background preloader

Reference

Facebook Twitter

Physicists have figured out how to create matter and antimatter using light. A team of researchers from the Institute of Applied Physics of the Russian Academy of Sciences (IAP RAS) has just announced that they managed to calculate how to create matter and antimatter using lasers.

Physicists have figured out how to create matter and antimatter using light

This means that, by focusing high-powered laser pulses, we might soon be able to create matter and antimatter using light. 10 Best Operating Systems For Ethical Hacking And Penetration Testing. It’s time to pause the archaic Windows vs.

10 Best Operating Systems For Ethical Hacking And Penetration Testing

OS X vs. Linux discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in computer systems or computer networks. In this article, we have listed 2016’s top 10 operating systems for ethical hacking and penetration testing. Why I built my own homebrew Linux router. Welcome to Null Island, the most 'visited' place on Earth that doesn't actually exist. If you were to list off a few of the world’s most popular places, you’d probably name something like Stonehenge or the Great Pyramids.

Welcome to Null Island, the most 'visited' place on Earth that doesn't actually exist

One in Every 600 Websites Has .git Folder Exposed, How to Check Yours and Hide It. Security researcher Jamiem Brown, as a part of his personal project, collected and build a database of about 1.5 million big and respected websites.

One in Every 600 Websites Has .git Folder Exposed, How to Check Yours and Hide It

Most of these websites were trusted news websites, educational, or government domain websites- or they were backlinked by such websites. To his surprise, he found that out of the 1.5 million websites, 2,402 have committed the crime of exposing their .git folder- and thus they were downloadable. As mentioned above this downloadable .git folder contains all the website information and could be easily used to cause some serious damage. WebIDE - Firefox Developer Tools. WebIDE enables you to create, edit, run, and debug web apps using the Firefox OS Simulator or a real Firefox OS device.

WebIDE - Firefox Developer Tools

It also enables you to connect the Firefox Developer Tools to a number of other browsers, including Firefox for Android, Chrome on Android, and Safari on iOS. See the Remote Debugging page for instructions on how to connect to a specific browser. With WebIDE, you first set up one or more runtimes. A runtime is an environment in which you'll run and debug the app. A runtime could be a Firefox OS device connected to the desktop over USB (or over Wi-Fi since Firefox 39), or it could be a Firefox OS Simulator installed on the desktop itself.

Next, you create an app, or open an existing app. Finally, you can install the app in one of the runtimes and run it. MDN Learning: A place to ratchet your Web development skills. Code.org. Dance Party Grades 2+ | Blocks. Codecademy. Eloquent JavaScript: A Modern Introduction to Programming. Slashdot: News for nerds, stuff that matters. Host Identity Protocol. The Host Identity Protocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet.

Host Identity Protocol

The Internet has two main name spaces, IP addresses and the Domain Name System. HIP separates the end-point identifier and locator roles of IP addresses. It introduces a Host Identity (HI) name space, based on a public key security infrastructure. The Host Identity Protocol provides secure methods for IP multihoming and mobile computing. In networks that implement the Host Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers.

The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (Internet Layer) in TCP/IP.[1] HIP was specified in the IETF HIP working group. RFC references[edit] See also[edit] References[edit] Portal:Free software. Kerberos. From Wikipedia, the free encyclopedia.

Kerberos

Private & Secure Data Storage for Business ↦ Home. Index of /rfc. Identity. From Wikipedia, the free encyclopedia Identity may refer to: Philosophical topics[edit] Personal conception and expression[edit] Specifications of persons[edit] Group expression and affiliation[edit] Christian Identity, a Christian religious movementCultural identity, person's self-affiliation (or categorization by others) as a member of a cultural groupIdentity politics, political arguments that focus upon the self-interest and perspectives of self-identified social interest groups or minoritiesNational identity, belief in membership of a nation Mathematics[edit]

Identity

Namespace. In computing, a namespace is a set of symbols that are used to organize objects of various kinds, so that these objects may be referred to by name.

Namespace

Prominent examples include: Namespaces are commonly structured as hierarchies to allow reuse of names in different contexts. Wing06.pdf. 8 Ways Anyone Can Learn To Code Their Own Software. There’s a lot of talk about hardware, devices, and tools for the classroom. But if we learned anything from yesterday’s WWDC Apple keynote, it’s that software is king. It’s what makes or breaks a new product or device. Gone are the days of hardware-first, software-second such as when phones with color screens were viewed as revolutionary. Those days are gone. Now, customers want / demand the highest quality software all the time.

Get Better At Programming.