2Writing a Process Monitor with Apple's Endpoint Security Framework (opens in new tab)(objective-see.com)3n3mes1s6y ago0
3Applying Seccomp Filters at Runtime for Go Binaries (opens in new tab)(blog.heroku.com)1n3mes1s7y ago0
4The Expendables – Back Ends High Availability at BlaBlaCar (opens in new tab)(medium.com)1n3mes1s8y ago0
5A Dive into MuddyWater APT Targeting Middle-East – ReaQta (opens in new tab)(reaqta.com)2n3mes1s8y ago0
7Haptics to Walls in VR by Means of Electrical Muscle Stimulation (opens in new tab)(hpi.de)1n3mes1s8y ago0
8Beyond Bash: Microsoft Refines the Windows Subsystem for Linux (opens in new tab)(thenewstack.io)35n3mes1s9y ago7
10SQL Server on Linux: How? Introduction (opens in new tab)(blogs.technet.microsoft.com)2n3mes1s9y ago0
11Exploring ASP.NET Core with Docker in Both Linux and Windows Containers (opens in new tab)(hanselman.com)2n3mes1s9y ago0
12Windows network security now easier with osquery (opens in new tab)(blog.trailofbits.com)2n3mes1s9y ago0
13Hypervisor security ero-Xen: How guest VMs can hijack host servers (opens in new tab)(theregister.co.uk)2n3mes1s9y ago0
14Hacker Shows Us How to Unlock a Laptop Using an NSA Tool [video] (opens in new tab)(motherboard.vice.com)14n3mes1s9y ago8
15Cpp-dependencies – Tool to check C++ #include dependencies (opens in new tab)(github.com)2n3mes1s9y ago0