other-articles 6
- Setting up EV Code Signing on Google HSM with FIPS 140-2 Level 2 compliance and attestation proof Mar 25, 2023
- Meltdown and Spectre explained: Processor hacking (PL) Mar 26, 2018
- Adjacency list - mapping of coordinates to a single dimensional array Dec 20, 2017
- Analysis of Przelewy24 mobile payment library from the security point of view (PL) Dec 12, 2017
- An algorithm for offline electronic rental door lock Dec 3, 2017
- Playing with Gothic Virtual File System (VDFS) Oct 19, 2017