|
You are here |
dfan.org | ||
| | | | |
blog.codinghorror.com
|
|
| | | | | a blog by Jeff Atwood on programming and human factors | |
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
trendless.tech
|
|
| | | | | Computer coding has a relatively long history compared to most other computer-based things. While Charles Babbage created the difference machine in the 1820s, Ada Lovelace was the first "programmer". Machine/Assembly Coding At its core, programming could be machine code: just a bunch of 0s and 1s. But, that's tiresome, and hard to read, so they [...]Read More... from Code Basics: How Do Coders Code? | |
| | | | |
standardcrypto.wordpress.com
|
|
| | | rehttps://vitalik.ca/general/2022/11/19/proof_of_solvency.html ("Having a safe CEX: proof of solvency and beyond")discussed at https://news.ycombinator.com/item?id=33689411 "Plasma and validiums: can we make CEXes non-custodial?" This section. What a crock of garbled bullshit. This objective is impossible by definition. Sure, if somehow the CEX doesn't hold dollars but some gnarly blockchain asset maybe there is some way. Vitalik Buterin has... | ||