Austen

192 Flips | 10 Magazines | 1 Like | 2 Following | 225 Followers | @austen2fresh | Keep up with Austen on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Austen”

28 Powerful Open Source CSS Frameworks & Libraries

Web Developers who work smart are often building on top of pre-existing frameworks. Open source CSS libraries are not hard to find – including many …

Simple Guide to Finding a JavaScript Memory Leak in Node.js

Share this:<p>Table of Contents<p>Something you might want to bookmark: Simple Guide to Finding a JavaScript Memory Leak in Node.js by @akras14 …

Useful extensions for Front-End Developers and Designers

Google Chrome is one of the best browsers available online and has been the dominant browser on the internet since November 2011 when it overtook …

Google Chrome

Universal React

Jack Franklin darns the holes left in our applications by exploring how our client-side JavaScript frameworks might also be run on the server to …

JavaScript

FCC Facing Identity Crisis Over Net Neutrality Challenge

More than the future of AT&T, Comcast and the next Google are at stake after a federal court today heard the telecom industry’s challenge to the Federal Communications Commission’s sweeping “network neutrality” rules.<p>The agency’s regulatory reach also is on the chopping block. The commission …

Lazy, composable, and modular JavaScript

ECMAScript 6, or the 6th edition of ECMA-262 standard, gives JavaScript developers new tools for writing more succinct and modular code. In this …

naetech.com

Swift Programming 101: Advanced Collections

<i>Swift's advanced collections can help you model more complex objects in your apps and create an API that is easier to understand and use. In this post, I model a chessboard using Swift's subscripts and also cover tuples and multidimensional arrays!</i><p>What are Tuples, and Why Should I Use Them?<p>Swift's …

Parse

We’d like to take a moment to say thank you to everyone in the community and beyond. It’s been a great year and we couldn’t be providing all that is …

WiFi software Acrylic WiFi Free v2.1 - WiFi analyzer software and WLAN scanner for network analysts

Acrylic WiFi Professional is the best <b>WiFi analyzer</b> software to <b>identify access points and wifi channels, and to analyze and resolve incidences</b> on …

The Fastest Way To Crack A 4-Digit PIN Number [Infographic]

Good ol' 1234 accounts for about 10 percent of passwords. That's more than the bottom 4,200 combinations put together.<p>We know people default to bad passwords, whether for their computers or banking PINs. But, we have to stress this here, people are <i>really</i> bad at picking passwords. This infographic …

Six Great DIY Projects for Hacking Computers and Networks

If you're testing your hacking skills or trying to learn more about security, your toolkit shouldn't end with your computer. If you're willing to …

Challenge 12: Decrypting SSL Traffic | WAP Challenges

Task 6: Capture All Clicks | Javascript for Pentesters

Task 14: Fetching Data with XMLHttpRequest | Javascript for Pentesters

Task 3: Hijack Form Submit | Javascript for Pentesters

How I reverse-engineered Google Docs to play back any document's keystrokes

If you’ve ever typed anything into a Google Doc, you can now play it back as if it were a movie — like traveling through time to look over your own …

Google Docs

How We Decoded Some Nasty Multi-Level Encoded Malware

From time to time, we come up with interesting bits of malware that are just calling us to decode and learn more about them. This is one of those …

Module 1: Bit-Shifting Operations | x86_64 Assembly Language and Shellcoding on Linux

Decoding Domain Generation Algorithms (DGAs) - Part I

Part 1 - Unpacking the binary to properly view it in IDA Pro<p>Recently, I came across an executable(MD5: 3D5060066056369B3449606F3E87F777) that was …

Decoding Domain Generation Algorithms (DGAs) Part II - Catching ZeusBot Injection into Explorer.exe

Last week, I talked about unpacking this binary for static analysis. This week, I am going to talk about catching its injected entry point inside …

Finding malicious DLLs with Volatility

Unknown<p>/<p>10:37 AM<p>/<p>Colin and I were working on an memory image the other day and needed to find DLLs loaded by svchost.exe. We turned to everyone's …

Anatomy of a Program in Memory

Memory management is the heart of operating systems; it is crucial for both programming and system administration. In the next few posts I’ll cover …

Cybersecurity