CONCURRENT PROGRAMMING

1. Concurrency. Introduction

2. Concurrency. Race Conditions

3. Concurrency. Mutex and Futex

4. Concurrency. Condition Variables

5. Concurrency. Tools

 

SECURITY

PoCrypt. A Proof Of Concept For Dynamically Decrypting Linux Binaries

GNU/Linux Crypters. Crafting Binaries

Understanding SYN Scan

 

MY KNOWLEDGE THEORY

The Perfect Knowledge Transfer Equation

Knowledge Equivalence

Smart Manuals

 

HARDWARE

Hardware Hacking Box. HELP

Hardware Hacking Box. Serial Access to Routers

SUP DeMO. November 2016

Building Portable Devices

Quick and Dirty Raspberry Pi Spy Cam

Measuring RpiCam Bandwidth Performance

Real-time Bandwidth Monitoring

Having Fun with your Home Router

BeagleBoard I2C. Interfacing to the WiiChuck

BeagleBone Black and Watterott display

 

GNU/Linux

Four Unorthodox Ways to Transfer Files

Multimedia 101. Feel the Source

Create a Secure Storage for your Precious Data

Home file Server with your Preferred SBC!

Remote Support with screen

GNU/Linux Distro Transplantation

Two More Unorthodox ways to transfer files

 

ANDROID

Add a Remote Shell to your Android App

Awesome Android eXtreme Hacking. Part I

Awesome Android eXtreme Hacking. Part II (Sensors)

Awesome Android eXtreme Hacking. Part II. More sensors

Awesome Android eXtreme Hacking. Part III. What a Shell!

Awesome Android eXtreme Hacking. Part IV. GNU/Linux on your Pocket

Android Development for Web Programmers

 

PROGRAMMING

How to get the ESSID of the Wifi network you are connected to?

How to use tee and splice

Using a parameter to iterate a loop

 

REFLEXIONS

Privacy Future Threads. The Subconscious E-Mirror

Augmented Perception. Circunventing the Augmented Reality Metonymy

 

PERSONAL PROJECTS

Introducing Nyx. Basic Networking API

NetKitty. Updated Tutorial

MIA NOIR/1

Pervasive Widgets. Introducing the HERMITs

HERMITs: Detecting user activity

 

Tu publicidad aquĆ­ :)