|
You are here |
dygalo.dev | ||
| | | | |
endler.dev
|
|
| | | | | Slow Rust Builds? Here are some tips to speed up your compile times. This list was originally released on my private blog, but I decided to update it for 2024 and move it here. Tabl... | |
| | | | |
blog.dbrgn.ch
|
|
| | | | | How to avoid accidentally breaking no_std compatibility in Rust crates. | |
| | | | |
ashvardanian.com
|
|
| | | | | Experienced devs may want to skip the intro or jump immediately to the conclusions. The backbone of many foundational software systems - from compilers and interpreters to math libraries, operating systems, and database management systems - is often implemented in C and C++. These systems frequently offer Software Development Kits (SDKs) for high-level languages like Python, JavaScript, GoLang, C#, Java, and Rust, enabling broader accessibility. But there is a catch. | |
| | | | |
www.malwaretech.com
|
|
| | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | ||