Software gives visual representation of who’s following you online By Stephen C. WebsterThursday, March 1, 2012 11:08 EDT A new piece of software released this week by browser-maker Mozilla does something unique: it provides a real-time visualization of who is tracking your movements online. The software is called “Collusion,” developed last year by Mozilla programmer Atul Varma, who became inspired to code the program after reading extensively about online privacy matters. “Each dot in the graph represents a website,” Alex Fowler, the global privacy lead at Mozilla, explained to Raw Story. While it doesn’t sound all that creepy, just wait until you see your own graph. “Mozilla’s goal is to raise awareness of users about one part of their online experience,” Fowler explained. “Policy makers have been working on this issue for some time now, so for many of the regulatory veterans to privacy Collusion won’t be a surprise,” Fowler said. (H/T: PCWorld) Copyright 2012 The Raw Story Stephen C. Stephen C.
Portable Apps Beginning Perl (free) - www.perl.org What does this book cover? Installing Perl on Windows and UNIX Making use of online Perl resources like CPAN First principles in programming and the Perl syntax Working with files and databases Writing web pages in Perl Using Perl as an object-oriented language Book overview Perl is a well-established programming language that has been developed through the time and effort of countless free software programmers into an immensely powerful tool that can be used on pratically every operating system in the world. "There's more than one way to do it" is the motto of Perl, but this book aims to take you through them all. Who is this book for? This book is for those new to programming who want to learn with Perl.
IDA Pro Disassembler - multi-processor, windows hosted disassembler and debugger What is IDA all about? IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger that offers so many features it is hard to describe them all. Just grab an evaluation version if you want a test drive. An executive summary is provided for the non-technical user. Getting IDA IDA is available for many platforms, and can be licensed under different terms. Support & Community We have placed a sensible amount of support links and documentation online that can be valuable both to new, and advanced users. Additionally, our user board is a valuable source of hints and tips for the IDA Disassembler. Technical Documentation Intro to the IDA Debugger. Screenshots
Visualizing Algorithms The power of the unaided mind is highly overrated… The real powers come from devising external aids that enhance cognitive abilities. —Donald Norman Algorithms are a fascinating use case for visualization. To visualize an algorithm, we don’t merely fit data to a chart; there is no primary dataset. Instead there are logical rules that describe behavior. But algorithms are also a reminder that visualization is more than a tool for finding patterns in data. #Sampling Before I can explain the first algorithm, I first need to explain the problem it addresses. Light — electromagnetic radiation — the light emanating from this screen, traveling through the air, focused by your lens and projected onto the retina — is a continuous signal. This reduction process is called sampling, and it is essential to vision. Sampling is made difficult by competing goals. Unfortunately, creating a Poisson-disc distribution is hard. Here’s how it works: Now here’s the code: The distance function is simple geometry:
The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? I am a hacker, enter my world... Mine is a world that begins with school... Damn underachiever. I'm in junior high or high school. Damn kid. I made a discovery today. Damn kid. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. Damn kid. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. Yes, I am a criminal. I am a hacker, and this is my manifesto.
Wibiya Consulting Perl Scripts Page <table class="PageTitle" cellspacing="0" cellPadding="3" border="0" ><tr><td align="middle" bgcolor="yellow">[ <a href="/">Home</a> |</td><td align="middle" bgcolor="yellow"><a href="/services/">Services</a> | </td><td align="middle" bgcolor="yellow"><a href="/perl/">Perl</a> |</td><td align="middle" bgcolor="yellow"><a href="/isapi/">ISAPI</a> |</td><td align="middle" bgcolor="yellow"><a href="/libs/">Libraries</a> |</td><td align="middle" bgcolor="yellow"><a href="/training/">Training</a> |</td><td align="middle" bgcolor="yellow"><a href="/books/">Books</a> |</td><td align="middle" bgcolor="yellow"><a href="/contact/">Contact</a> ]</td></tr></table> There are many Perl programmers in the world. So many, in fact, that there is probably someone who has already written a script which identifies a solution to a problem you may have. In an ideal world it would be easy to locate these individuals so that you could ask them how they solved your particular problem.
Resource Hacker ... a freeware resource compiler & decompiler for Windows® applications Version 5.1.2 Last updated: 13 July 2018 Copyright © 1999-2018 Angus JohnsonFreeware - no nags, no ads and fully functional.Download Overview: Resource Hacker™ is a resource editor for 32bit and 64bit Windows® applications. Compiling: Compiling can be initiated either by opening an existing resource script file, or by creating one from scratch using Resource Hacker's editor. Additional features of Resource Hacker's compiler include: The #INCLUDE directive (to access definition statements in header files etc) can be nested to multiple levels, as can the #IF, and #IFDEF directives. Compiler error messages are reported, even errors nested within INCLUDE statements ... Viewing and Editing Resources: Once a resource file has been opened, its resources will generally be displayed as either an image (or group of images) or as decompiled text. Menu and Dialog resource types have their own WYSIWYG designers: Other Actions: Notes:
Arb - a C library for arbitrary-precision ball arithmetic — Arb 2.17.0-git documentation