Fantastic read - it does sadden me a little though, as I can't help but wonder how much better it would be if these extrodinary hackers and engineers could instead divert their talents towards...
Fantastic read - it does sadden me a little though, as I can't help but wonder how much better it would be if these extrodinary hackers and engineers could instead divert their talents towards LLVM or the Linux kernel - to pull two projects from the air.
I've only read the summary of this and I feel like "abusing" vulnerabilities in Windows is way different than working on a project such as LLVM or Linux (I know you probably choose these...
I've only read the summary of this and I feel like "abusing" vulnerabilities in Windows is way different than working on a project such as LLVM or Linux (I know you probably choose these randomly).
I don't think their talents would translate very well to working in such an environment, but maybe I'm wrong.
This is a fair response - but I would say that given the size and scope of Linux and LLVM, that both probably encompass some engineering challenges that would appeal to the system cracker...
This is a fair response - but I would say that given the size and scope of Linux and LLVM, that both probably encompass some engineering challenges that would appeal to the system cracker mentality. If not them, then other projects might be a better fit - the Dolphin emulator, for example.
This is a somewhat scary reminder that no computer security is absolute. Everything sits on a continuum of difficulty to compromise. One can never protect one's system completely. One can only...
This is a somewhat scary reminder that no computer security is absolute. Everything sits on a continuum of difficulty to compromise.
One can never protect one's system completely. One can only make sure that onees system is difficult enough to compromise that it is not worth the reward for an attacker.
This is a really fun overview of Stuxnet. I've read about it many times over the years, but this was really concise and pretty delightful to read.
I love the Ocean's 11-style playback of good data so that you can't even tell something is going wrong with the motors. Simple but genius.
Fantastic read - it does sadden me a little though, as I can't help but wonder how much better it would be if these extrodinary hackers and engineers could instead divert their talents towards LLVM or the Linux kernel - to pull two projects from the air.
I've only read the summary of this and I feel like "abusing" vulnerabilities in Windows is way different than working on a project such as LLVM or Linux (I know you probably choose these randomly).
I don't think their talents would translate very well to working in such an environment, but maybe I'm wrong.
This is a fair response - but I would say that given the size and scope of Linux and LLVM, that both probably encompass some engineering challenges that would appeal to the system cracker mentality. If not them, then other projects might be a better fit - the Dolphin emulator, for example.
This is a somewhat scary reminder that no computer security is absolute. Everything sits on a continuum of difficulty to compromise.
One can never protect one's system completely. One can only make sure that onees system is difficult enough to compromise that it is not worth the reward for an attacker.
Now I want the code just to figure out how it works.