wiby  
Settings



SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

describing and teaching programming languages, focusing on one of the “hottest” languages to date: Rust. The work contains multiple aspects, such as analysing common misconception

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Bernstein demands for programming and networking services. This is because Unix has undergone over 30 years of continuous refinement and development, over three decades of collabo
the djb why

Cool Links! – Qalle’s home page

https://qalle.neocities.org/links

Cool Links! Web development Programming and game hacking Games Misc computer stuff (Spoken) languages Webcomics Misc Linking to my site See also Footer Web development Nu Html Che

The Biggest Myths

http://0pointer.de/blog/projects/the-biggest-myths.html

they do not expose a programming language, but are simple and declarative by nature. That all said, if you are experienced in shell, then yes, adopting systemd will take a bit of
Posts and writings by Lennart Poettering

The Code of the Geeks v3.1 Generator

http://www.joereiss.net/geek/geek.html

superseded all other programming languages. I firmly believe that all programs can be reduced to a Perl one-liner. I use Perl to achieve U+++ status. ( ) > P+++ Perl is a very

https://colorforth.github.io/POL.htm

https://colorforth.github.io/POL.htm

DIVISION File Copy PROGRAMMING A PROBLEM-ORIENTED-LANGUAGE Charles H. Moore written ~ June 1970 Contents Introduction Basic Principle Preview Programs without input Choosing a lan

A dive into the world of MS-DOS viruses

https://blog.benjojo.co.uk/post/dive-into-the-world-of-dos-viruses

their first exposure to programming! But sometimes life using DOS was not so great, sometimes you would be using DOS and all of a sudden things like this would happen. This sample

Virus Fighters

http://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm

attempt will fail due a programming error (virus authors never test drive the destructive parts of their code, it seems). And finally, the virus adds the following two lines: And

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

He has over 15 years of programming experience, mainly with embedded systems and networking. Top Presenter: Jaehoon Jeong Company: Samsung Elec. Co., Ltd. Title: Dynamic Instrumen

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

did some open-source programming projects, had a GitHub presence, had a personal web site, and a LinkedIn profile. Establish a professional appearance and writing style; you're no
How to become a bug-bounty hunter and do penetration testing

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

installed at the IBM programming center in Santa Monica, CA. One remote SAGE Combat Center was activated at the former manual at Hamilton AFB using a three-string BUIC-II computer

Nintendo 64 Architecture | A Practical Analysis

https://classic.copetti.org/writings/consoles/nintendo-64/

and tools for microcode programming [39] . An SGI Indy I came across at The Centre for Computing History (Cambridge, UK) when I visited in August 2024. By comparison, this compute
An in-depth analysis that explains how this console works internally


Find more...