Can the iPhone 4S replace a "real" digital camera? Ars investigates

Software History
John Regehr's Integers in C
fooneπ³οΈββ§οΈ on Twitter
Monkeypatching is for wimps. Use set_trace_func.
Most vexing parse - Wikipedia
MG on Twitter
There's more to HTML escaping than &, , and " - wonko.com
Excel incorrectly assumes that the year 1900 is a leap year - Microsoft 365 Apps
Removing support for Emacs unexec from Glibc
A Cursed Bug - Made of Bugs
That Dragon Guy on Twitter
What About Monkey Patching? Is it as Dangerous as They Say?
Revisiting the Black Sunday Hack
The Apple GPU and the Impossible Bug
xoreaxeaxeax/sinkhole: Architectural privilege escalation on x86
Cppiceberg
Main is usually a function. So then when is it not?
The GNU C Library - strfry
Hertzbleed Attack
WebTV Anecdotes
@sparrowgrine@chaos.social on Twitter
Lace card - Wikipedia
Tales (anon)
Theories, Solvers and Static Analysis by Abstract Interpretation
Strip
The 8000th Busy Beaver number eludes ZF set theory: new paper by Adam Yedidia and me
What is the '-->' operator in C/C++?
Superoptimizing LLVM
Getting Arbitrary Code Execution from fopen's 2nd Argument
Intrinsic Propensity for Vulnerability in Computers? Arbitrary...