|
You are here |
computer.howstuffworks.com | ||
| | | | |
trendless.tech
|
|
| | | | | [AI summary] The text provides a comprehensive overview of computer networking, covering the OSI model, TCP/IP, LANs, WANs, network management, and carrier power. It explains how data is transmitted through different layers, the role of encryption, and the importance of documentation. The text also discusses cybersecurity, routing protocols, and the balance between government regulation and market competition. | |
| | | | |
solar.lowtechmagazine.com
|
|
| | | | | This is a solar-powered website, which means it sometimes goes offline | |
| | | | |
blog.tmm.cx
|
|
| | | | | [AI summary] A detailed review of the HP ZBook Fury 17.8 G8 as a Linux workstation, covering hardware specifications, performance, Linux support, and user experience. | |
| | | | |
comsecuris.com
|
|
| | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | ||