Significant cyber incidents | Strategic technologies program security.cyber Article 8881 words 1 vote
A 2024 plea for lean software security programming languages open source Article 2960 words, published Jan 18 2024 36 votes
For the first time: system roms, data dumps, scans and photographs, and a MAME driver for the little-known Sega AI Article 4329 words 13 votes
The Inside Story of PC Magazine, PC World, and Macworld's Origins, as Told by David Bunnell Article 10 605 words 8 votes
EU Cyber Resilience Act: What does it mean for open source? security.cyber open source Article 3329 words, published Dec 30 2023 13 votes
Forth: The programming language that writes itself programming languages programming.concatenative Article 32 703 words 10 votes
The Early History Of Smalltalk programming languages programming.object oriented Article 23 490 words 7 votes
We spoke with the last person standing in the floppy disk business hardware Article 3484 words, published Sep 12 2022 11 votes
The Great Fiction of AI | The strange world of high-speed semi-automated genre fiction Article published Jul 20 2022 9 votes
Zoom zero-click RCE from Pwn2Own 2021 - Technical write-up describing the process of discovering and exploiting the vulnerability security Article 8193 words, published Aug 23 2021 6 votes
Kaspersky Password Manager had multiple problems in its password-generator, resulting in its passwords being predictable and easily brute-forced security Article 3475 words, published Jul 6 2021 21 votes
The Internet Is Rotting - The glue that holds humanity’s knowledge together is coming undone Article 6493 words 9 votes
An exploration of the types of subclassing and when inheritance is a good choice compared to composition, through the lens of Python programming.object oriented Article 4656 words 4 votes
Attempting to use a software engineering approach to win at chess against my brother—and only my brother Article 3116 words, published May 28 2021 10 votes