The Purely Functional Software Deployment Model (2006) [pdf] (nixos.org) 1 pts| 5 years ago | discuss
Intro to Reverse Engineering by solving MalwareTech VM using cutter (daringjoker.wordpress.com) 2 pts| 6 years ago | discuss
Justice Department investigating if traders used tether to bid up Bitcoin prices (cnbc.com) 3 pts| 7 years ago | discuss