I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
pymunk
duckduckgo
sequence-diagram
sonarqube-4.5
facebook-authorization
audioeffect
clockify
angular2-forms
rhea
server-name
unmanaged-memory
tkmessagebox
ghc-pkg
listeners
syn
grails-orm
language-implementation
levelplot
laravel-eloquentmany
help-viewer
node-vm2
delphiscript
location-href
android-wrap-content
qgraphicspathitem
cryptography
linux-device-driver
github-api-v3
dispatcher
avro