wiby  
Settings



Ruud on computers

https://home.hccnet.nl/r.helderman/encompu.htm

by the possibilities of programming a computer. A few months later, I got my chance to try it out myself on real computers because of a project we had at school (the Sint Laurens

How To Become A Hacker

http://www.catb.org/%7Eesr/faqs/hacker-howto.html

it used to include programming in machine language, and didn't until recently involve HTML. But right now it pretty clearly includes the following: 1. Learn how to program. This,

The small web is beautiful

https://benhoyt.com/writings/the-small-web-is-beautiful/

there’s an entire programming subculture called the demoscene that cares about this. They have competitions for the smallest 4KB demos: who can pack the most graphical punch into
A vision for the "small web", small software, and small architectures.

The FoxPro History - Interview with Wayne Ratliff

http://www.foxprohistory.org/interview_wayne_ratliff.htm

and insights about programming. Ratliff is a tall westerner who has an air of independence and a comfortable manner. After more than fifteen years in the computer industry, he sti

List of Emacs implementations

https://emacs.org.ntnu.no/implementations.html

familiar[ity] with programming and with Emacs." Lisp fundamentals are presented, with "Lisp Quick Reference." GNU-Emacs binaries GNU-Emacs name: GNU-Emacs last changed/verified: 1

.:: Phrack Magazine ::.

https://phrack.org/issues/49/14

`smash the stack` [C programming] n. On many C implementations it is possible to corrupt the execution stack by writing past the end of an array declared auto in a routine. Code t
Phrack is both a technical journal and a cultural document. Like all zines, it represents a snapshot of the scene at the time.

The Craft of Text Editing

https://www.finseth.com/craft/

an understanding of programming will be helpful. Questions to Probe Your Understanding Each chapter ends with a set of questions and problems designed to probe your understanding

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

a year. Our biological programming and social conditioning thus respond by telling us that it must be okay for us to do so as well. On the other hand, our recently acquired, more

W. Richard Stevens' Home Page

http://www.kohala.com/start/

UNIX Network Programming, Volume 2, Second Edition: Interprocess Communications , Prentice Hall, 1999. UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets

Voyager Spacecraft and Fortran 5

http://www.geonius.com/writing/other/voyager.html

ground system, programming in Fortran 77 on VAX/VMS minicomputers. The mission-control developers on the other half of our cubicle farm at NASA's Goddard Spaceflight Center progra
Voyagers NOT programmed in Fortran 5

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

for data science programming, yet they are notorious for hidden state and irreproducible results. This paper identifies the root cause: data scientists routinely backtrack to earl

A Security Curriculum

https://learnaifromscratch.github.io/theabsolutestateofsoftware.html

operating systems, all programming languages, these things were built to be maximal insecure'. He talks about SELinux also known as MAC or mandatory access controls like AppArmor.


Find more...