www.google.com

lynx www.google.com

www.aws.org

do you think www.aws.org runs on aws?

www.allure.com/story/best-sex-tip-by-zodiac-sign/amp?amp_gsa=1&amp_js_v=a6&usqp=mq331AQKKAFQArABIIACAw%3D%3D#amp_tf=From%20%251%24s&aoh=16392879347932&referrer=https%3A%2F%2Fwww.google.com&ampshare=https%3A%2F%2Fwww.allure.com%2Fstory%2Fbest-sex-tip-by-zodiac-sign

For those inter st in the finest writing of all time https://www-allure-com.cdn.ampproject.org/v/s/www.allure.com/story/best-sex-tip-by-zodiac-sign/amp?amp_gsa=1&amp_js_v=a6&usqp=mq331AQKKAFQArABIIACAw%3D%3D#amp_tf=From%20%251%24s&aoh=16392879347932&referrer=https%3A%2F%2Fwww.google.com&ampshare=https%3A%2F%2Fwww.allure.com%2Fstory%2Fbest-sex-tip-by-zodiac-sign

How to start JIT-ting

Copyright Fedor Indutny view license - +1 << Home Most developers heard about JIT compilers and how they can make slow interpreted languages run at a speed, comparable to native code. However, not many people understand how exactly this JIT thing works, and even less people could write their own compilers. I think having at least, basic knowledge of compiler internals may greatly improve understanding of the code that is running on that software. In this article, we'll visit some peaks of JIT-island, and probably even implement a compiler ourselves! Knowing some compiler basics, we can assume that every compiler is transforming input in some format (usually, a source code) into the output in another or same format (usually, a machine code). JIT compilers are not an exception. What really makes them exceptional, is the fact that they're running not ahead of time (like gcc, clang an...

Linked on 2014-12-11 00:51:43 | Similar Links
Cracking Cloudflare's heartbleed challenge

Copyright Fedor Indutny view license - +1 << Home At April 11th 2014 Cloudflare has published a blog post suggesting to try out extracting a private key of their specially prepared challenge site using the Heartbleed OpenSSL vulnerability. Being busy at the time, I decided to give it a try a couple of hours later, if noone would crack it yet. This was a legal way to do some hackery, after all! The method of attack was following: Send a lot of random-sized fake heartbeats (without body) Try to find a 128-byte prime factor of the certificate's modulus Generate the rest of the private key's parameters out of it I wasn't searching for a PEM-encoded private key and/or: - - - - - BEGIN RSA PRIVATE KEY - - - - - for a couple of reasons: It is loaded only at the process startup The key may be encrypted, and there is no point in brute forcing it According to my tests, DER-encoded...

Linked on 2014-04-15 21:31:59 | Similar Links