Source: https://habr.com/ru/post/23931/More articles:User account manipulation - implementation templatesHow not to calculate the matrix exponentExploit source code for “unrecoverable” vulnerability in USB devices published on GitHubFestival 404: first impressionsLTE: Where are my 100 Mbit / s?Linux internal device or how Linux worksRequest to extend the free version of SaaS is a bad signThree Nicholas, or how I came up with the service for EycharovWindows 95 on Samsung Gear Live smartwatchAnother review of the private collection of vintage computingAll Articles