| | How to read C type declarations (2003) (unixwiz.net) |
|
152 points by aragonite 6 months ago | past | 131 comments
|
| | So you want to be a consultant? (2005) (unixwiz.net) |
|
1 point by Tomte 9 months ago | past
|
| | So you want to be a consultant? (2005) (unixwiz.net) |
|
185 points by lobo_tuerto on Aug 20, 2022 | past | 42 comments
|
| | So you want to be a consultant? (unixwiz.net) |
|
1 point by doppp on June 1, 2022 | past | 1 comment
|
| | Reading C Type Declarations (unixwiz.net) |
|
2 points by mrccc on April 7, 2021 | past
|
| | Using Win32 calling conventions (unixwiz.net) |
|
2 points by gjvc on Dec 19, 2019 | past
|
| | An Illustrated Guide to SSH Agent Forwarding (unixwiz.net) |
|
14 points by nunodio on June 25, 2018 | past | 1 comment
|
| | Intel X86 Function-Call Conventions – Assembly View (unixwiz.net) |
|
1 point by ingve on April 19, 2017 | past
|
| | Reading C type declarations (unixwiz.net) |
|
2 points by olalonde on Jan 20, 2017 | past
|
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
|
4 points by bane on Jan 30, 2016 | past
|
| | Chroot – Best practices (2002) (unixwiz.net) |
|
20 points by larsvegas_ on Nov 29, 2015 | past | 1 comment
|
| | An Illustrated Guide to the Kaminsky DNS Vulnerability (2008) (unixwiz.net) |
|
3 points by caffeinewriter on Oct 19, 2014 | past
|
| | SQL Injection Attacks by Example (unixwiz.net) |
|
1 point by matm on March 28, 2014 | past
|
| | SQL Injection Attacks by Example (unixwiz.net) |
|
1 point by hhenn on Jan 2, 2014 | past
|
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
|
3 points by ColinWright on Aug 5, 2013 | past
|
| | An Illustrated Guide to SSH Forwarding (unixwiz.net) |
|
2 points by danielrm26 on Oct 11, 2012 | past
|
| | An Illustrated Guide to IPsec (unixwiz.net) |
|
1 point by zhiping on July 3, 2012 | past
|
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
|
2 points by ___Calv_Dee___ on April 6, 2012 | past
|
| | An Illustrated Guide to SSH Forwarding (unixwiz.net) |
|
2 points by danielrm26 on Jan 17, 2012 | past
|
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
|
75 points by danielrm26 on Nov 28, 2011 | past | 11 comments
|
| | So you want to be a software engineering consultant? (unixwiz.net) |
|
14 points by DiabloD3 on Nov 24, 2011 | past
|
| | Why work 8 hrs/day for someone else when you can work 16 hrs/day for yourself? (unixwiz.net) |
|
3 points by shawndumas on Aug 22, 2011 | past
|
| | An Illustrated Guide to IPSEC (unixwiz.net) |
|
2 points by danielrm26 on Aug 22, 2011 | past
|
| | SQL Injection by Example (unixwiz.net) |
|
3 points by danielrm26 on May 20, 2011 | past
|
| | SQL Injection Attacks by Example (unixwiz.net) |
|
2 points by kevinskii on March 17, 2011 | past
|
| | An Illustrated Guide to SSH Agent Forwarding (unixwiz.net) |
|
57 points by adambyrtek on Sept 18, 2010 | past | 8 comments
|
| | How to Succeed as a Consultant (unixwiz.net) |
|
137 points by danielrm26 on June 14, 2010 | past | 27 comments
|
| | "No Dashes Or Spaces" Hall of Shame (unixwiz.net) |
|
72 points by vijaydev on March 19, 2010 | past | 62 comments
|
| | So you want to be a consultant...? (unixwiz.net) |
|
3 points by budu on Feb 16, 2010 | past
|
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
|
1 point by mace on July 30, 2009 | past
|
|
|
More |