I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
functor
c-treeace
object-design
jakarta-servlet
helix
phone-state-listener
report-viewer2016
mkv
google-experiments
ghc
geowebcache
page-load-time
microservices
amazon-kinesis-agent
actorsystem
ghc-api
optionaldataexception
nmssh
thephpleague
fast-ui
coderunner
jquery-ui
caprover
xhprof
ocfs2
bk-tree
zstack
c++-concepts
openxml-table
angular-pagination