background preloader

The Official YAML Web Site

The Official YAML Web Site

Skulpt GHH - The "Google Hack" Honeypot 10 Puzzle Websites to Sharpen Your Programming Skills Solving programming puzzles is a fun way to develop your logical and problem solving abilities. Also, when you’re familiarizing yourself with a new programming language, solving puzzles for that language can help speed up the learning process. Here are the top 10 popular programming puzzle sites that will help test your thinking and improve your programming, problem solving, and logical thinking skills. 1. Programming Praxis is a blog that includes a range of interesting problems with solutions usually available in several different programming languages. 2. CodeKata is a blog of programming puzzles written by Dave Thomas, who’s most famous for the groundbreaking book, Pragmatic Programmer. 3. TopCoder is an active programming community of developers who love to solve puzzles. 4. 5. Facebook has a collection of very challenging programming puzzles that–should you manage to solve them–could result in you getting a job at Facebook! 6. 7. 8. 9. 10. 99 Prolog Problems * Bonus: Mind Cipher

Hidden iframe injection attacks | Structured Randomness [Updated on October 27, 2009 with new a version of the script] It is a shame that after all those posts about security, some of my websites were under attack today. Shoban and Anand emailed me about this today morning (Thanks guys) and I tried to understand what was going on. To my utter disbelief more than 10 websites hosted in the same server were affected by the attack. All the index.* files in the server were infected with a piece of code that loaded a hidden iframe in the page. To the html pages the following piece of code was added: To php pages it added: echo “<iframe src=\” Asha took the effort and cleaned most of the infected files. How did the worm inject the hidden iframes to my files? There are two ways through which the worm is believed to infect your files: 1) Server is compromised This is the most common way. 2) Client side FTP The worm resides in some/any of the client side PCs you use for accessing the ftp/control panel accounts of your hosting server.

Meaningless Progression "One of our desktop applications has a progress bar in it," Bryce N. writes, "and as I was working more and more with the code, I noticed that the progress bar would progress to a seemingly random part in the bar, but never past the halfway mark. This would probably be ignored, if it weren't for the fact that I noticed that my breakpoints would only be hit when the bar reached the 'random' mark." "While I was trying to discover why, I found this in the code:" /* There is really NO eloquent way of calculating what the progress * of a given method/task will be. One task may be downloading or copying a file while another * one might be grabbing huge chunks of data for file creation. "Well, there you have it, the code tells the progress bar to progress somewhere between 0 and 1/5 the length of the bar, then execute the real code.

About OverviewThey Rule aims to provide a glimpse of some of the relationships of the US ruling class. It takes as its focus the boards of some of the most powerful U.S. companies, which share many of the same directors. Some individuals sit on 5, 6 or 7 of the top 1000 companies. It allows users to browse through these interlocking directories and run searches on the boards and companies. A user can save a map of connections complete with their annotations and email links to these maps to others. They Rule is a starting point for research about these powerful individuals and corporations. Context A few companies control much of the economy and oligopolies exert control in nearly every sector of the economy. Karl Marx once called this ruling class a 'band of hostile brothers.' The Data We do not claim that this data is 100% accurate at all times. Credits This site was made by Josh On with the indispensable assistance of LittleSis.org.

7-Segment LED Decoder This circuit inputs a 4-digit binary number and outputs a decimal digit 0 to 9 using a 7-segment LED display. If a number larger than 9 is input, then the display is blank. Thanks to Mateusz Baran for contributing this circuit. Next: SR Flip-Flop Previous: 2-Bit ComparatorIndex java@falstad.comGenerated Wed Apr 9 2014 Research | Population Research Institute PRI sends research teams around the globe, to gather hard data on abuses committed against women and families. This research has been used before Congress and has been, in many cases, instrumental in the passage of pro-life laws and amendments.

Zenmap - Official cross-platform Nmap Security Scanner GUI Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. You can download Zenmap (often packaged with Nmap itself) from the Nmap download page. Here are some Zenmap action shots (click for full res):

Character Flaw Index To make characters realistic and relatable they are given flaws, because if there is anything a writer can be sure of it is that no one in their audience will be perfect. Flaws are character traits that have a negative impact in the narrative, unless they are simply informed. They can also be exploited. See Good Flaws, Bad Flaws for a scale of flaw acceptability. Compare Seven Deadly Sins, Ego Tropes. Abusive Parents: Habitually violent and cruel to their own children, often because that's how they themselves were raised.

Related: