Posts
-
How and why we index vulnerabilities
-
Parsing semver values from CVE records
-
A minimal samba share with SELinux
-
Stop DOSing yourself
-
The one line that allocated 5 megabytes of memory
-
Exploring x509 by creating a toy PKI
-
Porting test vectors with sed and awk
-
So you need a logging pipeline
-
An odd feature of java's secure random
-
Mutable default arguments
-
How many bytes does it take to make a good hash? Part Two.
-
How many bytes does it take to make a good hash?
-
Looking back at consoles and codecs
subscribe via RSS