I asked a question referencing a mode sometimes referred to as ring -2 (System Management Mode) which can be exploited to create rootkits. There's also even a r
flatten-js
plural
hadoop-lzo
ujs
java-home
should.js
const-correctness
keyerror
jenkins-github-plugin
dense-rank
nucleon
google-json-api
servicestack-routing
yargs
closures
angular-slickgrid
stream-processing
reverse
etimedout
monkeyc
jsprit
meteor-blaze
windows-8.1
leaderboard
bnlearn
genexus-gam
scribe
gridstack
spi
watchkit