Archive
2024
January 01 | MCAT | 0 |
2023
2022
December 19 | 1Kosmos | 45 |
December 15 | Wallix | 39 |
December 13 | Solidity | 145 |
July 22 | The Web | 745 |
May 22 | Styra | 1 |
May 20 | Identity as a Service | 6 |
May 01 | CyberArk | 1 |
April 21 | Management | 110 |
April 20 | Leadership | 46 |
April 13 | Burnout | 24 |
April 02 | Configuration Files | 60 |
April 01 | Windows | 556 |
February 13 | Centrify | 22 |
February 11 | Identity and Access Management | 727 |
January 04 | Forgerock | 329 |
2021
December 13 | Okta | 1 |
December 03 | Ping Identity | 246 |
November 11 | Chaos Engineering | 251 |
November 03 | Site Reliability Engineering | 3329 |
November 02 | Reliability Engineering | 3 |
August 19 | Pull Request | 48 |
June 01 | Denial-of-Service attack | 103 |
May 11 | LeetCode #1480 "Running Sum of 1d Array" | 314 |
May 11 | LeetCode #1431 "Kids With the Greatest Number of Candies" | 443 |
April 10 | The Bet | 33 |
April 01 | Java | 386 |
2020
2019
December 31 | Tech History | 584 |
December 25 | Ethical Hacking | 746 |
December 20 | HackerRank | 290 |
October 23 | Malware Scanner | 40 |
July 26 | Game of Life | 63 |
July 25 | Data Analysis Practice | 47 |
April 01 | Computer Engineering | 25 |
January 18 | Federated Identity | 177 |
January 15 | Single Sign-On | 860 |
January 04 | Swift | 141 |
January 03 | Objective-C | 7 |
January 01 | iOS App Dev | 6 |
2018
December 20 | CGI | 33 |
December 03 | Cyberdefenses | 181 |
December 02 | Cyberattacks | 400 |
December 01 | Cyberwarfare | 94 |
October 18 | Financial Technology | 44 |
September 02 | Mobile Application Security | 20 |
September 01 | Mobile Application | 110 |
June 14 | Information Technology II | 0 |
June 13 | Information Technology I | 105 |
May 04 | Ghost Artemis | 1 |
February 27 | Philosophical Questions in Video Game Mediums | 76 |
January 06 | Computer Architecture | 263 |
January 05 | Digital Logic | 43 |
2017
December 23 | Security Engineering Questions | 1349 |
December 15 | Privacy Tracker | 38 |
November 04 | Continuous Integration | 24 |
November 03 | Continuous Delivery | 58 |
November 01 | Ruby | 25 |
September 03 | Network Security Successs Guide (part B) | 1783 |
September 02 | Network Security Successs Guide (part A) | 914 |
September 01 | Network Security Success Guide | 520 |
July 17 | Recursion and Iteration | 283 |
June 30 | Solution Stack | 141 |
June 05 | Backup | 203 |
May 31 | NYU Project Descriptions | 234 |
May 18 | Continuous Mathematics | 70 |
May 17 | Mathematical Analysis | 253 |
May 01 | Risk Assessment | 172 |
April 01 | Rust | 22 |
February 11 | The Bet | 13 |
February 03 | SQL | 2 |
February 02 | Database | 570 |
January 10 | Cloud Security | 78 |
January 06 | Web API | 148 |
January 05 | Web Server | 230 |
January 01 | Signal | 0 |
2016
December 11 | Computer Graphics | 300 |
December 10 | Color Wheel Teams | 110 |
December 07 | Data Engineering | 119 |
December 06 | Data Science | 505 |
December 05 | Data Analysis | 132 |
November 17 | Digital Physics | 32 |
November 16 | Biology | 1090 |
November 15 | Chemistry | 167 |
November 14 | Physics | 1899 |
November 02 | Scientific Computing | 6 |
August 17 | Pure Mathematics | 526 |
July 05 | pip | 130 |
June 22 | Discrete Mathematics | 1436 |
June 05 | Go | 67 |
June 01 | Programming Language Theory | 24 |
May 11 | Infrastructure | 42 |
May 02 | Applied Cryptography | 652 |
April 27 | Recursion Code | 612 |
April 22 | Decentralized Computing | 114 |
April 06 | Virtualization | 759 |
April 03 | Operating Systems II | 0 |
April 02 | Operating Systems I | 638 |
April 01 | A Happy Lorem Ipsum | 253 |
February 26 | LeetCode Template | 83 |
February 15 | Game Development | 33 |
January 15 | Enterprise | 5 |
2015
December 21 | Quantum Computing | 565 |
December 20 | Quantum | 8 |
December 10 | Secure SDLC | 25 |
December 09 | Application Security | 233 |
December 03 | Internet of Things | 1 |
December 02 | IoT Security | 72 |
December 01 | macOS | 669 |
November 05 | Information Theory | 47 |
October 11 | Complexity Theory | 251 |
October 03 | Incident Response | 16 |
October 01 | Forensics | 26 |
September 05 | Algorithms Analysis V | 1 |
September 04 | Algorithms Analysis IV | 1 |
September 03 | Algorithms Analysis III | 14 |
September 02 | Algorithms Analysis II | 172 |
September 01 | Algorithms Analysis I | 630 |
May 15 | Mathematical Philosophy | 634 |
May 05 | Esoteric Programming Languages | 46 |
March 31 | Apple | 229 |
March 14 | Flask | 167 |
March 06 | Deleting Commit History | 54 |
February 20 | Less Is More | 2 |
2014
September 15 | Unique Values With pandas | 79 |
June 06 | Human-Computer Interaction | 16 |
May 06 | The Bet | 74 |
May 01 | Malware Analysis | 347 |
March 07 | Artificial Intelligence V | 1 |
March 06 | Artificial Intelligence IV | 1 |
March 05 | Artificial Intelligence III | 5 |
March 04 | Artificial Intelligence II | 1 |
March 03 | Artificial Intelligence I | 1332 |
February 20 | Information Security | 55 |
February 02 | Cybersecurity V | 0 |
February 01 | Cybersecurity IV | 0 |
January 31 | Cybersecurity III | 1 |
January 30 | Cybersecurity II | 53 |
January 29 | Cybersecurity I | 468 |
January 04 | Backend | 0 |
January 03 | Frontend | 164 |
January 02 | Full Stack | 71 |
January 01 | Software Architecture | 87 |
2013
November 29 | Fast Fourier Transform | 115 |
October 16 | Distributed Computing | 443 |
October 13 | Concurrency and Parallelism | 113 |
October 11 | Parallelism | 112 |
October 10 | Concurrency | 281 |
August 18 | Paradigms | 402 |
August 15 | Software Development | 642 |
July 12 | Profiler with Decorator | 221 |
July 04 | Concrete Mathematics | 2 |
July 02 | How to Prove It | 3 |
June 07 | Amazon Web Services V | 0 |
June 06 | Amazon Web Services IV | 0 |
June 05 | Amazon Web Services III | 0 |
June 04 | Amazon Web Services II | 67 |
June 03 | Amazon Web Services I | 1944 |
June 02 | Cloud Providers II | 9 |
June 01 | Cloud Providers I | 321 |
May 17 | Beautiful Soup and Scraping | 108 |
April 25 | Hybrid Algorithm | 0 |
April 15 | Patterns | 0 |
April 02 | The "45 Minutes LÖVE Tutorial" Extended | 212 |
April 01 | C# | 0 |
March 31 | Software Engineering | 258 |
March 20 | Compiler | 71 |
March 04 | Social Engineering | 200 |
March 03 | Penetration Testing | 72 |
February 24 | Review: Slackware 14 | 364 |
2012
December 12 | Vulnerability Analysis | 65 |
December 10 | Software Design | 267 |
June 01 | Sociology | 19 |
May 14 | CS Topics Textbook Notes | 1794 |
April 10 | My Own Language | 35 |
March 31 | Linear Algebra | 436 |
March 30 | Intelligence | 964 |
March 14 | Python | 762 |
February 26 | Probability | 1563 |
February 25 | Statistics | 55 |
February 20 | Python Basics | 714 |
February 12 | Calculus 3 | 945 |
February 11 | Calculus 2 | 266 |
February 10 | Calculus 1 | 556 |
February 01 | Liberal Art Stuff II | 3 |
January 31 | Liberal Art Stuff I | 62 |
January 03 | Drupal 7 | 301 |
2011
December 13 | Design | 65 |
August 11 | Cleaning up KDE | 135 |
July 14 | Functional Languages | 140 |
June 27 | Access Control | 32 |
June 18 | Review: Slackware 13.37 | 399 |
March 31 | Cybersecurity Textbook Notes | 28 |
February 27 | Security Operation | 29 |
January 16 | Geometric | 81 |
January 15 | Reverse Engineering | 0 |
2010
December 17 | Competitive Programming | 167 |
December 14 | Parsing | 53 |
December 04 | Running Warhammer Online on Slackware | 390 |
August 05 | Virtualization for Slackware 13.1 | 164 |
May 01 | Regular Expression | 31 |
February 22 | Client: Enhanced Diamonds Direct | 850 |
February 12 | Encrypting | 41 |
February 11 | Encoding | 82 |
February 10 | Problem Set | 61 |
January 07 | Trigonometry | 144 |
January 06 | Algebra | 548 |
January 05 | Precalculus | 1079 |
January 04 | Integrals | 56 |
January 03 | Derivatives | 19 |
2009
December 01 | Easy Integrals | 18 |
October 15 | Mathematical Puzzles | 1 |
July 11 | Very Useful Gists | 44 |
May 14 | Tools | 372 |
May 13 | Slackware | 1177 |
May 11 | Nessus vs Nmap | 276 |
March 10 | Physical Security | 66 |
February 02 | Systems Design | 476 |
January 10 | Version Control | 355 |
2008
December 30 | Geometry | 258 |
December 01 | Hackathons | 576 |
October 11 | Multi-Factor Authentication | 52 |
August 25 | Azureus | 316 |
July 15 | Psychology | 1524 |
June 27 | Perl | 44 |
June 13 | Python Environment | 333 |
June 02 | Slackware 12.1 | 69 |
June 01 | Linux From Scratch | 85 |
April 14 | Open Source | 76 |
April 13 | Git | 84 |
April 01 | ipkungfu | 37 |
February 15 | Django Templates | 16 |
January 02 | Object-Relational Mapping | 16 |
2007
November 17 | Cloning Facebook | 345 |
October 10 | Ancient Philosophy | 72 |
October 09 | General Philosophy | 66 |
June 16 | Astronomy | 168 |
June 15 | Cosmology | 605 |
May 22 | Vector Linux 5.8 SOHO (final) | 162 |
April 15 | Metaphysics | 738 |
April 05 | Django Forms | 65 |
March 29 | Django | 159 |
March 15 | TrueCrypt | 35 |
March 11 | OSI Layer 4-7 | 941 |
March 10 | OSI Layer 1-3 | 583 |
March 03 | RFCs | 192 |
March 02 | Unix | 87 |
February 27 | Computer Networking | 421 |
February 05 | Ownership | 45 |
February 01 | Theory of Computation | 245 |
January 15 | Information Warfare | 78 |
January 11 | Editor Peace | 172 |
January 01 | The C++ Programming Language | 2 |
2006
December 24 | Theoretical Data Structures | 0 |
December 21 | Theoretical Algorithms | 0 |
November 30 | Hosts | 168 |
November 14 | Linked List | 234 |
September 24 | Lua | 10 |
August 25 | PHP | 75 |
July 03 | Queue | 76 |
July 01 | Pattern Matching | 173 |
June 22 | Theoretical Computer Science III | 1 |
June 21 | Theoretical Computer Science II | 0 |
June 20 | Theoretical Computer Science I | 2 |
June 01 | Formal Methods | 46 |
May 20 | Profiler | 162 |
May 19 | Debugger | 15 |
May 11 | Terminal | 23 |
April 23 | Topology | 144 |
March 31 | Math Textbook Notes | 31 |
February 06 | Mathematics V | 0 |
February 05 | Mathematics IV | 0 |
February 04 | Mathematics III | 0 |
February 03 | Mathematics II | 9 |
February 02 | Mathematics I | 1041 |
January 30 | Hash Table | 189 |
2005
December 30 | Morse Code | 77 |
December 20 | Content Management System | 13 |
December 19 | Drupal | 239 |
December 05 | Compression | 348 |
December 01 | Number Theoretic | 259 |
July 18 | Topcoder Template | 103 |
June 18 | Searching | 448 |
May 06 | Gödel, Escher, Bach | 2 |
May 05 | Code Complete | 2 |
April 02 | Graph | 304 |
April 01 | Empty | 0 |
March 31 | Computer Science VII | 0 |
March 30 | Computer Science VI | 0 |
March 29 | Computer Science V | 0 |
March 28 | Computer Science IV | 0 |
March 27 | Computer Science III | 0 |
March 26 | Computer Science II | 9 |
March 25 | Computer Science I | 90 |
March 17 | Stack | 282 |
February 28 | Sorting | 579 |
February 10 | Epistemology | 51 |
February 05 | Webmaster | 1 |
January 13 | Cryptography IV | 3 |
January 12 | Cryptography III | 3 |
January 11 | Cryptography II | 459 |
January 10 | Cryptography I | 764 |
January 03 | Documentation | 86 |
January 02 | Vector Linux 4.3 | 46 |
January 01 | Cooperative Games | 593 |
2004
December 31 | Games | 22 |
December 24 | LILO | 99 |
December 12 | Introduction to Algorithms | 735 |
July 10 | Tree | 418 |
May 30 | Practice | 260 |
May 15 | Strings | 164 |
February 17 | Sets | 17 |
February 13 | Matrix | 13 |
February 12 | Array | 156 |
January 28 | My Slackware Poetry | 29 |
January 10 | Network Security | 392 |
January 01 | C++ | 1395 |
2003
October 09 | Libraries and Frameworks | 181 |
March 31 | CS Textbook Notes | 144 |
March 30 | Ethics | 94 |
January 31 | The Art of Computer Programming | 117 |
2002
December 01 | Logic | 300 |
October 30 | Calculating CIDR | 0 |
June 05 | Data Structures V | 1 |
June 04 | Data Structures IV | 1 |
June 03 | Data Structures III | 1 |
June 02 | Data Structures II | 33 |
June 01 | Data Structures I | 145 |
April 19 | Optimizations | 875 |
March 31 | Algorithms | 967 |
March 25 | Binary | 42 |
March 20 | Assembly | 210 |
March 03 | C | 513 |
March 02 | The C Programming Language | 4 |
January 02 | Shell Scripting | 72 |
2001
December 03 | My Output Hardware | 204 |
December 02 | My Input Hardware | 210 |
December 01 | My Hardware | 455 |
October 31 | IRC | 76 |
October 25 | Linux | 754 |
406