background preloader

Computer and Information Technology II

Facebook Twitter

Computer and Technology Information III

30 free programming eBooks - citizen428.blog() Since this post got quite popular I decided to incorporate some of the excellent suggestions posted in the comments, so this list now has more than 50 books in it.

30 free programming eBooks - citizen428.blog()

BTW: I’m not very strict on the definition of “ebook”, some of them are really just HTML versions of books. [UPDATED: 2012-01-18] Learning a new programming language always is fun and there are many great books legally available for free online. Here’s a selection of 30 of them: Lisp/Scheme:Common Lisp: A Gentle Introduction to Symbolic ComputationHow to Design ProgramsInterpreting Lisp (PDF, suggested by Gary Knott)Let Over LambdaOn LispPractical Common LispProgramming in Emacs LispProgramming Languages.

Ruby:The Bastards Book of Ruby (suggested by Dan Nguyen)Clever Algorithms (suggested by Tales Arvelos)Data Structures and Algorithms with Object-Oriented Design Patterns in RubyLearn Ruby the Hard WayLearn to ProgramMacRuby: The Definitive GuideMr. Erlang:Concurrent Programming in ErlangLearn You Some Erlang for Great Good. Bash commands - Linux MAN Pages. 20 Linux System Monitoring Tools Every SysAdmin Should Know.

Need to monitor Linux server performance?

20 Linux System Monitoring Tools Every SysAdmin Should Know

Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: Finding out bottlenecks.Disk (storage) bottlenecks.CPU and memory bottlenecks.Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: => Related: How do I Find Out Linux CPU Utilization?

#2: vmstat - System Activity, Hardware and System Information Display Memory Utilization Slabinfo # vmstat -m. Linux Knowledge Base and Tutorial. Interactive map of Linux kernel. C Tutorial. C Language Tutorial Table of Contents: This section contains a brief introduction to the C language.

C Tutorial

It is intended as a tutorial on the language, and aims at getting a reader new to C started as quickly as possible. It is certainly not intended as a substitute for any of the numerous textbooks on C. The best way to learn a new ``human'' language is to speak it right from the outset, listening and repeating, leaving the intricacies of the grammar for later. An excellent textbook on C by two well-known and widely respected authors is: The C Programming Language -- ANSI C Brian W. Dennis Ritchie designed and implemented the first C compiler on a PDP-11 (a prehistoric machine by today's standards, yet one which had enormous influence on modern scientific computation). 1. Let's be polite and start by saluting the world! #include < stdio.h> void main() { printf("\nHello World\n"); } Save the code in the file hello.c, then compile it by typing:

Talisker Computer Network Defence Operational Picture - The Radar Page. Xbox One hacked for Homebrew Attack of the Fanboy More...

Talisker Computer Network Defence Operational Picture - The Radar Page

PhoneHacking on Trial Wall Street Journal More... Progress Made to Stop the Heartbleed Bug Guardian Liberty Voice More... NA CVE20120871 The session link x11 socket function in. More... NA CVE20126646 FSecure AntiVirus Safe Anywhere and PSB. More... NA CVE20134279 imapsync 1.564 and earlier performs a release. Irongeek.com. Kismet.

Home Page. Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources. Network Calculators. Home Network Security. This section provides a basic introduction to the technologies that underlie the Internet.

Home Network Security

It was written with the novice end-user in mind and is not intended to be a comprehensive survey of all Internet-based technologies. Subsections provide a short overview of each topic. This section is a basic primer on the relevant technologies. For those who desire a deeper understanding of the concepts covered here, we include links to additional information. What does broadband mean? How To Become A Hacker.

Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

If you are reading a snapshot of this document offline, the current version lives at. Hacking and Security Articles / Tutorials / White Papers at HellBound Hackers.