The hands-on approach to computer security. Learn how hackers break in, and how to keep them out.
tutorial reference howto web security programming tutorials hack challenge challengesSet of tourism posters for planets from Star Wars.
design inspiration art posters for:pack.groupPython module to process html and xml trees.
tools software reference webdev web programming python scripting tool html screenscrapingComparison of power company pricing.
power consumer comparisonSet of examples for using mechanize to load urls, submit forms and process pages.
howto programming automation python mechanize screenscraping examples tutorialSecurity exploits and vulnerabilities.
reference windows security hacks programming code exploits vulnerabilitiesCapture images from iSight and other sources from the command line.
software mac free osx commandline opensource appleSimplenote API example using python.
programming tutorial python simplenoteQuick 2 liner to clear the default text out of a form field.
javascript programming tips tutorial webdev tumblrThese twenty video lectures by Hal Abelson and Gerald Jay Sussman are a complete presentation of the course, given in July 1986 for Hewlett-Packard employees, and professionally produced by Hewlett-Packard Television. The videos have been used extensively in corporate training at Hewlett-Packard and other companies, as well as at several universities and in MIT short courses for industry.
tutorial video programming tutorials development science computer tumblrComputer security videos, including videos of defcon talks.
tutorial video security hacks network programming tutorials networking hacking technology rumblr