A list of videos, papers, and articles I find interesting. The links are ordered in the sequence I come across them, with the top entries of a category being more recent. If a link is dead, there should be a backup of it on the Wayback Machine or possibly Archive.today.
Last updated: 2024-09-11
Table of Contents:
Architecture and Buildings
Artists:
Automobiles
Chemistry
Computer Science and Software:
- Big List of Naughty Strings: https://github.com/minimaxir/big-list-of-naughty-strings
- Killed by Google: https://killedbygoogle.com
- The Secret History of Windows Bluescreens by Davepl (2021): https://www.youtube.com/watch?v=KgqJJECQQH0
- The Secret History of Windows Task Manager: Part 1 - Retired Microsoft Engineer Davepl (2020): https://www.youtube.com/watch?v=f8VBOiPV-_M
- How NOT to Measure Latency - Gil Tene, Strange Loops 2015: https://www.youtube.com/watch?v=lJ8ydIuPFeU
- The Bits Between the Bits: How We Get to main() - Matt Godbolt, CppCon 2018: https://www.youtube.com/watch?v=dOfucXtyEsU
- What Else Has My Compiler Done For Me Lately? - Matt Godbolt, C++Now 2018: https://www.youtube.com/watch?v=nAbCKa0FzjQ
- What Has My Compiler Done for Me Lately? Unbolting the Compiler’s Lid - Matt Godbolt, CppCon 2017: https://www.youtube.com/watch?v=bSkpMdDe4g4
- When a Microsecond Is an Eternity: High Performance Trading Systems in C++ - Carl Cook, CppCon 2017: https://www.youtube.com/watch?v=NH1Tta7purM
- Performance Matters - Emery Berger, Stange Loops 2019: https://www.youtube.com/watch?v=r-TLSBdHe1A
- SAM (Software Automatic Mouth): https://github.com/s-macke/SAM
- Famous laws of Software development: https://www.timsommer.be/famous-laws-of-software-development/
- An introduction to vectorization: https://blog.cr.yp.to/20190430-vectorize.html
- 0x5f3759df: http://h14s.p5r.org/2012/09/0x5f3759df.html
- Fast inverse square root: https://en.wikipedia.org/wiki/Fast_inverse_square_root
- Markdown Cheatsheet: https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet
- x86-64 Instruction Usage among C/C++ Applications (2019): https://aakshintala.com/papers/instrpop-systor19.pdf
- What Every Programmer Should Know About Memory (2007): https://people.freebsd.org/~lstewart/articles/cpumemory.pdf
Vintage Computer Science and Software
- Discovering Dennis Ritchie’s Lost Dissertation - David C. Brock (2020): https://computerhistory.org/blog/discovering-dennis-ritchies-lost-dissertation/
- Uptime 15,364 days - The Computers of Voyager - Aaron Cummings, Strange Loops 2019: https://www.youtube.com/watch?v=H62hZJVqs2o
- AT&T Archives: Microelectronics Video Disc Exhibit (1984): https://www.youtube.com/watch?v=aRTJqnXr8tM
- AT&T Archives: Processing Integrated Circuits at Bell Labs (1979): https://www.youtube.com/watch?v=uLReXtpNlbw
- AT&T Archives: The UNIX System: Making Computers More Productive (1982): https://www.youtube.com/watch?v=tc4ROCJYbm0
- AT&T Archives: The UNIX System: Making Computers Easier to Use (1982): https://www.youtube.com/watch?v=XvDZLjaCJuw
- FLATLINE: How The Amiga Languished - Stuart Brown (2018): https://www.youtube.com/watch?v=zB_UZsJUbwQ
- Pictures of Bell Labs (1969 - 1970): http://www.larryluckham.com/1969%20&%2070%20-%20Bell%20Labs/album/index.html
- Pictures inside Bell Labs, Oakland, CA; taken by an employee some time between 1969 and 1970.
Computer Security and Reverse Engineering
- DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor (2022): https://www.youtube.com/watch?v=01oeaBb85Xc
- Semiconductor Security Awareness, Today and Yesterday - Christopher Tarnovsky, Black Hat USA 2010: https://www.youtube.com/watch?v=WXX00tRKOlw
- Tales from Hardware Security Research - Johannes and Marc, CCC 2019: https://www.youtube.com/watch?v=WqAHCpe8Oxw
- Lightening fast CTF solving - Automatic Exploit Generation & Side Channel Analysis - Christoper Roberts, BSides DC 2018: https://www.youtube.com/watch?v=-4goiRPcxl4
- Cache Side Channels: State of the Art and Research Opportunities - Yinqian Zhang, ACM CCS 2017: https://www.youtube.com/watch?v=fLEjSU1a748
- Exploiting modern microarchitectures Meltdown, Spectre, and other hardware attacks - Jon Masters, FOSDEM 2018: https://www.youtube.com/watch?v=2kCDPCgjlJ4
- Reverse engineering FPGAs - MathiasL, 34C3 2017: https://www.youtube.com/watch?v=Y1Wwa8csFjk
- Breaking the x86 Instruction Set - Christopher Domas, Black Hat USA 2017: https://www.youtube.com/watch?v=KrksBdWcZgQ
- A better zip bomb: https://www.bamsoftware.com/hacks/zipbomb/
- A Quick Survey on Anti-Anti-Viruses: https://bananamafia.dev/post/crypt0r/
- project:rosenbridge: hardware backdoors in x86 CPUs: https://github.com/xoreaxeaxeax/rosenbridge
- s a n d s i f t e r: the x86 processor fuzzer: https://github.com/xoreaxeaxeax/sandsifter
- Fun with self-decryption: https://x64dbg.com/blog/2018/02/25/fun-with-self-decryption.html
- Demovfuscator: A work-in-progress deobfuscator for movfuscated binaries: https://github.com/kirschju/demovfuscator
- M/o/Vfuscator: The single instruction C compiler: https://github.com/xoreaxeaxeax/movfuscator
- FUZZIFICATION: Anti-Fuzzing Techniques (2019): https://www.usenix.org/system/files/sec19fall_jung_prepub.pdf
- FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution (2018): https://foreshadowattack.eu/foreshadow.pdf
- Fallout: Reading Kernel Writes From User Space (2019): https://arxiv.org/pdf/1905.12701.pdf
- Dowsing for overflows: A guided fuzzer to find buffer boundary violations (2013): https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_haller.pdf
- RAMBleed: Reading Bits in Memory Without Accessing Them (2019): https://rambleed.com/docs/20190603-rambleed-web.pdf
- FlatFlash: Exploiting the Byte-Accessibility of SSDs within A Unified Memory-Storage Hierarchy (2019): https://jianh.web.engr.illinois.edu/papers/flatflash.pdf
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors (2014): http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf
- Spectre Attacks: Exploiting Speculative Execution (2018): https://spectreattack.com/spectre.pdf
- Meltdown: Reading Kernel Memory from User Space (2018): https://meltdownattack.com/meltdown.pdf
Economics, Finance, and Business
Electrical Engineering and Electronics
Heavy Industry
History
Journalism
Mathematics
Movies
Nuclear
Oceans, Ships, and Boats
Space
Trains
Video Games