I've been coding 25 years, but just now realizing I have nothing to show for it. I need to get past my fears and perfectionism ideology and just put myself out there. Move past the fear of being judged. To be part of the community and share my opinions.
If you're looking to blow off some steam or kill a few hours, these free and open source first-person shooter (FPS) video games for Linux, Microsoft Windows, and OS X may be just what you need.
Middleman is a static site generator using all the shortcuts and tools in modern web development.
Eleventy is a simpler static site generator.
BILANZ DES 35C3 IN LEIPZIG
Etwas Sinn in maximaler Verwirrung
OrbitDB is a serverless, distributed, peer-to-peer database. OrbitDB uses IPFS as its data storage and IPFS Pubsub to automatically sync databases with peers. It's an eventually consistent database that uses CRDTs for conflict-free database merges making OrbitDB an excellent choice for decentralized apps (dApps), blockchain applications and offline-first web applications.
Solving murder with Prolog. - In our company we usually have a fun quiz every sunday and this was one of them
Learn Prolog Now! is an introductory course to programming in Prolog.
Welcome to Grid Garden, where you write CSS code to grow your carrot garden!
Useful Cryptography Resources. This page is an attempt to compile some of the top technical crypto and security blogs, textbooks, and websites. It’s very much a work in progress.
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. ... We conclude that moving to stronger key exchange methods should be a priority for the Internet community.
PORTAL A Personal Onion Router To Assure Liberty. PORTAL is a project that aims to keep people out of jail. It is a dedicated hardware device (a router) which forces all internet traffic to be sent over the Tor network. This significantly increases the odds of using Tor effectively, and reduces the potential to make fatal mistakes.
Australien: Firmen müssen Kommunikation und Geräte entschlüsseln. Das von der konservativen Regierung durchgepeitschte Gesetz sieht hohe Strafen vor, wenn Provider, Anbieter und Personen auf Verlangen den Behörden keinen Zugang gewähren, IT-Konzerne warnen vor dadurch entstehenden Sicherheitslücken
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. ... We conclude that moving to stronger key exchange methods should be a priority for the Internet community.
On Ghost Users and Messaging Backdoors