Four short links: 26 October 2018

Legit DRM Hacking, CPU Emulation, Phish Yourself, and Data Structures

By Nat Torkington
October 26, 2018
  1. Feds Say Hacking DRM to Fix Your Electronics Is LegalThe Librarian of Congress and U.S. Copyright Office just proposed new rules that will give consumers and independent repair experts wide latitude to legally hack embedded software on their devices in order to repair or maintain them. This exemption to copyright law will apply to smartphones, tractors, cars, smart home appliances, and many other devices. (via BoingBoing)
  2. Unicorn Enginea lightweight multi-platform, multi-architecture CPU emulator framework.
  3. Learn faster. Dig deeper. See farther.

    Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

    Learn more
  4. Gophishan open source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily set up and execute phishing engagements and security awareness training.
  5. The Periodic Table of Data StructuresWe show that it is possible to argue about the design space of data structures. By discovering the first principles of the design of data structures and putting them in a universal model, we study their combinations and their impact on performance. We show that it is possible to accelerate research and decision-making concerning data structure design, hardware, and workload by being able to quickly compute the performance impact of a vast number of designs; several orders of magnitude more designs than what has been published during the last six decades.
Post topics: Four Short Links
Share: