|
You are here |
antithesis.com | ||
| | | | |
jbytecode.github.io
|
|
| | | | | ||
| | | | |
blog.thalheim.io
|
|
| | | | | No such file or directory: How I stopped worrying and started loving binaries on NixOS. In this article, I will discuss the technical issue of running pre-compiled executables on NixOS, and how we can improve the user experience by making these binaries work seamlessly using nix-ld. One of the key benefits of NixOS is its focus on purity and reproducibility. The operating system is designed to ensure that the system configuration and installed software are always in a known and predictable state. | |
| | | | |
matklad.github.io
|
|
| | | | | I've learned a thing I wish I didn't know. As a revenge, I am going to write it down so that you, my dear reader, also learn about this. You probably want to skip this post unless you are interested and somewhat experienced in all of Rust, NixOS, and dynamic linking. | |
| | | | |
www.productive-cpp.com
|
|
| | | In the first part of this series we discussed the mechanics of an exploit, the general concept of hardening, and the stack protector hardening technique in particular. Some of the concepts explained there will be | ||