6 private links
Use cave cod, also a good point about not modifying entry point at the end of the article
How to on neural network
Some useful commands
Here a sample command to do text to speech
echo "Hello" | festival --tts
A blog describing a lot of vulnerability !
Hey! Socket programming got you down? Is this stuff just a little too difficult to figure out from the man pages? You want to do cool Internet programming, but you don't have time to wade through a gob of structs trying to figure out if you have to call bind() before you connect(), etc., etc.
Well, guess what! I've already done this nasty business, and I'm dying to share the information with everyone! You've come to the right place. This document should give the average competent C programmer the edge s/he needs to get a grip on this networking noise.
And check it out: I've finally caught up with the future (just in the nick of time, too!) and have updated the Guide for IPv6! Enjoy!
gcov is a test coverage program. Use it in concert with GCC to analyze your programs to help create more efficient, faster running code and to discover untested parts of your program. You can use gcov as a profiling tool to help discover where your optimization efforts will best affect your code. You can also use gcov along with the other profiling tool, gprof, to assess which parts of your code use the greatest amount of computing time.
Software developers using Windows have a fantastic process explorer, made by Mark Russinovich. Linux lacks such a process explorer tool. This projects aims (in the end) to be an equivalent process explorer for Linux.
Goal is to have the same functionality of the Windows process explorer under linux, or less if linux limits us.
This text is about the dangers of man-in-the-middle attacks on browsers, especially in the scenario of open or rogue wifi networks. The scenario I'm assuming here is something like this:
You are travelling.
You have your notebook/smartphone/... with you.
You don't have an internet connection.
There is an open wifi that you could use.
You just want to check the news.
Maybe you also want to check your webmail or so (over SSL, of course)
Your browser and the plugins in it are fully patched and there's nobody who would attack you with an 0day and has one.
Your browser executes Javascript (by default). (Some of the attacks are possible without that, but the really scary stuff isn't.)
Given this scenario, what could go wrong?
I will show that an attacker could probably effectively gain code execution access to your machine in the long term.
Anhow to getting started in mining {l,b}itecoins.
Consider two people on the same open WLAN: Bob and Eve. Eve wants to get Bob to visit a malicious webpage she created so that she can install malware onto Bob’s computer via a drive-by download, or perhaps show a spoofed website to try and steal Bob’s credentials.
netem provides Network Emulation functionality for testing protocols by emulating the properties of wide area networks. The current version emulates variable delay, loss, duplication and re-ordering.
which can be useful for connection with lots of jitter
Some example:
http://stackoverflow.com/a/615757/2838914