Vinceuitar

605 Flips | 19 Magazines | 27 Likes | 18 Following | 39 Followers | @Kvb07 | Keep up with Vinceuitar on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Vinceuitar”

How to Install Kernel Headers in Ubuntu and Debian

In our last article, we have explained how to install kernel headers in CentOS 7. <b>Kernel Headers</b> contain the <b>C</b> header files for the Linux kernel, which …

Linux

Microsoft Publishes Massive 948-Page PDF With Every Windows Terminal Command You Could Ever Need

Image: byrev / Pixabay<p>If you wanted an exhaustive reference for all the command line tools and utilities available in Windows, "/h" was as good as it …

Windows Server

Want to be a top developer? You should build things. Here’s another list to get you started.

<i>Due to high demand I’m extending the list of fun apps to build.</i> 😁<p><b>Here’s the initial post</b><b>. Feel free to post your applications in the comments or on</b> …

Software Engineering

The 9 mistakes people make when buying, ordering, and drinking gin — and what to do instead

Whether you've been a fan for years or have only recently picked up on the craze, there's no denying that gin has taken the drinks world by storm.<p>However, from knowing what to buy to ordering the right thing at the bar, there's a lot to know about the juniper-based spirit.<p>To get some answers, …

Alcohol

Inside One Man's Serial-Killer Unification Theory

New series details an ex-cop's investigation into Ed Edwards, a serial killer he claims is responsible for everyone from the Black Dahlia to …

Crime

Get Exact Boot and Uptime on Ubuntu from the Command Line

Want to know exactly when you last booted your Ubuntu machine, or how long it’s been since you last did? Probably not —but I’m going to show you how …

Linux

How To: Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, …

Bill Maher Exposes Geraldo Rivera on Trump: ‘Now You Are the Spin’

The ‘Real Time’ host grilled the Fox News pundit over his passionate support of President Trump. It didn’t go well for Rivera.<p>There was a time, …

Cracking Passwords up to 256 Characters with Hashcat

Think your 12 character passwords are still strong enough? One of the top password cracking programs can now crack password up to 256 characters!The …

Personal Information

Teach Yourself Computer Science Using This Site

<i>Lifehacker</i> has collected a lot of "learn to code" resources that are especially helpful to new learners. But if you've already done a little coding …

Typical Programmer

<b>tl;dr</b> I can do all of my programming and system admin work with an iPad Pro because I work on remote servers over ssh, and I prefer using the …

SD Times news digest: Cloudflare 1.1.1.1, Drupal security vulnerability, and Linux 4.16

As part of its mission to build a faster, privacy -first Internet, Cloudflare has announced the release of Cloudflare 1.1.1.1, a new DNS service. DNS …

Information Security

Python Regular Expressions Cheat Sheet

The tough thing about learning data is remembering all the syntax. While at Dataquest we advocate getting used to consulting the Python …

Python Programming

20 Most Amazing Castles in Germany

German castles are nothing short of outstanding. Not all of them resemble fairy tale castles, though it’s been said that some of these gleaming …

Cracking the Coding Interview: 189 Programming Questions and Solutions

Overview<p>Cracking the Coding Interview: 189 Programming Questions and Solutions by Gayle Laakmann McDowell<p>I am not a recruiter. I am a software …

How to Kill Democracy in Four Easy Steps: Lessons on the Gestapo at 85

Eighty-five years ago the Nazi terror machine began operations. It met little resistance. And that’s the lesson that should really worry us now.<p>The …

Who Hacked the ATL? Hijackers Are Holding Atlanta for Ransom and Time Is Running Out

For the past five days, a mysterious group has been holding the city of Atlanta for ransom as federal authorities fight a computer attack that has …

My Linux Development Environment of 2018

In this blog post I will talk a bit about the setup and software of my personal laptop, powered by Linux. This is somewhat inspired by this post, but …

Hacking it: a peek into the life of a cybersecurity professional

The 2017 news cycle was inundated with headlines about high-profile, large-scale data breaches. In their wake, millions of Americans were left wondering if their sensitive information—social security numbers and credit card details—had been compromised.<p>The apparent uptick in breaches is …

Cybersecurity

Functional programming for beginners

Recently, I attended Manuel Chakravarty’s YOW! night talk titled Demystifying Functional Programming, which inspired me to write this post.<p>From my …

Russia Feared Hitler's Panzer Tanks. But They Might Have Feared Who Led Them Even More.

Using speed and daring, Panzer leader Hyazinth Graf Strachwitz achieved multiple victories on the Eastern Front in World War II.The wide tracks of …

World War II

Veteran CIA agent on Trump: “Corruption like we’ve never seen before”

<b>(AP/Evan Vucci/City Lights Publishers/Salon)</b><p>Longtime CIA analyst Melvin Goodman: Russian hacking isn’t as dangerous as the “dumbing down of this country”<p>Chauncey DeVega<p>March 12, 2018 9:00am (UTC)<p>The cauldron that is the Russia scandal and its related tendrils -- including possible money laundering …

Donald Trump

Operation Bayonet: Inside the Sting That Hijacked an Entire Dark Web Drug Market

For anyone who has watched the last few years of cat-and-mouse games on the dark web's black markets, the pattern is familiar: A contraband bazaar …

The Best Albums of 2018 (So Far)

Even as our definition of what exactly makes a "record" expands and mutates, the album remains a form beloved by fans, artists, and the larger record …

75 years ago, Norwegian commandos pulled off a daring raid that kept the Nazis from building a nuclear bomb

After handing them their suicide capsules, Norwegian Royal Army Colonel Leif Tronstad informed his soldiers, "I cannot tell you why this mission is so important, but if you succeed, it will live in Norway's memory for a hundred years."<p>These commandos did know, however, that an earlier attempt at …

FitBit Could Prove a Man’s Innocence. Google Could Send Another to Prison for Murder.

A troubled boyfriend. A hard-drinking felon. And a young mom bludgeoned to death steps from her own home. Now smart technologies could help solve who …

How to Change SSH Port in Linux

SSH or Secure Shell daemon is a network protocol that is used to perform remotely secured log ins to Linux systems via a secured channel through …

Linux

Linux: To recurse or not

Linux and recursion are on very good speaking terms. In fact, a number of Linux commands recurse without ever being asked, while others have to be …

Linux

How To: Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)

Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal …

12 Most Influential Books Every Software Engineer Needs to Read | The Curious Programmer

This is a question that I get a lot, especially from co-workers or friends that are just beginning their journey as a software craftsman. What book …

Programming