Resources for “The Compiler as Attack Vector”

Original Writings by Ken Thompson: www.acm.org/classics/sep95

Blackhat Briefings Speech from Which This Article Is Derived: “Trust no one, not even yourself OR the weak link might be your build tools”: www.blackhat.com/html/bh-media-archives/bh-archives-2004.html#USA-2004

______________________

Geek Guide
The DevOps Toolbox

Tools and Technologies for Scale and Reliability
by Linux Journal Editor Bill Childers

Get your free copy today

Sponsored by IBM

Webcast
8 Signs You're Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
On Demand
Moderated by Linux Journal Contributor Mike Diehl

Sign up and watch now

Sponsored by Skybot