Skip to main content

Search

Items tagged with: c


Started to migrate from #c to #rust another of my tools #rek2_endpoint https://git.sr.ht/~rek2/rek2_endpoint This tool is designed to scan for common endpoints in RESTful services and Swagger applications. It's particularly useful in penetration testing and CTF (Capture the Flag) scenarios, allowing users to probe web applications for known paths and potential vulnerabilities. https://hispagatos.space/@rek2/111455555859929476

Started to migrate from #c to #rust another of my tools #rek2_endpoint https://git.sr.ht/~rek2/rek2_endpoint This tool is designed to scan for common endpoints in RESTful services and Swagger applications. It's particularly useful in penetration testing and CTF (Capture the Flag) scenarios, allowing users to probe web applications for known paths and potential vulnerabilities.


Started to migrate from #c to #rust another of my tools #rek2_endpoint https://git.sr.ht/~rek2/rek2_endpoint This tool is designed to scan for common endpoints in RESTful services and Swagger applications. It's particularly useful in penetration testing and CTF (Capture the Flag) scenarios, allowing users to probe web applications for known paths and potential vulnerabilities.


52 years ago on November 3, 1971, Unix saw its first edition released.

Initially a single-tasking system, the system was dubbed "Unics" "Uniplexed Information and Computing Service" or "eunuchs." Unix's influence grew as it made its way to other institutions, such as universities.

Continuous enhancements led to increased portability, with ports to various machines like the Interdata 8/32

#TechHistory #Unix #C

Version 5 Unix for the PDP-11, running in the SIMH PDP-11 simulator. Browsing "/usr/sys", where we can see source code and two directories for separating C source code being written by Dennis Ritchie ("dmr") and Ken Thompson ("ken").
Unix Version 0 on the PDP-7 at LCM+L


so #comp.lang.c has been under attack for 2-3 days, I wonder who will want to attack an active #c #programming #newsgroup ... #java I am looking at you? 😁 😁



If you've a background in #C and #Perl and have thought about contributing to the Perl core, you know it's daunting hacking on the core of a language.

@leonerd is offering to help you learn.

https://www.nntp.perl.org/group/perl.perl5.porters/2023/09/msg267112.html

Also, he's written a tutorial on how to contribute a core feature: https://leonerds-code.blogspot.com/2021/02/writing-perl-core-feature.html


Cómo imprimir PDFs en C# con PDFtoPrinter .NET #programación #c https://www.luisllamas.es/csharp-pdftoprinter/


Científico de la computación 👨🏻‍💻

Co-diseñador de los sistemas #Multics y #Unix

Desarrollador del lenguaje de programación #C

Galardonado con el Premio Turing por la teoría de sistemas operativos genéricos y su implementación en #Unix

Dennis Ritchie nació un día como hoy #9Sep


Dennis MacAlistair Ritchie (September 9, 1941 – c. October 12, 2011) was an American computer scientist.[3] He is most well known for creating the #C programming language and, with long-time colleague Ken Thompson, the #Unix operating system and B# programming language. #DennisRitchie #Linux
Dennis MacAlistair Ritchie (September 9, 1941 – c. October 12, 2011)


On September 9, 1941, 82 years ago, Dennis Ritchie, the brilliant mind behind the C programming language and a key developer of UNIX was born.

C, which he wrote the book for it with Brian Kernighan, became the source for countless software applications and operating systems. UNIX, developed alongside Ken Thompson, laid the groundwork for modern computing.

Despite his passing on October 12, 2011, at the age of 70, Ritchie's legacy lives on

#Tech #TechHistory #Unix #C

Ken Thompson and Dennis Ritchie at PDP-11/20 in the 1970s.

Ken Thompson is seated while Dennis Ritchie stands next to him.

Image source: Wikipedia


Me parece que la forma más rápida e interesante de empezar, y no perder potenciales seguidores de este #curso, es mediante un ejemplo. Veamos nuestro primer #programa #C++. Esto nos ayudará a establecer unas bases que resultarán muy útiles para los siguientes ejemplos que irán apareciendo.
https://conclase.net/c/curso/cap1


Mergesort For Linked Lists

Mergesort takes the input list and treats it as a collection of small sorted lists. It makes log N passes along the list, and in each pass it combines each adjacent pair of small sorted lists into one larger sorted list. When a pass only needs to do this once, the whole output list must be sorted.


https://www.chiark.greenend.org.uk/~sgtatham/algorithms/listsort.html

#c #programming


PREVIEW: SINS OF THE SALTON SEA #3
The story of what drove ex-criminal Wyatt into retirement — a heist that went pear-shaped, resulting in his family’s death — comes into focus as the ex-con finds himself on the run from a deadly cult called the Sons of the Salton Sea. Intent on recapturing Silver, a young boy with a mysterious connection to the cult,...
https://www.comiccrusaders.com/preview-sins-of-the-salton-sea-3/
#awa #Ed Brisson #C.P. Smith #comics #comic books #sins of the salton sea


#reverseengineering Lesson 117: ARM-32 Project (Part 3 – Hacking Float) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 109: ARM-32 Course 2 (Part 44 – Pre-Decrement Operator) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


Content warning: SAY MY NAME AMAZON SAY MY NAME

#c


#reverseengineering Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator) #assembler #c #cyber #cybersecurity #hack #hacking https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 71: ARM-32 Course 2 (Part 6 – Registers) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 62: ARM-32 Course 1 (Part 22 – Hacking ADC) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 61: ARM-32 Course 1 (Part 21 – Debugging ADC) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 59: ARM-32 Course 1 (Part 19 – Hacking ADDS) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 54: ARM-32 Course 1 (Part 14 - ADD) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 52: ARM-32 Course 1 (Part 12 - Von Neumann Architecture) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech https://github.com/mytechnotalent/Reverse-Engineering#technology


#reverseengineering Lesson 48: ARM-32 Course 1 (Part 8 - CPSR) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


Content warning: How are Unix pipes implemented?


Content warning: A 35-year-old bug in patch found in efforts to restore 29 year old 2.11BSD


Content warning: Logging C Functions


#reverseengineering Lesson 47: ARM-32 Course 1 (Part 7 - Program Counter) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


#reverseengineering Lesson 45: ARM-32 Course 1 (Part 5 - Word Lengths) #assembler #c #cyber #cybersecurity #hack #hacking #hacker #tech #technology https://github.com/mytechnotalent/Reverse-Engineering


C++ Compiler Targets the Web - It is a common problem these days. You have a piece of code in C or C++. Maybe it is older code. O... - https://hackaday.com/2020/12/21/c-compiler-targets-the-web/ #softwaredevelopment #softwarehacks #webassembly #emscripten #javascript #compiler #asm.js #web #c

Este sitio web utiliza cookies. Si continúa navegando por este sitio web, usted acepta el uso de las cookies.