Design for Testability
What MongoDB got Right
Indices point between elements
Regular Expression Search with Suffix Arrays
New reptyr feature: TTY-stealing
Lightweight Linux Kernel Development with KVM
Tracking down a memory leak in Ruby's EventMachine
Why node.js is cool (it's not about performance)
BlackHat/DEFCON 2011 talk: Breaking out of KVM
Exploiting misuse of Python's "pickle"
reptyr: Changing a process's controlling terminal
reptyr: Attach a running process to a new terminal
Some Android reverse-engineering tools
CVE-2010-4258: Turning denial-of-service into privilege escalation
Some notes on CVE-2010-3081 exploitability
Why scons is cool
Configuring dnsmasq with VMware Workstation
Using Haskell's 'newtype' in C
amd64 and va_arg
A brief look at Linux's security record
Dear Twitter: Stop screwing over your developers.
How is duct tape like the force?
Write yourself an strace in 70 lines of code
Navigating the Linux Kernel
Suggestion time: What should I blog about?
Some musings on ORMs
Implementing a declarative mini-language in the C preprocessor
Check Plus: An EDSL for writing unit tests in C
Lab Notebooking for the Software Engineer
Wordpress tricks: Disabling editing shortcuts
Confessions of a programmer: I hate code review
Using X forwarding with screen by proxying $DISPLAY
Getting carried away with hack value
The Window Manager I Want
Software Engineers should keep lab notebooks
Some thoughts on Quora
Fun with the preprocessor: CONFIG_IA32_EMULATION hacks in Linux
Security doesn't respect abstraction boundaries
Followup to "A Very Subtle Bug"
A Very Subtle Bug