Greg Bowe

710 Flips | 16 Magazines | 303 Likes | 12 Following | 105 Followers | @GregBowe | Simplify

Bootstrap Framework — Best Practices

At the time of this writing, we’re at <b>Bootstrap v4.1.1</b> release! <br>In their v5 roadmap, they’re planning to rewrite everything with PostCSS. When that …

Web Development

10 Open Source Security Tools You Should Know

Open source tools can be the basis for solid security and intense learning. Here are 10 you should know about for your IT security toolkit.

Information Security

Build production ready universal apps easily

Clone this project<p>Make your changes. Add a package, add authentication, modify the file structure, replace Redux with MobX or anything else.<p>In this …

Why Marketing Analytics Hasn’t Lived Up to Its Promise

We see a paradox in two important analytics trends. The most recent results from The CMO Survey conducted by Duke University’s Fuqua School of Business and sponsored by Deloitte LLP and the American Marketing Association reports that the percentage of marketing budgets companies plan to allocate to …

Big Data

50 recommended frameworks for node js

In this article, I am going to give a quick overview about Node.js and then we will share 50 most recommended node.js framework which will help …

Enumeration

<b>Table of Contents</b><p>Enumeration<p>Generic Enumeration<br>• HTTP Enumeration<br>• SSH Enumeration<br>• SMB Enumeraion<br>• SNMP Enumeration<p>Explotation<p>BOF Based Exploits<p>Weak …

SQL Injection 101: Database & SQL Basics Every Hacker Needs to Know

The key to becoming a competent white hat is knowing how the technology that you are trying to exploit actually works. SQL injection is one of the …

FoundationDB, a very interesting NoSQL database owned by Apple, is now an open-source project

Three years ago, database geeks were disappointed to learn that FoundationDB and its unique database product had been acquired by Apple. That all …

There Are 4 Types of Managers. One Is More Effective Than the Others

In a utopian corporate world, managers lavish a constant stream of feedback on their direct reports. This is necessary, the thinking goes, because organizations and responsibilities are changing rapidly, requiring employees to constantly upgrade their skills. Indeed, the desire for frequent …

Microsoft built its own custom Linux kernel for its new IoT service

At a small press event in San Francisco, Microsoft today announced the launch of a secure end-to-end IoT product that focuses on microcontroller-based devices — the kind of devices that use tiny and relatively low-powered microcontrollers (MCUs) for basic control or connectivity features. …

Silicon Valley techies get free food and dazzling offices, but they're not very loyal - here's how long the average employee stays at the biggest tech companies

Software and internet companies had the highest level of employee turnover in 2017 when compared to other major industries, according to data gathered by employment-focused social network LinkedIn.<p>Silicon Valley is famous for showering employees with perks like free meals, transportation and …

Bank web apps are the "most vulnerable" to getting hacked, new research says

If there's one thing the banking sector is good at, it's shoddy cybersecurity.<p>Bad news if you're one of the hundreds of millions of online banking …

A Visualization Grammar

<b>Vega</b> is a <i>visualization grammar</i>, a declarative language for creating, saving, and sharing interactive visualization designs. With Vega, you can …

An Introduction to Altair

Recently I attended a wonderful talk by Jake VanderPlas (and hosted by the always astute Eli Bressert) about a wonderful package he has been working …

9 of the Best Homebrew Packages for Mac

If you’re an advanced Mac user who spends a considerable amount of time at the command line, you likely have Homebrew installed by now. So, how about …

An Overview of TLS 1.3 - Faster and More Secure

It has been over eight years since the last encryption protocol update, but the new <b>TLS 1.3 has now been finalized as of March 21st, 2018</b>. The …

How to remove Android malware from your phone or tablet

Google’s ecosystem may be increasingly safe thanks to constant improvements to Play Protect’s effectiveness, but that doesn’t mean that the chance of …

Apps

Integrating Snips with Home Assistant

With the rise of Amazon Echo and Google Home, we are getting increasingly accustomed to controlling our home via voice. But our home is also our most …

Introduction to Regression Splines (with Python codes)

As a beginner in the world of data science, the first algorithm I was introduced to was Linear Regression. I applied it to different datasets and …

How To Know Which Ideas Suck

As a general principle, there are two ways you can brainstorm ideas, and it all depends on where you start: with possibilities or limitations. …

UX Design

Here’s how you access the super creepy data Facebook has on you

Since 2010, Facebook allows you to download an archive file of all your interactions with the network. It’s a 5-click easy process that your grandmother can do (more details below).<p>Inside the .zip, lies an ‘index.html’ page that acts as a portal to your personal data. Visually, it looks like an …

8 Edible Bugs That Could Help You Survive

2.5K<p>SHARES<p>In many parts of the world, eating bugs is commonplace. Insects are actually the most abundant protein source on the planet, and many of …

Insects

Linux Fu: Regular Expressions

If you consider yourself a good cook, you may or may not know how to make a souffle or baklava. But there are certain things you probably do know how …

Build a realtime voting app in less than 10 min

Realtime technology and data are making applications more useful and practical. The whole realtime world is so fascinating and every bit of it’s …

The fad toy everyone was obsessed with the year you were born

Remember Pogs?<p>From Pogs to Furbies, here’s the fad toy everyone was obsessed with the year you joined Earth.

Introduction to Multiprocessing in Python

The multiprocessing package supports spawning processes using an API similar to the threading module. It also offers both local and remote …

An Introduction to Computer Networks

An Introduction to Computer Networks¶<p><b>Peter L Dordal</b><p>Department of Computer Science<p>Loyola University Chicago<p>Welcome to the website for <i>An Introduction</i> …

Python Top 10 Articles for the Past Month (v.Feb 2018)

For the past month<b>,</b> we ranked nearly 1,000 Python articles to pick the Top 10 stories that can help advance your career (1% chance).<p>Topics in this …

How To: Use Remote Port Forwarding to Slip Past Firewall Restrictions Unnoticed

Local port forwarding is good when you want to use SSH to pivot into a non-routable network. But if you want to access services on a network when you …

Getting Started with Django Channels

<b>In this tutorial, we will use Django Channels to create a real-time application that updates a list of users as they log in and out.</b><p>With WebSockets …

Python Programming