| | So you want to be a consultant? (unixwiz.net) |
| 4 points by Tomte 3 months ago | past |
| | An illustrated guide to the Kaminsky DNS vulnerability (2008) (unixwiz.net) |
| 25 points by amidtheperf 4 months ago | past | 6 comments |
| | How to read C type declarations (2003) (unixwiz.net) |
| 152 points by aragonite on May 17, 2024 | past | 131 comments |
| | So you want to be a consultant? (2005) (unixwiz.net) |
| 1 point by Tomte on Feb 17, 2024 | past |
| | So you want to be a consultant? (2005) (unixwiz.net) |
| 185 points by lobo_tuerto on Aug 20, 2022 | past | 42 comments |
| | So you want to be a consultant? (unixwiz.net) |
| 1 point by doppp on June 1, 2022 | past | 1 comment |
| | Reading C Type Declarations (unixwiz.net) |
| 2 points by mrccc on April 7, 2021 | past |
| | Using Win32 calling conventions (unixwiz.net) |
| 2 points by gjvc on Dec 19, 2019 | past |
| | An Illustrated Guide to SSH Agent Forwarding (unixwiz.net) |
| 14 points by nunodio on June 25, 2018 | past | 1 comment |
| | Intel X86 Function-Call Conventions – Assembly View (unixwiz.net) |
| 1 point by ingve on April 19, 2017 | past |
| | Reading C type declarations (unixwiz.net) |
| 2 points by olalonde on Jan 20, 2017 | past |
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
| 4 points by bane on Jan 30, 2016 | past |
| | Chroot – Best practices (2002) (unixwiz.net) |
| 20 points by larsvegas_ on Nov 29, 2015 | past | 1 comment |
| | An Illustrated Guide to the Kaminsky DNS Vulnerability (2008) (unixwiz.net) |
| 3 points by caffeinewriter on Oct 19, 2014 | past |
| | SQL Injection Attacks by Example (unixwiz.net) |
| 1 point by matm on March 28, 2014 | past |
| | SQL Injection Attacks by Example (unixwiz.net) |
| 1 point by hhenn on Jan 2, 2014 | past |
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
| 3 points by ColinWright on Aug 5, 2013 | past |
| | An Illustrated Guide to SSH Forwarding (unixwiz.net) |
| 2 points by danielrm26 on Oct 11, 2012 | past |
| | An Illustrated Guide to IPsec (unixwiz.net) |
| 1 point by zhiping on July 3, 2012 | past |
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
| 2 points by ___Calv_Dee___ on April 6, 2012 | past |
| | An Illustrated Guide to SSH Forwarding (unixwiz.net) |
| 2 points by danielrm26 on Jan 17, 2012 | past |
| | An Illustrated Guide to Cryptographic Hashes (unixwiz.net) |
| 75 points by danielrm26 on Nov 28, 2011 | past | 11 comments |
| | So you want to be a software engineering consultant? (unixwiz.net) |
| 14 points by DiabloD3 on Nov 24, 2011 | past |
| | Why work 8 hrs/day for someone else when you can work 16 hrs/day for yourself? (unixwiz.net) |
| 3 points by shawndumas on Aug 22, 2011 | past |
| | An Illustrated Guide to IPSEC (unixwiz.net) |
| 2 points by danielrm26 on Aug 22, 2011 | past |
| | SQL Injection by Example (unixwiz.net) |
| 3 points by danielrm26 on May 20, 2011 | past |
| | SQL Injection Attacks by Example (unixwiz.net) |
| 2 points by kevinskii on March 17, 2011 | past |
| | An Illustrated Guide to SSH Agent Forwarding (unixwiz.net) |
| 57 points by adambyrtek on Sept 18, 2010 | past | 8 comments |
| | How to Succeed as a Consultant (unixwiz.net) |
| 137 points by danielrm26 on June 14, 2010 | past | 27 comments |
| | "No Dashes Or Spaces" Hall of Shame (unixwiz.net) |
| 72 points by vijaydev on March 19, 2010 | past | 62 comments |
|
|
| More |