The Art of Code - Dylan Beattie


Software and technology has changed every aspect of the world we live in. At one extreme are the ‘mission critical’ applications — the code that runs our banks, our hospitals, our airports and phone networks. Then there’s the code we all use every day to browse the web, watch movies, create spreadsheets… not quite so critical, but still code that solves problems and delivers services.

But what about the code that only exists because somebody wanted to write it? Code created just to make people smile, laugh, maybe even dance? Maybe even code that does nothing at all, created just to see if it was possible?

Join Dylan Beattie — programmer, musician, and creator of the Rockstar programming language — for an entertaining look at the art of code. We’ll look at the origins of programming as an art form, from Conways Game of Life to the 1970s demoscene and the earliest Obfuscated C competitions. We’ll talk about esoteric languages and quines — how DO you create a program that prints its own source code? We’ll look at quine relays, code golf and generative art, and we’ll explore the phenomenon of live coding as performance — from the pioneers of electronic music to modern algoraves and live coding platforms like Sonic Pi.

Check out more of our talks, courses, and conferences in the following links:
ndcconferences.com/
ndc-london.com/

Metasploit For Beginners - #1 - The Basics - Modules, Exploits


Hey, guys HackerSploit here, back again with another video. In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Our Courses:
Python For Ethical Hacking — Develop Your Own Scripts: www.udemy.com/course/the-complete-python-3-developer-course/?couponCode=TCP3DC2019

The Complete Ethical Hacking Bootcamp: www.udemy.com/course/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019

I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog.

HackerSploit Blog: hsploit.com/

✔️SOCIAL NETWORKS
— Facebook: www.facebook.com/HackerSploit/
Twitter: twitter.com/HackerSploit
Patreon: patreon.com/hackersploit
— Thanks for watching!
Благодаря за гледането
感谢您观看
Merci davoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
देखने के लिए धन्यवाद

How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous


How to setup Proxychains in Kali Linux to stay anonymous while hacking. Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
proxychains — a tool that forces any TCP connection made by any given application. to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: «user/pass» for SOCKS4/5, «basic» for HTTP. proxyresolv — DNS resolving. Used to resolve host names via proxy or TOR.

Links:
Kali Linux: www.google.com/url?sa=t

CSI LINUX - монстр для пробива. Операционная система OSINT разведки.


Все ссылки в Telegram:
t.me/black_triangle_tg/662
=====

«Спасти мир» и поддержать канал можно тутЬ:
DonationAlerts: www.donationalerts.com/r/black_triangl
Boosty: boosty.to/black_triangle
Анонимно криптовалютами: notabug.org/Black_Triangle/safe_world

=====
t.me/aliexpress_hacker — хакерское с AliExpress
t.me/komp_ali — компьютерное барахло с Ali
t.me/hi_anon — личный блог
t.me/open_source_friend — интересный софт
www.youtube.com/channel/UCYf_gVlTuMFodRQDsxUdAYg
=====
#OSINT #CSI_LINUX #Черный_треугольник
=====
Автор музыки из видео: «Стереополина» lnk.to/stereopolina

Анонимность Tor — миф и реальность


0x1.tv/20161028BI

Анонимность Tor — миф и реальность (Александр Лазаренко, SECR-2016)
* Александр Лазаренко

— В докладе будут рассмотрены механизмы обеспечения пользовательской приватности в сети Tor, а так же, методы деанонимизации, созданные с целью компрометирования пользователей.

Доклад рассчитан на аудиторию, интересующуюся технологиями обеспечения приватности и просто любопытных людей, которые хотят послушать про интересные штуки, которые доступны в сети.

Проблемы загрузки, установки Tails OS, Qubes OS, GNU/Linux...


В случае с Tails, если у вас графическая карта geforce, вам может помочь внесение:
nouveau.modeset=0
или
nouveau.noaccel=1
Если у вас карта от Radeon:
radeon.modeset=0
Для Qubes OS:
nouveau.modeset=0 rd.driver.blacklist=nouveau video=vesa:off
Ссылки
intel managment engine: ru.wikipedia.org/wiki/Intel_Management_Engine
youtu.be/Tiohs-bvEZw SunbooK
youtu.be/GhRyWFUeuzE Свободные альтернативы БИОС/UEFI
youtu.be/z8vgdn_6DgE Настройка GNU/Linux Debian и утилита для оптимизации энергозатрат графическими картами
6:52