imageHere are seven tools that can significantly simplify the life of a web developer, coder or designer.






1. Wordmark.it

image

This is a tool for selecting fonts. Wordmark.it allows you to see how a sentence looks like with all the fonts installed on the computer. It downloads quickly and has convenient filters. Unfortunately, there is no way to set the background color and letters.
Killer 3 september 2012, 12:25

This article describes the advanced OpenSSH features, which can greatly simplify the lives of system administrators and programmers who would like to use Secure SHell. Unlike most manuals, which explain only keys and L/D/R options, I tried to gather all the interesting features, which SSH has to offer.

Warning: The article is very long, but I have decided not to cut it into the pieces.

Table of contents:

  • Key management
  • Copying files over SSH
  • Stream forwarding of I/O
  • Mounting a remote FS using SSH
  • Remote code execution
  • Aliases and options for connections to .ssh / config
  • Default options
  • X-server forwarding
  • SSH as a socks-proxy
  • Port forwarding - direct and reverse
  • Reverse socks-proxy
  • Tunneling L2/L3 traffic
  • Authorization agent forwarding
  • SSH through SSH tunnel
  • Untrusted server
Siera 29 august 2012, 13:09

To be honest, I don't know what the TPP project is intended for. As far as I understand, this is a set of tools to assist in research of proteins and their interaction in living organisms. However, that's not so much important. What is important is that their source codes are open. It means that I can check them with the PVS-Studio static analyzer. Which I'm very much fond of.
So, we have checked the Trans-Proteomic Pipeline (TPP) version 4.5.2 project. To learn more about the project, see the following links:
Andrey2008 21 august 2012, 8:40

image

Today, I am going to talk about how you can hide the “spare" assembler commands in the regular code. This method is useful for complexity of disassembling the code, especially if the generation of "hidden" commands to automate. Tools: debugger - OllyDbg.
KlauS 2 august 2012, 11:11

Today, I would like to talk about Firefox add-ons for the web development that can extend the browser’s core functionality, because I believe that these add-ons are very important for any web developer and web designer.

Many of these add-ons you already know!

Let's start with the most popular and powerful a wed development tool:

1. Firebug

image
MeLavi 26 july 2012, 16:43

image

How great and wonderful is the world of information technology! Every week I read all kinds of the news that out there is one billion of Web pages that each group of kindergarten has its own website and we run out of IP addresses! Free iPads are given out to the students and all African children have $ 100 laptops. In general, this information is overwhelming! Thanks to Wikipedia we will not look like a fool on the forums and the social networks.
Today we can work and have fun online. Internet allowed a young boy from Siberian village to work on the Large Hadron Collider, and thousands of talented people have opened their gifts thanks to YouTube. Is not it great?
BumBum 18 july 2012, 15:44

image
Recently, many cloud storages were opened, hence there comes the question: What kind of cloud storages do we have and where we can store our files?
So I have done some search and made a list of such storages:

Baidu, Bitcasa, Box.net, Dropbox, Google Drive, Microsoft SkyDrive, SpiderOak, Wuala.

At the end of the article I put a comparison table.
Skull 27 june 2012, 16:00

It is known that any system reliability is determined by its weakest link. Now we take a good look at the protection from copying of one popular toy that was released a few days ago for OS X and the way of its bypass. In addition, we just look at one of the options for implementing the protection from copying. Of course, this research was conducted in the study purposes, and you still should buy the good software and games.

Step 1


Let’s run the game and see the registration form or purchase. The registration is done online by entering a serial number, or manually by entering a name and the key in accordance with the displayed identifier of a specific computer. Next, we run gdb and get program exited with code 055.
ZimerMan 23 june 2012, 11:54

I think most people who have a device-based on Android OS heard about the secret codes.
There are some very powerful codes, for example one of the codes on my Samsung Galaxy Tab allows me to set up the GPS, which speeds up the search of satellites, the other code allows me to set up the mode connection with the network (GPRS, EDGE, 3G ...) that allows saving the battery between mode jumps in places with unstable connection.
I am going to talk in this article about the device analysis of running applications on the codes in Android OS, and how to find all the codes and applications, and as well I will explain how to make an application that will respond to its code.
In addition, I will give 6 pictures, some code and lots of text.
xially 20 june 2012, 14:50

imageLong ago, when I was a naive schoolboy, I suddenly felt curious. What is a magical way that data takes up less space in an archive? I started surfing the Internet in order to find an answer. So I found many interesting articles with fairly detailed information on this topic. But all of them did not seem to me easy, the code listings were very difficult to understand.
KlauS 17 june 2012, 12:11
... 4 5 6 7 8 9 10 11 12 ...