
    Poništi
  18. 16. sij

    As always, Matt with the good stuff. This needs more visibility.

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  20. proslijedio/la je Tweet
    12. sij

    So, my thoughts on engineering performance management have always been a bit idiosyncratic, but Matt's tweets today have me reflecting, so... storytime. 1/

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·