p.file
213 subscribers
51 photos
7 videos
156 files
291 links
Please read the pinned post.

The group has restriction for links due to spam bots, but you can send it anyway.

@perplex_files
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
The line integral over a scalar field f can be thought of as the area under the curve C along a surface z = f(x,y), described by the field.
halderman.pdf
1.8 MB
Topics: Data Remanence, Cold Boot Attack. #hardware #hacking

A study about data remanence in DRAMs and the attacks that are used to retrieve sensitive data using DRAM Remanence.
inference_rules.pdf
149.6 KB
Topics: Propositional Calculus, Inference Rules. #math

Inference Rules and Proof.
bobzien2002.pdf
274.1 KB
Bobzien, S. (2002). The Development of Modus Ponens in Antiquity : From Aristotle to the 2nd Century AD. Phronesis, 47(4), 359–394. doi:10.1163/156852802321016541
appel1977.pdf
4.7 MB
Appel, K., & Haken, W. (1977). Every planar map is four colorable. Part I: Discharging. Illinois Journal of Mathematics, 21(3), 429–490. doi:10.1215/ijm/1256049011
appel1977.pdf
3.7 MB
Appel, K., Haken, W., & Koch, J. (1977). Every planar map is four colorable. Part II: Reducibility. Illinois Journal of Mathematics, 21(3), 491–567. doi:10.1215/ijm/1256049012
Modern Game Console Exploitation.pdf
221.1 KB
Topics: Console Exploitation. #hardware #hacking #exploit

The goal of this paper is to provide a high-level, technical summary of the significant exploitations of the Xbox 360 and PlayStation 3.
👍4
cc3536.pdf
183.3 KB
Topics: Dynamic Programming, Dijkstra's Algorithm. #programming

Dijkstra’s algorithm revisited:
the dynamic programming connexion.
image_2022-05-24_14-24-07.png
231.4 KB
Topics: Computational Complexity Theory. #comp_theory

A diagram of the world of computability and complexity.

Source: here
#learning

Courses in Computer Science and Engineering

https://www.cs.washington.edu/education/courses/
3
S0025-5718-2013-02787-1.pdf
488.1 KB
Topics: Goldbach Conjecture. #math

This paper describes how the even Goldbach conjecture was confirmed to be true for all even numbers not larger than 4 · 10^18.
👍1
2022-06-17_17-05_scrot.png
630.3 KB
#notes #hardware #hacking

(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.

From Hardware Security: A Hands-on Learning Approach.
p.file
The State of the Art in IC Reverse Engineering.pdf
For those who like IC Reverse Engineering, this article is a must-read.
The TTY demystified.pdf
800 KB
Topics: Linux TTY. #linux

Useful information about Linux TTY.

https://www.linusakesson.net/programming/tty/