background preloader

Passion project

Facebook Twitter

Learn C# for Beginners – Microsoft Virtual Academy. Inside a C# Program. The Basics of C Programming" The C programming language is a popular and widely used programming language for creating computer programs.

The Basics of C Programming"

Programmers around the world embrace C because it gives maximum control and efficiency to the programmer. If you are a programmer, or if you are interested in becoming a programmer, there are a couple of benefits you gain from learning C: You will be able to read and write code for a large number of platforms -- everything from microcontrollers to the most advanced scientific systems can be written in C, and many modern operating systems are written in C.The jump to the object oriented C++ language becomes much easier. How C Programming Works - HowStuffWorks.

The C programming language is incredibly popular, and it's easy to see why.

How C Programming Works - HowStuffWorks

Programming in C is efficient and gives the programmer a great deal of control. Many other programming languages like C++, Java and Python were developed using C. Chances are increasing each day that if you're a programmer, you won't use C exclusively for your work. However, there are several learning C is highly beneficial, even if you don't use it regularly. Here's why: You'll be able to read and write code for software that can be used on many different types of computer platforms, including everything from small microcontrollers to desktop, laptop and mobile operating systems.

You'll better understand what high-level languages are doing behind the scenes, such as memory management and garbage collection. How VPNs Work" As a business grows, it might expand to multiple shops or offices across the country and around the world.

How VPNs Work"

To keep things running efficiently, the people working in those locations need a fast, secure and reliable way to share information across computer networks. In addition, traveling employees like salespeople need an equally secure and reliable way to connect to their business's computer network from remote locations. One popular technology to accomplish these goals is a VPN (virtual private network). A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together.

The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee. VPN was not the first technology to make remote connections. This article describes VPN components, technologies, tunneling and security. How WiFi Works" If you've been in an airport, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network.

How WiFi Works"

Many people also use wireless networking, also called WiFi or 802.11 networking, to connect their computers at home, and some cities are trying to use the technology to provide free or low-cost Internet access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires. Internet Network Example. Here's an example.

Internet Network Example

Imagine that Company A is a large ISP. In each major city, Company A has a POP. The POP in each city is a rack full of modems that the ISP's customers dial into. Company A leases fiber optic lines from the phone company to connect the POPs together (see, for example, this UUNET Data Center Connectivity Map). Imagine that Company B is a corporate ISP. InfoSec - Types of Virus & Malicious Code and Protective Measures. An Introduction to Viruses and Malicious Code, Part One: Overview. You worked late last night, getting the final details together for a contract that could pull your business out of the red and generate plenty of new work.

An Introduction to Viruses and Malicious Code, Part One: Overview

This could be the break that puts you in front of the big guys. Next morning you jump onto the workstation to print the tender so you can make the noon submission deadline, but something is wrong. Your system isn't responding. "Must be another computer lockup", you think as you push the 'reset'. However, the computer doesn't reboot. How Computer Viruses Work - HowStuffWorks. Strange as it may sound, the computer virus is something of an Information Age marvel.

How Computer Viruses Work - HowStuffWorks

On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become. For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained.

Infographic: How to Become a Hacker. Most people jeer at the word "hacker," assuming some angry geek is holed up in his parents' basement, plotting against the government and stealing eHarmony user passwords. The term has earned a bad rap over the years, with the help of groups like Anonymous. But hackers are people, too. People like information security analysts and computer programmers, who make a living out of professionally hacking. And a fairly decent living, according to an infographic from Schools.com , which breaks down the negative connotations and provides a guide on how to become a hacker.

Before you go jumping into the hack-o-sphere, take a moment to consider whether it's the right career path for you. Hacker Tools and Pentesting Tools. Impressive Web Hacking Method. Introduction.

Impressive Web Hacking Method

What is fuzz testing (fuzzing)? - Definition from WhatIs.com. How Hackers Work" The history of Linux: how time has shaped the penguin. As we sit in front of the latest version of Ubuntu, Fedora or SUSE, revelling in the glorious animated desktops, taking pleasure in the ease-of-use the GUI grants and enjoying the fact that most of our hardware works out of the box, do we ever wonder how on Earth our favourite operating system got to this point?

The history of Linux: how time has shaped the penguin

Do we consider and appreciate the amount of time and effort that a long list of developers have taken in reaching this Zen-like state of man and OS? Most likely, not. A quick reminisce of Linux distros long gone made us think about the history of this wonderful OS, and its journey over the last couple of decades. When was it born? How did it evolve? History of Linux, Who Invented Linux, How Was Linux Invented.

Who invented Linux?

History of Linux, Who Invented Linux, How Was Linux Invented

Linux is the first truly free Unix-like operating system. The underlying GNU Project was launched in 1983 by Richard Stallman originally to develop a Unix-compatible operating system called GNU, intended to be entirely free software. Many programs and utilities were contributed by developers around the world, and by 1991 most of the components of the system were ready. An Illustrated History of Mac OS X.

A history of Windows. OS Statistics. What is Operating System (OS)? A Webopedia Definition. Computer Basics: Understanding Operating Systems. What is an operating system? Watch the video (2:13). An operating system is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software and hardware. Why Don't More People Work As Programmers? How to be a Programmer: A Short, Comprehensive, and Personal Summary.