Web Programming Step by Step, Lecture 6-A: Positioning
Lecture slides to accompany Web Programming Step by Step, a college textbook on web programming.
RFID Zapper Destroys RFID Tags
Radio Frequency Identification, or RFID, has some pretty incredible capabilities but this hacker is appearently not a fan.Â His gun just looks plain
Solarized - Ethan Schoonover
Solarized is a sixteen color palette (eight monotones, eight accent colors) designed for use with terminal and gui applications. It has several . I designed this colorscheme with both precise lightness relationships and a refined set of hues based o...
Apollo's Coding for GOOD
presented by Apollo and GOOD
Lazy Foo' Productions
Extreme Programming Rules
The rules of Extreme Programming (XP)
C programming.com - Learn C and C++ Programming
DEFCON 15: Teaching Hacking at College
Learn to Create Mobile Games with this In-Depth Unreal Developer's...
LearnStreet - Coding Starts Here
Whether you are completely new to coding or a developer looking to pick up a new language, LearnStreet courses make it engaging and fun to learn to code.
How to hack a remote system using Metasploit and Armitage...
Open a Padlock with an Aluminum Can
Most us who've had school lockers or rental storage units know that lots of people trust inexpensive padlocks to secure their belongings. Tactical studies weblog ITS Tactical proves that this trust is a false sense of security by opening the two most...
DEFCON 16: Nmap: Scanning the Internet
8 ways to be a better programmer in 6 minutes.
Remember how started about becoming a better developer in 6 months?
CMSC 311 - Class Notes
The demise of the low level Programmer.
Top 10 Hardware Boosting Hacks
With great hardware comes great opportunity. Thanks to the internet and clever hacking communities, there are plenty of ways to boost the capabilities of your everyday gadgets.