Tor to Implement Bug Bounty Program

Another money making opportunity for bug hunters It pays to be a bug hunter. No, not the squishy kind that scurry about (unless you’re an exterminator), but the kind that leave software vulnerable to attack. There are numerous bug bounty programs out there, and soon you’ll be able to add the Tor Project to the…

Read More

Dealing with Memory Leaks

How memory leaks happen, and what to do about them You may have heard the phrase, “You can never be too rich, too thin, or have too much RAM.” RAM is a vital part of a computer system, providing for computer data storage via volatile memory. The current minimum for a new system build is…

Read More