Type, "/@say/Your message here." after the end of the URL and hit enter to leave a comment. If you want to mirror the entire server contact me first; it'll save you time.

Index of /library/Computing/

File NameFile SizeDate
Parent directory/--
2014 Internet Peering Playbook.epub 8M21-Oct-2016 19:08
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu 2M25-Oct-2011 22:59
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf 6M24-Jun-2015 09:51
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf 100K24-Oct-2011 01:35
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf 3M25-May-2016 15:40
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giu..> 771K15-Feb-2017 16:27
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Ni..> 1M13-Sep-2013 11:49
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagava..> 4M02-Nov-2016 19:10
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snoden_ 2016.pdf 8M08-Sep-2016 08:41
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf 695K05-Sep-2015 05:53
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf 477K17-Jul-2015 22:31
Beginning PDL_ Xavier Calbet_ 2001.pdf 422K25-Oct-2011 02:23
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf 18M10-Feb-2016 17:39
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf 180K27-Sep-2011 10:24
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf 682K05-May-2012 13:03
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David L..> 523K22-Sep-2015 16:56
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society ..> 2M27-Feb-2012 12:07
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST..> 1M14-Sep-2016 12:07
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf 15M22-Sep-2016 21:34
DNS & BIND Cookbook_ Cricket Liu.chm 576K15-Aug-2011 07:01
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf 595K04-Nov-2013 03:21
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ s..> 547K28-May-2016 08:25
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astrono..> 6M08-Jun-2015 22:41
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1..> 3M12-Aug-2016 16:35
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian ..> 2M14-Jul-2011 05:56
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf 500K22-Mar-2013 08:05
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf 4M09-Nov-2016 06:58
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf 750K03-Dec-2015 00:34
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey ..> 2M27-Jun-2016 23:24
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf 204K09-Aug-2011 17:06
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf 2M13-Mar-2016 03:44
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Da..> 828K24-Dec-2014 00:12
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf 217K21-Mar-2017 02:25
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf 4M14-Jul-2011 05:50
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf 16M19-Jan-2014 19:04
Higher-Order Perl_ Mark Jason Dominus.epub 2M06-Jan-2013 06:53
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf 2M14-Jul-2011 05:48
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Este..> 239K18-Oct-2015 04:08
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Gree..> 1M15-Oct-2015 03:47
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf 10M27-Nov-2013 06:44
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf 204K04-Jun-2017 18:25
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf 1M11-Nov-2016 10:03
Introduction to Scilab_ 2010.pdf 1M25-Oct-2011 02:38
Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf 627K17-Oct-2017 04:09
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf 1M25-Aug-2016 04:18
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017..> 2M27-Feb-2017 15:13
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf 1M21-Sep-2013 20:30
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf 359K02-Jan-2012 01:59
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A..> 3M05-Nov-2014 23:13
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm 717K15-Aug-2011 07:14
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu 955K25-Oct-2011 22:59
Modern Perl_ Chromatic_ 2010.pdf 2M14-Jul-2011 05:42
Modern Perl_ Chromatic_ 2012.pdf 1M29-Feb-2012 02:35
Modern Perl_ Chromatic_ 2014.pdf 791K06-Nov-2015 14:23
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf 3M25-Nov-2013 18:18
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf 104K19-Mar-2012 02:25
P ?= NP_ Scott Aaronson_ 2016.pdf 6606-Jan-2017 13:00
P might equal NP_ Scott Aaronson_ 2016.pdf 928K05-Jan-2017 13:05
PCI.Local.Bus.Specification.Revision.3.0.pdf 3M28-Jul-2011 12:56
PCI_22.pdf 4M28-Jul-2011 12:57
PDL Book_ 2012-02-05.pdf 8M06-Feb-2012 15:34
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf 188K25-Oct-2011 02:25
PDL_ Scientific Programming in Perl_ 2001.pdf 2M25-Oct-2011 02:25
Perl & LWP_ Sean M Burke_ 2002.chm 657K15-Aug-2011 07:18
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm 2M14-Jul-2011 06:02
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf 410K15-Jun-2014 06:35
Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf 983K16-Oct-2017 00:38
Principles of Uncertainty.pdf 3M24-May-2011 10:56
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu 2M15-Nov-2011 16:05
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf 3M20-Jul-2013 00:27
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf 8M18-Dec-2013 19:16
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf 666K22-Nov-2015 18:53
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf 2M01-Sep-2017 09:13
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2..> 6M04-Jul-2014 05:29
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf 489K01-Sep-2016 01:22
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html 338K16-Aug-2011 05:13
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan ..> 1M03-Nov-2013 08:33
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout..> 3M25-Aug-2011 04:06
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov..> 2M30-Mar-2017 01:39
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf 433K14-Sep-2013 16:50
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf 685K14-Aug-2013 02:43
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf 246K25-Feb-2016 13:21
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 201..> 1M22-Jul-2016 09:51
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 5M25-Oct-2011 22:53
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 7M25-Oct-2011 22:52
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu 7M25-Oct-2011 22:55
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf 6M23-Jun-2016 05:24
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf 783K19-Dec-2012 02:44
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf 171K03-Feb-2016 01:42
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf 375K30-Dec-2016 10:06
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf 20M07-Mar-2017 15:37
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf 1017K06-Sep-2016 13:46
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M ..> 2M28-Sep-2012 23:32
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu 3M19-Jan-2014 18:57
Understanding the bin, sbin, usr_bin , usr_sbin split.html 691728-Jan-2012 08:42
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf 1M01-Mar-2011 00:20
Vi for nano users_ Markus Schnalke.pdf 756105-Mar-2013 18:25
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronaki..> 345K15-Sep-2013 10:08
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf 124K19-Dec-2013 14:03
nooshare cryptocurrency_ overview_ 2012.pdf 307K19-Feb-2012 03:58
pci21.pdf 3M28-Jul-2011 12:56
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf 610K27-Sep-2013 18:53

documents added in the last 7 days

7 days, 31 days
generated at 13:00:28, Thu Nov 23, 2017 UTC
Terms of Use:

You may not access or use the site superkuh.com if you are not over 90 years of age. If you do not agree then you must leave now.

The US Dept. of Justice has determined that violating a website's terms of service is a felony under CFAA 1030(a)2(c). Absurd, isn't it?