1979,1989,1999,2009都发生了什么?
source link: https://www.huxiu.com/article/279626.html?h_s=h5
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Recommend
-
26
With 2019 a day away, let’s reflect on the past to see how we can improve. Yes, let’s take a long look back 30 years and reflect on the original fuzzing paper,
-
9
Metasploit plugin based on CVE-2009-197922-Jan-2010: Metasploit plugin based on CVE-2009-1979 Joshua J. Drake wrote metasploit plugin based on CVE-2009-1979 vulnerability discovered by me.
-
8
More information about CVE-2009-1979 (CPUoct2009)15-Jan-2010: More information about CVE-2009-1979 (CPUoct2009) For those who want to research more about CVE-2009-1979 (
-
9
CVE-2009-1979 PoC (CPUoct2009)30-Oct-2009: CVE-2009-1979 PoC (CPUoct2009) This vulnerability was ranked 10.0 (for Windows) in CPUoct20...
-
15
Casio AI-1000 Pocket Lisp Computer from 19894,774 views•May 3, 2021 This video is about...
-
2
1989 年的 CD 机 - SONY Discman D-9 2019-11-09 我应该是为数不多仍然在听 CD 的年轻一代。对于我来说,购买 CD 首先是支持自己喜欢的音乐和艺人最直接的方式,即使售卖 CD 已经不再是做音乐主要的...
-
2
ACM 国家集训队论文集(1999-2009) 腾讯微云下载(密码:m9xwtc) 陈宏:《数据结构的选择与算法效率——从IOI...
-
1
1989 Networking: OS/2 NetWare Requester 1.1 When I wrote about the pre-release NetWare Requester for OS/2, the oldest a...
-
1
Categories Work Life Working in the software industry, circa 1989 Gather round...
-
13
Golden Axe (remake) Golden Axe game implemented in java using only standard libraries (java 2D, AWT, Swing & Java Sound API), so no external libraries required. Win64 Executable / Runnable jar / Source code - v0.0.2 (java 17+)
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK