Explore >> Select a destination


You are here

dfan.org
| | blog.codinghorror.com
4.1 parsecs away

Travel
| | a blog by Jeff Atwood on programming and human factors
| | michaelneuper.com
32.1 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | trendless.tech
17.6 parsecs away

Travel
| | Computer coding has a relatively long history compared to most other computer-based things. While Charles Babbage created the difference machine in the 1820s, Ada Lovelace was the first "programmer". Machine/Assembly Coding At its core, programming could be machine code: just a bunch of 0s and 1s. But, that's tiresome, and hard to read, so they [...]Read More... from Code Basics: How Do Coders Code?
| | standardcrypto.wordpress.com
45.1 parsecs away

Travel
| rehttps://vitalik.ca/general/2022/11/19/proof_of_solvency.html ("Having a safe CEX: proof of solvency and beyond")discussed at https://news.ycombinator.com/item?id=33689411 "Plasma and validiums: can we make CEXes non-custodial?" This section. What a crock of garbled bullshit. This objective is impossible by definition. Sure, if somehow the CEX doesn't hold dollars but some gnarly blockchain asset maybe there is some way. Vitalik Buterin has...