2Writing a Process Monitor with Apple's Endpoint Security Framework (opens in new tab)objective-see.com3n3mes1s6y ago0
3Applying Seccomp Filters at Runtime for Go Binaries (opens in new tab)blog.heroku.com1n3mes1s7y ago0
4The Expendables – Back Ends High Availability at BlaBlaCar (opens in new tab)medium.com1n3mes1s8y ago0
5A Dive into MuddyWater APT Targeting Middle-East – ReaQta (opens in new tab)reaqta.com2n3mes1s8y ago0
7Haptics to Walls in VR by Means of Electrical Muscle Stimulation (opens in new tab)hpi.de1n3mes1s9y ago0
8Beyond Bash: Microsoft Refines the Windows Subsystem for Linux (opens in new tab)thenewstack.io35n3mes1s9y ago7
10SQL Server on Linux: How? Introduction (opens in new tab)blogs.technet.microsoft.com2n3mes1s9y ago0
11Exploring ASP.NET Core with Docker in Both Linux and Windows Containers (opens in new tab)hanselman.com2n3mes1s9y ago0
12Windows network security now easier with osquery (opens in new tab)blog.trailofbits.com2n3mes1s9y ago0
13Hypervisor security ero-Xen: How guest VMs can hijack host servers (opens in new tab)theregister.co.uk2n3mes1s9y ago0
14Hacker Shows Us How to Unlock a Laptop Using an NSA Tool [video] (opens in new tab)motherboard.vice.com14n3mes1s9y ago8
15Cpp-dependencies – Tool to check C++ #include dependencies (opens in new tab)github.com2n3mes1s9y ago0