-
Here are the todo items for the SC20 Birds of a Feather:
- [x] Update BoF Submission
- [x] Submit BoF Request to the Conference
- [x] Update Call for Submissions
- [x] Send Call for Submissions to…
-
-
Write and proof a call for BoF ideas and suggestions.
-
https://github.com/NVISOsecurity/CVE-2024-26229-BOF hello @icyguider , thanks for your project . Is it possible to add that method of LPE , UAC bypass to Havoc module?
update. Nviso delete bof - here…
-
Researchers usually do not have specific training in Software Engineering Architecture. Lack of experience makes developing software that amenable for takeover, support and collaboration significantly…
-
### Describe the issue
As chair for https://datatracker.ietf.org/wg/diem/about/ that page shows an "Edit Group" button that leads to a page that has an "Additional URLs" form field.
I entered thin…
-
### Describe the issue
Two issues with respect to the BOF requests that are listed on https://datatracker.ietf.org/doc/bof-requests:
- That page does not appear in the menus; it maybe should be un…
-
This was feedback from the Fits BOF at ADASS. Apparently a help desk email was submitted.
-
Hi, Jesse Dyer and I (Lars Alvik) from the University of Melbourne have been working on a signature file for .oma files.
**Format Name:**
- Sony Open MG Audio
**Extension(s):**
- .oma
**M…
-
* How do we find software?
* How do we select software?
* How do you build software that is discoverable and reusable?
* How do we judge quality