Home

Archive

33 posts across 7 years

2019

Apr 4 Parsing a Subset of J with a PEG Feb 24 Realtime Immunizations: Rust, Kafka, WebSockets, FHIR Feb 21 N Queens with a Twist and a Constraint Solver

2018

Dec 2 Coq Proof of Safety for a Two Node Bidirectional Network Nov 3 Hetzner's EX51-SSD-GPU with GTX 1080 Mar 27 PL Optimization: Chlipala's Use of CoInductive + Heavy Automation Feb 18 2-to-2 Bitcoin Transaction with Segregated Witness Addresses Jan 27 Exfalso in Coq

2017

Nov 4 Database Fundamentals in SQLite Oct 20 Disassembly of Dalvik VM Bytecode to Prevent APK Uninstallation Oct 18 Exploiting Buffer Overflow in a C Program to Bypass Password Prompt Oct 15 Cracking UNIX Password Over SSH to Gain Shell Access Oct 11 Breaking WEP Encryption on a WiFi Router Oct 7 Website Session Hijacking via Base64 Encoded Credential Cookie Oct 5 Cracking UNIX Password Over SSH to View PHP-Hardcoded Credentials Oct 4 Siku Hiyo, Mwanafunzi Alinifundishia "for ... else" ya Python Aug 11 Initial Ramdisk Modifications for Educational Use Tablets Jun 23 Understanding Induction Hypothesis Variation in Coq Jan 6 Hinnebusch & Mirza Swahili with Python

2016

May 29 Assisted Theorem Proving with J-Bob May 19 Tensor Product of Vector Spaces, Step by Step

2015

Oct 24 GDB with Multi-Threaded Rust Jun 27 SPI Bus Loopback Visualization on the STM32 Microcontroller Mar 22 How to Bypass MAC Address License Validation

2014

Oct 29 Doing the OAuth2 Dance in 57 Lines of Python Jul 7 Guide to Installing Apache Solr 4.9, Tomcat 7 on RHEL 7 Feb 11 Logging from Clojure with log4j2 Jan 19 ANTLR 4: A Case Study

2013

Dec 17 Using Libvirt to Create a Private Network for Xen domUs Dec 16 Creating HVM and PV domUs on Xen 4.3 / Debian 7 Dec 13 Oracle 11gR2 Installation on Oracle Linux 6 Sep 2 Full Flash Recovery Area on Oracle 11g Jul 28 Using Oracle 11g on Amazon EC2