Educate yourself about the new processor security flaw and the impact it will have:
Project Zero: Reading privileged memory with a side-channel
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
spectreattack.com
Project Zero: Reading privileged memory with a side-channel
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
spectreattack.com
Blogspot
Reading privileged memory with a side-channel
Posted by Jann Horn, Project Zero We have discovered that CPU data cache timing can be abused to efficiently leak information out of mi...
Forwarded from Vivian's dev rants.
YouTube
Parser and Lexer — How to Create a Compiler part 1/5 — Converting text into an Abstract Syntax Tree
In this tool-assisted education video I create a parser in C++ for a B-like programming language using GNU Bison. For the lexicographical analysis, a lexer is generated using re2c.
This is part of a multi-episode series. In the next video, we will focus…
This is part of a multi-episode series. In the next video, we will focus…
A nice trip into the past:
https://randomascii.wordpress.com/2018/01/07/finding-a-cpu-design-bug-in-the-xbox-360/
https://randomascii.wordpress.com/2018/01/07/finding-a-cpu-design-bug-in-the-xbox-360/
Random ASCII - tech blog of Bruce Dawson
Finding a CPU Design Bug in the Xbox 360
The recent reveal of Meltdown and Spectre reminded me of the time I found a related design bug in the Xbox 360 CPU – a newly added instruction whose mere existence was dangerous. Back in 2005 I was…
How to build your own naive cryptocurrency implementation:
https://lhartikk.github.io/
https://lhartikk.github.io/
lhartikk.github.io
Naivecoin: a tutorial for building a cryptocurrency
Build your blockchain: A tutorial where a blockchain and a cryptocurrency are created from scratch using Typescript.
The Art of Programming is part of the Silicon Network (@siliconnetwork), a network of tech and programming channels and groups.
To view all of our channels and groups, visit https://telegram.me/siliconnetwork
To view all of our channels and groups, visit https://telegram.me/siliconnetwork
Torvalds on the Intelpocalypse:
https://lkml.org/lkml/2018/1/21/192
https://lkml.org/lkml/2018/1/21/192
Something you might not know - from Python 3.6 onwards, dictionary keys stay in the order they were inserted:
https://stackoverflow.com/questions/39980323/are-dictionaries-ordered-in-python-3-6
https://stackoverflow.com/questions/39980323/are-dictionaries-ordered-in-python-3-6
Stack Overflow
Are dictionaries ordered in Python 3.6+?
Dictionaries are insertion ordered as of Python 3.6. It is described as a CPython implementation detail rather than a language feature. The documentation states:
dict() now uses a “compact”
dict() now uses a “compact”
A series of 5-10 minute peeks into Java internals:
https://shipilev.net/jvm-anatomy-park/
https://shipilev.net/jvm-anatomy-park/
How to force named parameters in Python functions
https://stackoverflow.com/questions/2965271/forced-naming-of-parameters-in-python
https://stackoverflow.com/questions/2965271/forced-naming-of-parameters-in-python
Stack Overflow
How can we force naming of parameters when calling a function?
In Python you may have a function definition:
def info(obj, spacing=10, collapse=1)
which could be called in any of the following ways:
info(odbchelper)
info(odbchelper, 12) ...
def info(obj, spacing=10, collapse=1)
which could be called in any of the following ways:
info(odbchelper)
info(odbchelper, 12) ...
Python f-strings are cool, but how do they work?
https://hackernoon.com/a-closer-look-at-how-python-f-strings-work-f197736b3bdb
https://hackernoon.com/a-closer-look-at-how-python-f-strings-work-f197736b3bdb
Hackernoon
A Closer Look At How Python f-strings Work | HackerNoon
<a href="https://www.python.org/dev/peps/pep-0498/" target="_blank">PEP 498</a> introduced a new string formatting mechanism known as <strong>Literal String Interpolation</strong> or more commonly as <strong>F-strings (because of the leading f character preceding…
An introduction to capabilities (the security ones), a detailed essay aimed at total beginners:
http://habitatchronicles.com/2017/05/what-are-capabilities/
http://habitatchronicles.com/2017/05/what-are-capabilities/