wiby  
Settings



That time I wrote malware and got caught | nicole@web

https://ntietz.com/blog/that-time-i-wrote-malware/

junior year, I was in a programming class, and we used .NET languages (VB.NET and C#) in our classes. Since we were using Visual Studio, we had access to a fun drag-and-drop build

Fully Automated Luxury Space Age Package Maintenance | bret.io

https://bret.io/projects/package-automation/

up. If you are new to programming or learning git , its helpful to understand you are learning a tool used to automate the process by which you can cooperatively work on code with
A running log of announcements, projects and accomplishments.

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

personally involved in programming for dynamic and database-backed Web sites as far back as 1993, and I was good at explaining stuff in plain language. Though sympathetic to their

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

for data science programming, yet they are notorious for hidden state and irreproducible results. This paper identifies the root cause: data scientists routinely backtrack to earl

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

operating systems, all programming languages, these things were built to be maximal insecure'. He talks about SELinux also known as MAC or mandatory access controls like AppArmor.

Retrocomputing with Clash

http://unsafeperform.io/retroclash/

become the functional programming language of choice for many developers due to its excellent tools for abstraction and principled program design. The open source Clash hardware d
Haskell for FPGA Hardware Design: Use abstractions like monads and lenses to implement 1970's retro-computing devices like arcade machines and home computers.

What to do with an old computer?

http://toastytech.com/about/vintagecomputing.html

software sets, such as programming languages often sell in the vicinity of $100. "Fluff" software - the sort of thing that came free with a computer, but no one actually used - wi

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

did some open-source programming projects, had a GitHub presence, had a personal web site, and a LinkedIn profile. Establish a professional appearance and writing style; you're no
How to become a bug-bounty hunter and do penetration testing

Nintendo 64 Architecture | A Practical Analysis

https://classic.copetti.org/writings/consoles/nintendo-64/

and tools for microcode programming [39] . An SGI Indy I came across at The Centre for Computing History (Cambridge, UK) when I visited in August 2024. By comparison, this compute
An in-depth analysis that explains how this console works internally

Documents, Links & Videos

https://www.ed-thelen.org/comp-hist/merged.html

A Brief History of Microprogramming , Mark Smotherman, Last updated: October 2012 ( local copy ) - corrective comment from Ignacio Menendez Computers available in era A SYMPOSIUM

John Regehr's Home Page

https://users.cs.utah.edu/~regehr/

such as high-level programming languages make it easier to express our intent, and then we can offload to software tools the problem of making programs run quickly. The software t

Racket Mode

https://www.racket-mode.com/

use ¶ Racket is a programming language. Racket is also a “language-oriented programming language”. Most Racket source files contain a ‘#lang‘ line. Th
Racket Mode


Find more...