Phil M

153 Flips | 3 Magazines | 174 Likes | 5 Following | 7 Followers | @Philosopher_15 | Keep up with Phil M on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Phil M”

Finding duplicates inside an array - Easy Version

Whenever I prepare for the interviews I start with “Arrays and strings” and then move to Linkedlist, trees and eventually find myself lost in …

Programming

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can …

Cybersecurity

The Comprehensive Beginner’s Guide to JavaScript Geolocation Tracking

Combining the Google Maps JavaScript API and PubNub for realtime tracking of device location (with the bells and whistles)<p>Brought to you by …

JavaScript

7 Places to Learn to Program — for Free!

Over my 10-year internet marketing career, my biggest personal competitive advantage was having an electrical engineering degree and being …

Online Education

Rise of Kotlin: The Programming Language for the Next Generation

<i>Please welcome our weekly sponsor</i> <i>Pusher</i> <i>to Hacker Noon!</i> <i>Pusher</i> <i>makes realtime APIs that enable developers all around the world to quickly add</i> …

Programming

Beginner's guide to writing modules

Learn how to create fantastic modules by following module best practices standards and architecture.<p>Contributors to this guide have spent years …

JavaScript

What is Julia? A fresh approach to numerical computing

Julia is a free open source, high-level, high-performance, dynamic programming language for numerical computing. It has the development convenience …

Programming

How I rediscovered my love for JavaScript after throwing 90% of it in the trash.

My Relationship with JavaScript<p>My journey with JavaScript started way back in 1997 with Netscape Navigator 3. Back then you couldn’t do much with it.</b> …

JavaScript

1. Start with a goal in mind

Do you like making repetitive syntax updates across many files? Enjoy the thrill of painstakingly combing through 1000 line diffs that all look the …

Can Learning Python Alone Lead To A Viable Data Science Career Path?

The market demand for Python in India is high, and according to our Analytics and Data Science Jobs study, 2018, Python saw the biggest jump this …

An Intro to Web Scraping with lxml and Python

Why should you even bother learning how to web scrape? If your job doesn't require you to learn it, then let me give you some motivation. What if you …

Baby steps to learning browser automation and web scraping 5

Xpath is a query language that is used to select XML and HTML elements. In practical terms, it’s a form of language that makes it possible to trace …

Javascript: Arrays, For-Loops and Functions

I have this working code but am not sure how to create a proper loop.<p>Looking for a way to create a function where one mousesovers an #id in a list …

Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers

An unidentified hacker group appears to have accidentally exposed two fully-working zero-days when they've uploaded a weaponized PDF file to a public …

10 ways to make yourself a more attractive human being

There are two basic paths to becoming more attractive.<p>Become a better human being (internal)<br>• Become a better looking human being (external)<p>Here are a …

Why doesn't Python have a built-in LinkedList datastructure? [on hold]

Python already has several datastructures built-in in its library, including lists, tuples, sets, dictionaries (which do not even require an import), …

Severe Bug Discovered in Signal Messaging App for Windows and Linux

Security researchers have discovered a severe vulnerability in the popular end-to-end encrypted Signal messaging app for Windows and Linux desktops …

What is Perl? How relevant it is and how to get started!

To begin with, we need to understand that Perl is not a programming language by itself, but rather a group of programming languages which are …

Python Essential Reference, 4th Edition

Description<p>Copyright 2010<br>• Pages: 744<br>• Edition: 4th<p><b>eBook (Watermarked)</b><br>• ISBN-10: 0-321-77072-2<br>• ISBN-13: 978-0-321-77072-1<p><i>Python Essential Reference</i> is the …

Authenticated Data Structures, Generically

Derive inclusion and membership proofs for arbitrary sum-of-product datatypes in Haskell using GHC.Generics.<p>Authenticated data structures (ADS) allow …

SQL Injection 101: How to Fingerprint Databases & Perform General Reconnaissance for a More Successful Attack

Know thy enemy — wise words that can be applied to many different situations, including database hacking. It is essential to performing adequate …

New A.I. application can write its own code

Computer scientists have created a deep-learning, software-coding application that can help human programmers navigate the growing multitude of …

Artificial Intelligence

An introduction to Python bytecode

If you've ever written, or even just used, Python, you're probably used to seeing Python source code files; they have names ending in .py. And you …

The Computer in the Basement: Learning to Code, Then and Now

2017-03-21T08:00:00-04:002017-03-21T11:35:48-04:00tag:theatlantic.com,2017:50-519795How “engagement” made the web a less engaging place<p>There are people who stand every morning outside the Carroll Street station in Brooklyn staring dead-eyed into the middle distance. They stand still in ones and …

​How safe is your air-gapped PC? Attackers can now suck data out via power lines

You'll now need to monitor the power cables connecting to isolated computers holding sensitive information.<p><i>Video: Air-gapped data is holy grail for</i> …

Two Years of Functional Programming in JavaScript: Lessons Learned

The article is not about learning FP principles or JavaScript FP libraries. There are numerous of good articles on this topic out there. The article …

Thousands of hacked websites are infecting visitors with malware

Unusually advanced campaign infects people visiting a variety of poorly secured sites.<p>Thousands of hacked websites have become unwitting participants …

How to implement 2D isometric view in Unity

Our <b>Pushy & Pully</b> game has some isometric view in place. If you still don’t know the game let me show you an screenshot:<p>As you can see the view is …

Game Development