Resources for “The Compiler as Attack Vector”

Original Writings by Ken Thompson:

Blackhat Briefings Speech from Which This Article Is Derived: “Trust no one, not even yourself OR the weak link might be your build tools”:


Geek Guide
The DevOps Toolbox

Tools and Technologies for Scale and Reliability
by Linux Journal Editor Bill Childers

Get your free copy today

Sponsored by IBM

8 Signs You're Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
On Demand
Moderated by Linux Journal Contributor Mike Diehl

Sign up and watch now

Sponsored by Skybot