-
Recent
- Command Line Fu: surveillance with Raspberry Pi
- Let gooby do teh hoemwerk: Riemann zeta at two
- Mathematical insult gone awry
- How to get a job with 70 lines of code
- Quick tip: Veracrypt on a Raspberry Pi 2 [update: Veracrypt 1.18]
- Java bean differences
- Pade approximants: a case study (iii)
- Pade approximants: a case study (ii)
- Pade approximants: a case study (i)
- Setting up i2p running in a docker container
- Apache commons-collections vulnerability – try it at home
- Movember ’15
- Let gooby do teh hoemwerk: Green function of the two-dimensional Laplace operator
- Let gooby do teh hoemwerk: Baker-Campbell-Hausdorff identities
- Mocking Spring Data repositories
- Job application title page
- Let gooby do teh hoemwerk: Sokhatsky-Weierstrass identity
- Let gooby do teh hoemwerk: Riemann zeta at minus one
- TLS/SSL certificate exchange in Java
- Quick tip: Veracrypt on a Raspberry Pi 2
- Who am I?
- Guess who?
- How to get a job with 250 lines of code
- Joke’s on me I guess
- Random Java objects for testing
- My conky config
- Quick tip: changing the userbase directory in Mathematica (Linux)
- Create your own Sudoku book
- The RC4 stream cipher
- Life hack: attaching a ferro rod to the Mora plastic sheath
- The Fappening
- A hash function primer II: CRC
- A hash function primer I: SHA-1
- Creating a password list for WPA/WPA2 dictionary attacks
- Ulam’s spiral in Mathematica
- Block mode of operation: why ECB is bad
- AES in Mathematica
- Strong passwords from /dev/random
Archive
- January 2017
- November 2016
- October 2016
- September 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- July 2014
- June 2014
Advertisements