ACM Classic: Reflections on Trusting Trust
No information avaiable
http://cm.bell-labs.com/who/ken/trust.html
popularity:
programming
security
unix
c
software
trust
history
code
compiler
hacking
|
good coders code, great reuse
Suppose your website has a domain "catonmat.net" and the search term you want to ... Contact me if you are interested in advertising on catonmat.net! ...
similarity:
popularity:
programming
blog
development
linux
tips
technology
software
code
blogs
unix
|
ha.ckers.org web application security lab
Then she saw the ha.ckers.org logo, to which I said, "Don't worry, we were just ... So you've seen ha.ckers.org on Google's own machines at a security conference - where ...
similarity:
popularity:
security
hacking
blog
web
programming
internet
tools
reference
hack
xss
|
Bit Twiddling Hacks
The code and descriptions are distributed in the hope that they will ... WARRANTY and without even the implied warranty of merchantability or fitness for ...
similarity:
popularity:
programming
c
algorithms
bit
hacks
reference
code
c++
algorithm
optimization
|
Programmers' Heaven - For free C++, Visual Basic, ASP, sourcecode, programming, javascript, code, delphi, pascal and more
Includes programming files, links, articles, tutorials, and more.
similarity:
popularity:
programming
development
code
reference
c++
java
software
tutorials
tutorial
php
|
The Rise of ``Worse is Better''
Previous: Lisp's Apparent Failures Up: Lisp's Apparent Failures Next: Good Lisp ... I and just about every designer of Common Lisp and CLOS has had extreme exposure ...
similarity:
popularity:
programming
design
philosophy
software
lisp
development
unix
architecture
history
article
|
Web Application Exploits and Defenses
No information avaiable
similarity:
popularity:
security
google
tutorial
hacking
programming
web
development
exploits
webdev
hack
|
.mixter security | .home
No information avaiable
similarity:
popularity:
security
hacking
programming
network
hack
people
tech
security-group
code
seguridad
|
PHPIDS » Web Application Security 2.0
Welcome to php-ids.org - here you can find a collection of resources relating to PHPIDS including files, documentation, a friendly forum and a cool demo that shows ...
similarity:
popularity:
php
security
ids
programming
web
development
xss
software
tools
hacking
|
Cscope Home Page
It has an impeccable Unix pedigree, having been originally developed at Bell ... of the official AT&T Unix distribution for many years, and has been used to ...
similarity:
popularity:
programming
c
tools
development
c++
software
tool
vim
cscope
code
|
Top 100 Network Security Tools
Review of the top 100 network security tools (free or commercial), as voted on by 3,200 Nmap Security Scanner users ... I (Fyodor) asked users from the nmap ...
similarity:
popularity:
security
tools
network
software
hacking
linux
sysadmin
networking
windows
utilities
|