Ruud on computershttps://home.hccnet.nl/r.helderman/encompu.htm
by the possibilities of programming a computer. A few months later, I got my chance to try it out myself on real computers because of a project we had at school (the Sint Laurens
How To Become A Hackerhttp://www.catb.org/%7Eesr/faqs/hacker-howto.html
it used to include programming in machine language, and didn't until recently involve HTML. But right now it pretty clearly includes the following: 1. Learn how to program. This,
The small web is beautifulhttps://benhoyt.com/writings/the-small-web-is-beautiful/
there’s an entire programming subculture called the demoscene that cares about this. They have competitions for the smallest 4KB demos: who can pack the most graphical punch into
A vision for the "small web", small software, and small architectures.
The FoxPro History - Interview with Wayne Ratliffhttp://www.foxprohistory.org/interview_wayne_ratliff.htm
and insights about programming. Ratliff is a tall westerner who has an air of independence and a comfortable manner. After more than fifteen years in the computer industry, he sti
List of Emacs implementationshttps://emacs.org.ntnu.no/implementations.html
familiar[ity] with programming and with Emacs." Lisp fundamentals are presented, with "Lisp Quick Reference." GNU-Emacs binaries GNU-Emacs name: GNU-Emacs last changed/verified: 1
.:: Phrack Magazine ::.https://phrack.org/issues/49/14
`smash the stack` [C programming] n. On many C implementations it is possible to corrupt the execution stack by writing past the end of an array declared auto in a routine. Code t
Phrack is both a technical journal and a cultural document. Like all zines, it represents a snapshot of the scene at the time.
The Craft of Text Editinghttps://www.finseth.com/craft/
an understanding of programming will be helpful. Questions to Probe Your Understanding Each chapter ends with a set of questions and problems designed to probe your understanding
Ian! D. Allen - Personal Home Pagehttp://www.idallen.com/
a year. Our biological programming and social conditioning thus respond by telling us that it must be okay for us to do so as well. On the other hand, our recently acquired, more
W. Richard Stevens' Home Pagehttp://www.kohala.com/start/
UNIX Network Programming, Volume 2, Second Edition: Interprocess Communications , Prentice Hall, 1999. UNIX Network Programming, Volume 1, Second Edition: Networking APIs: Sockets
Voyager Spacecraft and Fortran 5http://www.geonius.com/writing/other/voyager.html
ground system, programming in Fortran 77 on VAX/VMS minicomputers. The mission-control developers on the other half of our cubicle farm at NASA's Goddard Spaceflight Center progra
Voyagers NOT programmed in Fortran 5
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
for data science programming, yet they are notorious for hidden state and irreproducible results. This paper identifies the root cause: data scientists routinely backtrack to earl
A Security Curriculumhttps://learnaifromscratch.github.io/theabsolutestateofsoftware.html
operating systems, all programming languages, these things were built to be maximal insecure'. He talks about SELinux also known as MAC or mandatory access controls like AppArmor.
Find more...