31. | | The Worrisome State of the Information Security Industry (zeltser.com) |
|
1 point by r11t on Jan 15, 2011 | past
|
32. | | Did China's economy overtake the U.S. in 2010? (foreignpolicy.com) |
|
1 point by r11t on Jan 14, 2011 | past
|
33. | | 10 Immutable Laws of Security (microsoft.com) |
|
2 points by r11t on Jan 14, 2011 | past
|
34. | | Software Craftsmanship, Beyond The Hype (infoq.com) |
|
1 point by r11t on Jan 14, 2011 | past
|
35. | | Is Lockheed Martin Shadowing You? (cbsnews.com) |
|
3 points by r11t on Jan 13, 2011 | past | 1 comment
|
36. | | Guide to hardening WordPress (codex.wordpress.org) |
|
2 points by r11t on Jan 13, 2011 | past
|
37. | | Flowchart : Should you work for Free? (jhische.com) |
|
151 points by r11t on Jan 13, 2011 | past | 30 comments
|
38. | | How To Secure a Security Product (acrossecurity.com) |
|
1 point by r11t on Jan 12, 2011 | past
|
39. | | Gawker makes a hash of non-ASCII characters in passwords (theregister.co.uk) |
|
2 points by r11t on Jan 12, 2011 | past
|
40. | | BIOS Password Backdoors in Laptops (dogber1.blogspot.com) |
|
3 points by r11t on Jan 11, 2011 | past
|
41. | | Concurrency in Go: A Call Center Tutorial (mprescient.com) |
|
1 point by r11t on Jan 11, 2011 | past
|
42. | | PlayStation 3 hack – how it happened and what it means (guardian.co.uk) |
|
1 point by r11t on Jan 10, 2011 | past
|
43. | | Tricks For Defeating SSL In Practice (blackhat.com) |
|
2 points by r11t on Jan 10, 2011 | past
|
44. | | Invisible IP Addresses (fnsecurity.blogspot.com) |
|
1 point by r11t on Jan 10, 2011 | past
|
45. | | With Autos At CES, Are Vehicle Hacks Far Behind? (threatpost.com) |
|
1 point by r11t on Jan 9, 2011 | past
|
46. | | Vim offers strong file encryption with Blowfish (techrepublic.com.com) |
|
2 points by r11t on Jan 8, 2011 | past
|
47. | | Designs, Lessons and Advice from Building Large Distributed Systems (cornell.edu) |
|
6 points by r11t on Jan 8, 2011 | past
|
48. | | Feds charge two for allegedly exploiting video poker bug (arstechnica.com) |
|
2 points by r11t on Jan 7, 2011 | past | 1 comment
|
49. | | Specifying That a Server Supports TLS (ietf.org) |
|
1 point by r11t on Jan 6, 2011 | past
|
50. | | Infiltrating a Botnet (cisco.com) |
|
2 points by r11t on Jan 6, 2011 | past | 1 comment
|
51. | | Dubai assassins used email trojan to track Hamas victim (theregister.co.uk) |
|
3 points by r11t on Jan 6, 2011 | past
|
52. | | A Vulnerability in My Heart |
|
1 point by r11t on Jan 6, 2011 | past
|
53. | | So You Like Big Data… (thenoisychannel.com) |
|
2 points by r11t on Jan 4, 2011 | past
|
54. | | Rename all jpeg files by their exposure date (Bash) (neverfear.org) |
|
1 point by r11t on Jan 4, 2011 | past
|
55. | | Scalable memory allocation using jemalloc (facebook.com) |
|
125 points by r11t on Jan 3, 2011 | past | 11 comments
|
56. | | Crash Data for Mozilla Firefox (crash-stats.mozilla.com) |
|
3 points by r11t on Jan 3, 2011 | past
|
57. | | Adding ASLR (Address space layout randomization) to Jailbroken iPhones (antid0te.com) |
|
3 points by r11t on Jan 3, 2011 | past
|
58. | | Fast Web Performance Starts with DNS (circleid.com) |
|
4 points by r11t on Jan 3, 2011 | past
|
59. | | Android Reverse Engineering (thomascannon.net) |
|
67 points by r11t on Jan 2, 2011 | past | 11 comments
|
60. | | Preliminary patch for OpenCL support in John The Ripper (openwall.com) |
|
1 point by r11t on Jan 1, 2011 | past
|
|
|
More |