When working in security we usually worry about the security of our customers and the potential vulnerabilities in their software or their configurations.
Welcome to LWN.net The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN [...]
Amulet, as a programming language, has a focus on strong static typing. This has lead us to adopt many features inspired by dependently-typed languages, [...]
This page provides a high-level summary of changes to SQLite. For more detail, see the Fossil checkin logs at http://www.sqlite.org/src/timeline and [...]
You’re going to love the talks at the Hackaday Superconference this November. The ultimate hardware conference is all about hardware creation. The [...]
Hackaday Editors Tom Nardi and Mike Szczys comb through their favorite hacks from the past week. We loved Donald Papp’s article on considerations [...]
I wrote recently about my son playing Zork on a serial terminal hooked up to a PDP-11, and how I eventually bought a vt420 (ok, some vt420s and vt510s, I [...]
If your only experience with Garmins is from that one rental car a few years back, it may surprise you that some of them, mostly the handheld outdoor [...]
Typically, we associate Vespas with Italians, riding their posh scooters midday under the heat of the Mediterranean sun. In one community, however, the [...]
Lightning strikes are quite high energy events, and release plenty of radio frequency energy when they go off in the atmosphere. This makes them easy to [...]
The Russian researcher Leonid Evdokimov has found that hardware wiretapping equipment used by the Kremlin as part of the SORM surveillance system [...]