asteroza + memory   402

Memory management "more effective" on Windows than Linux? (in preventing total system lockup) : linux
Registering alt sysreq F seems to work as a bypass, if you remember that key combo...
linux  full  memory  OOM  bug  bypass  sysadmin  tips  tricks 
june 2019 by asteroza
cmu-db/peloton: The Self-Driving Database Management System
Exploring concepts in self-optimizing cluster databases, but now dead
automatic  management  self  optimizing  distributed  hybrid  memory  database  tuning 
june 2019 by asteroza
Room-temperature Operation of Low-voltage, Non-volatile, Compound-semiconductor Memory Cells | Scientific Reports
Allegedly "universal memory", using quantum mechanics theories, that could replace both DRAM and flash NAND memory?
NVRAM  universal  memory  computing  hardware  electronics  logic  materials  science  research  technology 
june 2019 by asteroza
rowhammer is back with a vengence...
DRAM  RAM  ECC  memory  attack  exploit  rowhammer  security  hacking  pentesting 
june 2019 by asteroza
Dumping WDigest Creds with Meterpreter Mimikatz/Kiwi in Windows 8.1 - TrustedSec
WDigest dumps credentials in memory in plaintext. Registry key is normally off, but enabling is easy without reboot, and can use taskmanager to pull memory, so avoids importing mimikatz or similar which can trigger alarms.
plaintext  credential  recory  memory  windows  security  hacking  pentesting  tips  tricks 
april 2019 by asteroza
Saarbrücken research team uses artificial muscles to develop an air conditioner for the future | Universität des Saarlandes
Using nitinol shape memory alloys as the thermal medium/matrix in a thermal wheel rotary air heat exchanger, where the wheel itself is the HVAC system!
rotary  heat  exchanger  thermal  wheel  air  entropy  nitinol  shape  memory  alloy  metal  conditioner  heater  HVAC  mechanical  materials  science  research  technology  cooling  heating 
march 2019 by asteroza
Power generator using cycling waste heat hot water/cooling water to drive a shape memory alloy wire actuator piston, which drives a hydraulic transmission and power generator. Made a discovery for high cycle ninitol alloy (10 million versus 1 million cycles for regular NT wire) to make the linear actuator work for industrial applications. Uses direct impingement of hot water and cold water to cycle the actuator though...
nitinol  shape  memory  metal  alloy  materials  science  research  technology  wasteheat  power  generator  linear  actuator  piston  hydraulic  transmission  drive  scavenging  harvesting  high  cycle  fatigue  resistance 
march 2019 by asteroza
alternative to berkleyDB/SQLite, memory mapped single file DB
LMDB  database  memory  mapped  single  file 
january 2019 by asteroza
Brain’s Positioning System Linked to Memory | Quanta Magazine
Evolution reusing things, so animal navigation being used for higher brain functions perhaps...
brain  biology  memory  navigation  mapping  positioning  learning  education  research 
december 2018 by asteroza
Intel to Support 128GB of DDR4 on Core 9th Gen Desktop Processors
WTF, double height DDR4? Considering most desktop motherboards have the RAM crosswise to airflow, it will become a cooling air blocker!
double  height  DDR4  RAM  memory  UDIMM  hardware  electronics  devices 
october 2018 by asteroza
Sans Forgetica
Making a font harder to read just enough to make the brain pay more attention enough to make it remember the information better.
font  typography  psychology  brain  memory  learning 
october 2018 by asteroza
A multicaloric cooling cycle that exploits thermal hysteresis | Nature Materials
Uses a ring of shape memory alloy, and magnets plus compression rollers to enable a 6 stage cooling system.
shape  memory  metal  alloy  giant  magnetocaloric  refridgeration  cooling  materials  science  research  technology  permanent  magnet 
september 2018 by asteroza
The Register on Twitter: ""Spectre? Psst. Who cares. You need local code execution." *record skip*… "
NetSpectre is a thing now, but slow as hell and needs a very stable network to pull off (15 bits per hour right now...)
spectre  remote  network  memory  read  security  hacking  pentesting  research 
july 2018 by asteroza
New C# Ransomware Compiles itself at Runtime
Dropping locally compiled assembly directly into memory is a nice trick
ransomware  security  hacking  pentesting  C#  memory  compile 
may 2018 by asteroza
matonis/page_brute: Page File analysis tools.
Interesting tool to brute force run YARA rules on a windows page file for forensic artifacts that might not be present elsewhere
memory  forensic  analysis  windows  page  paging  file  YARA  python  security  hacking  pentesting  software  DFIR 
may 2018 by asteroza
Security | DMA | Hacking: Total Meltdown?
So we heard you've got meltdown, so we put meltdown in your meltdown...
PCILeech  DMA  windows  7  meltdown  exploit  privileged  memory  access  security  hacking  pentesting 
april 2018 by asteroza
peewpw/Invoke-BSOD: For when you want a computer to be done - without admin!
adminless forcing a BSOD, ostensibly to get a memory dump of cleartext passwords
powershell  BSOD  memory  dump  security  hacking  pentesting 
april 2018 by asteroza
Demartek Evaluation: HPE 25GbE RDMA Benefits in Virtualized Environments
Wow, so SMB3 when available, shifts into Direct mode, which is effectively a distributed shared memory platform (SMB3DFX)
SMBv3  SMB-Direct  SMB  direct  RDMA  distributed  shared  memory  platform 
march 2018 by asteroza
Interesting deployable antenna reflector using a shape memory polymer for the reflector ribs (so sorta looks like a clam shell), and an active focus subreflector to correct and beam steer.
newspace  deployable  antenna  reflector  space  cubesat  collapsible  folding  shape  memory  polymer 
march 2018 by asteroza
Oh, stuffing RISC cores onto RAM DIMM's for in-situ processing of data in memory (I guess for limited scales of offload)
RISC  RAM  DIMM  memory  compute  hardware  electronics  devices 
december 2017 by asteroza
Superelastic Tire
But don't most shape memory alloys (nickel titanium based) have a critical temperature where they change memory?
NASA  shape  memory  alloy  chainmail  compliant  flexible  metal  nickel  titanium  tire  wheel  space  technology  automotive  research 
november 2017 by asteroza
ademakov/MainMemory: Wannabe Main Memory Database and More
similar to redis event library, but multithreaded/fibered, as an alternative to libev/libuv. Right now, a skeleton multithreaded framework that does minimal memcache interface though, but the skeleton seems complete
multithreaded  fiber  event  library  memory  database  opensource  software  memcached 
july 2017 by asteroza
yahoo/mdbm: MDBM a very fast memory-mapped key/value store.
Larry McVoy claims the version before yahoo fiddled with it was faster, and is in Bitkeeper?
MDBM  memory  mapped  key  value  store  noSQL  database  Delicious 
may 2017 by asteroza
Halo Neuroscience
Allegedly the same tech being tested at DARPA made CCTV monitoring effective for 20 hours, when normal concentration gave out at 20 minutes...
neuropriming  human  cognitive  augmentation  muscle  memory  sports  enhancement  tDCS  cranial  stimulation  Delicious 
april 2017 by asteroza
AnC - VUSec
Busting ASLR on 22 architectures with javascript is not only a stunt hack, but a biting criticism of using randomization as a protection layer when you are already executing unknown code...
ASLR  javascript  attack  memory  security  hacking  pentesting  Delicious 
february 2017 by asteroza
« earlier      
per page:    204080120160

related tags

1GB  2.0  2.5  2.5in  2.5inch  2.6  2GB  2k3  2nd  2TB  2X  3.0  3D  3DSEQ  4DS  4GB  5GB  16GB  32GB  64GB  64MB  128GB  160GB  256MB  512MB  802.11  1394b  ability  accelerator  accelerometer  access  accessory  AccessStick  account  ACID  actuator  adapter  addon  adhoc  adiabatic  ADO.NET  Adtron  aerodynamics  aerospace  Aerospike  agent  AI  aid  air  airWRX  Aizu  Aizuwakamatsu  ajax  Aladdin  AlchemyDB  algorithm  algorithms  allocation  allocator  alloy  Alluxio  alternative  AMD  amnesia  analog  analysis  analytics  analyzer  anecdote  Angelbird  annealing  antenna  antivirus  ANTS  apache  API  app  apple  appliance  application  applications  apps  AppWeb  Apricorn  arbitrary  archeology  architecture  archival  archive  archiving  array  arrow  art  artificial  ASLR  ASP.NET  assembly  assistance  assistant  associative  ATA  atomic_ops  attached  attack  audio  auditing  augmentation  augmented  authentication  automated  automatic  automation  automotive  autorun  auxiliary  aviation  aware  Azure  badge  bankruptcy  BartPE  based  battery  beacon  BEOL  BERI  bigdata  binary  BioCOS  biology  biometric  biometrics  biomimetic  biomimicry  bistatic  bitcoin  Bitmicro  blackdog  block  blocker  blocking  BlockMaster  blog  Blu-ray  bluetooth  board  bookmark  boost  boot  bootable  bracelet  brain  brainEKP  brainstorming  break  breakpoint  bridge  broken  broker  browser  BSD  bsdtar  BSOD  BTC  buffer  bug  building  bus  business  bypass  c  C#  C#.NET  c++  cable  cache  caching  CAD  CAG  calculator  calendar  camera  camoflage  camoflaged  capture  card  carrier  case  CBL  CD  CD-ROM  ceedo  cell  Cellebrite  cellphone  CF  chain  chainmail  chalmers  change  channel  cheatsheet  check  checker  checking  CHERI  chip  chrome  circuit  citrix  client  cloud  cluster  CMOx  code  cognitive  collaboration  collapsible  collection  column  combo  compactor  compatible  compile  compliant  composite  compression  compute  computer  computing  concealed  concept  concrete  concurrency  conditioner  configuration  connection  connector  consortium  construction  contact  continuous  control  conversion  converter  cool  coolant  cooling  copper  copy  correlation  Corsair  cortex  covert  CoW  CPU  cracking  cranial  credential  credit  cross-point  crypto  cryptocurrency  cryptography  cryptomneme  cryptomnemo  CSQL  CSR  CTL  cube  cubesat  cufflinks  current  cyber  CyberSnipa  cyborg  Cybozu  cycle  data  database  dataset  DAX  DBMS  DC  DCPMM  DDR  DDR4  dealer  debian  debug  debugging  decryption  Delicious  demo  dendrite  density  deployable  deploying  deployment  deposition  design  desktop  detection  determination  development  device  devices  DFIR  digital  DIMM  direct  disk  display  disposable  distributed  DIY  DLL  DMA  document  documentation  dogtag  dongle  double  downgrade  download  DRAM  drive  driven  driver  drives  droplet  dual  dump  dumper  durable  DVD  dynamic  e-ink  eBoostr  ECC  EDC  EDR  education  EeePC  eelctronics  effect  EIDE  elastic  elastocaloric  elastomer  Elecom  electronics  electroshock  email  embedded  EmbedDisk  EMC  emergency  emulator  EnCase  Encryptakey  encrypted  encryption  encypted  endpoint  energy  enforcement  engine  engineering  enhancement  Ennova  enterprise  enthalpy  entropy  environment  EPAFactory  erlang  escalation  escape  ESXi  ETL  eToken  EU  europe  event  EverNote  Evernote  evidence  exchanger  execution  exfiltration  exploit  ExpressCard  extended  extension  external  extraction  extractor  EZTC  F-18  fabbing  face  factor  fake  fashion  FASL  fatigue  FDD  FeRAM  ferroelectric  ferrous  FETRAM  fiber  fibre  field  filament  file  FIleMap  filesystem  filetype:pdf  FileVault  film  fin  fingerprint  firefox  FireStarter  fireware  firewire  firmware  flash  flashboot  flashlight  FlashPath  FlashPhone  flexibility  flexible  flipper  floppy  fluid  foam  focus  fold  folding  font  footprint  force  Foremay  forensic  forensics  forging  form  forms  FPGA  framework  free  freeware  ftp  Fujitsu  fukushima  full  fusion-io  FusionIO  fuzzer  FXS  gadget  game  gargoyle  gene  generator  genetics  giant  gift  glasses  goggles  google  government  GPL  GPS  graph  graphene  graphic  graphical  green  grid  group  gRPC  gtd  GUI  guide  H2  h2sharp  h2test  hack  hacking  hacks  hadoop  hard  harddrive  hardened  hardening  hardware  harvesting  hash  HBGary  header  healing  health  heap  heat  heater  heating  height  heliotrope  helmet  hibernation  hidden  high  history  Hitachi  HMC  HMD  hoard  holder  HomerSimpsonGene  homing  hook  housing  howto  HP  HSDL  http  hub  huge  human  humor  HVAC  hybrid  hydraulic  HyDrive  HyPer  Hyper-V  HyPerDB  hypersound  i.Link  IBM  IC  ICA  ID  IDE  idea  ideas  identity  IEEE  IIgs  IKVM  IKVM.NET  image  imaging  Imation  imposter  in-memory  in-place  inception  inch  infection  infiniband  infinite  Infinitec  inforgs  information  injection  inlet  inmemory  InnoDIsk  input  install  institutional  instructions  intecept  integrated  integrity  intel  intelligence  interception  interface  investigation  IO  IOcell  IOdata  ioDrive  IoDrive  IOPS  iOS  ioXtreme  IP  iPad  iPhone  iPod  IPSEC  iron  IronKey  iShadow2Go  ISO  itube  IUM  jack  japan  java  javascript  JDBC  JFFS2  JVM  K9  Kanguru  kernel  key  keychain  keycode  keypad  keyword  knowledge  Knuth  lab  Labs  LaCie  large  latency  law  layer  LDAP  LE  learning  LED  legal  length  lexar  LG  libarchive  library  life  lifehacker  lifehacks  Lifelapse  lifelogger  light  lightcycle  limit  limiter  linear  linux  lion  liquid  list  literacy  live  lIveCD  liveCD  LiveCD  LiveDVD  livejournal  LMDB  location  locator  lock  locks  log  logger  logging  logic  logical  login  logon  LOK-IT  loop  loss  lost  low  Lua  M-systems  mac  machine  MacLockPick  maganese  magicJack  magnet  magnetic  magnetocaloric  magnetorheological  main  malicious  malloc  malware  managed  management  manager  manganese  manufactuer  manufacturer  manufacturing  many  map  mapped  mapping  Margi  material  materials  materialsm  MBR  McGrew  MDBM  mechaism  mechanical  media  media:document  mediation  medical  medicine  meltdown  memcached  memcapacitor  memex  meminductor  memory  memristor  MemSQL  menumeters  message  messaging  metal  metallurgy  metalurgy  meth  methamphetamine  Micron  microsoft  military  millipede  mind  mindjet  mindmanager  mindmap  mindmapping  minging  MIT  MitM  MLC  MMC  MMC+  MMU  MobiKEY  mobile  modular  module  MonetDB  monitor  monitoring  Monstor  motherboard  motion  motor  mounted  movie  MQ  MRAM  MS  msramdump  mSystems  mtmalloc  mtron  mTrust  multiboot  multicard  multiple  multithreaded  multithreading  multitool  muscle  mvirtual  mylifebits  MySQL  NAN  NAND  nanomuscle  nanotechnology  nanotube  Nantero  NAS  NASA  navigation  NEC  neckstrap  net  Netflix  network  networking  networks  neuron  neuropriming  neuroscience  newspace  newton  NFC  NG-Flash  nickel  nitinol  non-volatile  nonpaged  nonvolatile  NOR  Nortel  NOSQL  NoSQL  noSQL  note  notes  notetaking  novelty  NRAM  NROM  NSA  nueron  NUMA  Numonyx  NV-DIMM  NVDIMM  NVDIMM-N  NVMe  NVRAM  NX  obfuscation  object  Octal  OCZ  ODBC  Office-on-a-Stick  OHCI  OLAP  OLED  OLTP  onboard  once  OneNAND  online  OOM  openfirmware  openGL  opensourcce  opensource  openSSH  OpenSSL  optane  optical  optimization  optimizing  organization  organizational  organizer  origami  OS  osx  output  overwrite  pack  package  Padlock  PAE  page  paged  pages  pagetable  paging  panel  Panorama  paradigm  partition  partitioning  pass  passive  passmemory  passthru  Passware  password  passwords  patient  payment  PC  PCI  pcie  pciexpress  PCILeech  PCM  PCMCIA  PCMO  pen  pentesting  performance  permanent  persistent  personal  personalbrain  Perst  phase  phone  phonon  phononic  photo  photography  photonic  PHP  physical  PICe  picture  PIM  PIN  pipe  piston  PKI  plaintext  plasma  plastic  platform  plugin  PMEM  PMM  pointing  police  policy  polycrystalline  polymer  pool  port  portable  portal  positioning  power  powered  powershell  PQI  prank  prefrontal  presentation  Presenter-To-Go  prestressed  prevent  prevention  print  printed  printing  privacy  privilege  privileged  problem  process  ProcessExplorer  processing  processor  productivity  profile  profiler  programming  proof-of-concept  propulsion  protect  protection  protocol  prototype  provability  proxcard  proxy  psychology  pthread  pthreads  pubsub  PVD  python  Quad  r2  R3  radar  RAID  rails  RAM  ramdisk  ramp  range  ransomware  raper  RDBMS  RDMA  RDP  read  reader  readyboost  real  realtime  rebar  recall  recongition  recorder  recording  records  recory  recover  recovery  RedCannon  redirector  redis  reference  reflective  reflector  refridgeration  register  registry  release  RememberMe  reminder  remote  removable  repair  repetition  repository  repurpose  reQall  ReRAM  research  resistance  resource  Responder  retractable  retrieval  reverse  RevoDrive  RFID  RFS  RGS14  RISC  RJ-11  roaming  robotics  Rohm  Rohos  Room  root  rooting  rootkit  RoR  rotary  rotating  Route1  rowhammer  RPC  RRAM  RSA  RSSMA  rubber  ruby  rugged  runtime  rust  safe  Safeboot  SafeEnd  safety  same  Samsung  SAN  SandForce  SanDisk  SanDIsk  Sandisk  sandman  SAS  Sastik  SATA  SATADIMM  scala  scalability  scalaris  scanner  scavenging  schedule  scienc  science  scifi  SCM  scraper  screen  script  SD  SDHX  SDXC  seal  search  second  secops  secret  SecuLiCa  secure  SecurID  security  segmenetation  segment  segmentation  self  semiconductor  sensor  server  service  session  set  settings  setup  shape  shared  sharing  shell  shock  shop  silicon  simultaneous  singapore  single  SIP  SIW  size  sized  Skype  sleep  slot  Slovenia  SMA  small  SMART  smartcard  smartgrid  smarthome  SmartMedia  SMB  SMB-Direct  SMBv3  SMP  SMS  smtp  smuggling  snail  snapshot  social  soft  softcore  softphone  software  solar  solaris  solid  SolidAccess  solution  sotrage  space  Spansion  spectre  speed  sports  spring  spying  sql  ssd  SSH  SSL  sslsnoop  stack  standard  standards  standby  StartKey  startup  state  STEC  stick  sticker  sticky  stiffness  stimulation  STL  STM  storage  store  stream  stroage  structure  STXXL  substitute  sudden  suite  supercoiled  superelastic  supersonic  supplement  support  supporting  suspend  suspension  swap  switch  SXM  synapse  Synaptic  sync  syntactic  sysadmin  sysinternals  syslinux  system  tab  table  tachyon  tape  TC703  tDCS  technique  technology  telephone  telephony  temperature  template  tension  terraform  test  tester  testing  textile  thebrain  theft  thermal  thermoelastic  thin  thought  THP  through  thunderbolt  TiddlyWiki  tips  tire  titanium  TLS  todo  token  tools  topicscape  topological  torque  TPIE  tracker  tracking  training  transactional  Transcend  transcranial  transhuman  transistor  transistorless  transmission  transparent  tricks  Troika  tron  trusted  TrustFlash  tuning  turbolinux  tutorial  twitter  type  typography  U.2  U3  ubiquitous  ubuntu  UC-Key  UD-RW  UDIMM  UDRW  UFED  UI  Ultra  unity  universal  unprotected  unzip  usage  usb  USB-IF  use  user  username  utilities  value  vapor  variable  Varnish  vault  VDI  vector  Veriflex  Verilyte  Veritex  VHS  video  viking  Violin  virtual  virtualization  virus  viscoelastic  vista  visual  visualization  vlog  vlogging  VMware  VNC  voice  Voicelok  VoIP  volatility  VoltDB  VPN  vSphere  vulnerability  wafer  wallet  Walletex  wasteheat  waterproof  wax  wearable  web  webdev  webserver  webservusb  wheel  wifi  wiki  win32  windows  wing  Wings  winlockpwn  wireless  wizpy  working  WORM  wrapper  wristband  write  WSP  x4  x86  XP  YARA  Z-Drive  zaptag  zero  zero-standby-dissipation  zip  ZRAM 

Copy this bookmark: