Explore >> Select a destination


You are here

nagekar.com
| | iosoft.blog
1.6 parsecs away

Travel
| | So far I have used a large number of custom functions to configure and control the WiFi networking, but before adding yet more functionality, I need to offer a simpler (and more standard) way of doing all this programming. When it comes to network programming on Linux or Windows systems, there is only one widely-used...
| | vcansimplify.wordpress.com
1.7 parsecs away

Travel
| | Following my previous post here , I'll get to the programming part.But before that a few concepts that are important. Client Server Model Anytime two devices want to connect through a TCP/IP socket , one of them has to be a client and the other has to be a server. As an example your computer...
| | www.skitoy.com
0.9 parsecs away

Travel
| | Looking at event IO frameworks and found some really good comments about the "ev" library, the challenge is that I would rather work in C++ than pure C - I like ...
| | goggleheadedhacker.com
18.7 parsecs away

Travel
| This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.