- adrianchadd.blogspot.com
- usersknow.blogspot.com
- poetic.io
-
The Mac Facilitates Spying Toozitseng.com
I've been sitting on this information for some time, waiting to get more research done before I publish a post. But since word has come out about how Lenovo preloads what amounts to very bad spyware on their PCs, I thought I should also just go right a... -
CTB-Locker encryption/decryption scheme in detailszairon.wordpress.com
After my last post about CTB-Locker I received a lot of e-mails from people asking for a complete analysis of the malware. Most of them wanted to know if it's possible to restore the compromised fi... - superfish.tlsfun.de
-
The truth about Purism: Why Librem is not the same as libreblogs.coreboot.org
Purism Librem is an interesting project which promises to produce a completely libre laptop, designed to respect the user's privacy and the user's rights. The indivduals behind the project seem so confident as to "promise that a Purism syste... -
Creating PDF Reports with Pandas, Jinja and WeasyPrint - Practical Business Pythonpbpython.com
Using Pandas, Jinja and WeasyPrint to create a PDF report. - fpvtv.co.uk
- apple.com
- lwn.net
-
Linux Profiling at Netflixslideshare.net
Talk for SCaLE13x: Profiling can show what your Linux kernel and appliacations are doing in detail, across all software stack layers. This talk shows how we ar… - trust-in-soft.com
- usersknow.blogspot.com
-
Security Evaluation for ARCsslab.gtisc.gatech.edu
Security issues caused by permission mismatch and inter-"component" interaction in ARC - bldgblog.blogspot.com
- coq-blog.clarus.me
-
Speed up docker pull with local registry image mirroringjacksoncage.se
A blog about sysadmin, devops, autmation, containers and awesomeness! - ojjs.org
- chronicle.com