Wednesday 22 July 2015

Best we sites to learn programming

----- * Ada * -----
http://www.adahome.com/Tutorials/Lovelace/
master.htm
http://www.adahome.com/Ammo/Cplpl2Ada.html
http://www.computer-books.us/ada95.php
http://goanna.cs.rmit.edu.au/~dale/ada/aln.html
http://www.freeprogrammingresources.com/
adatutr.html
http://en.wikibooks.org/wiki/Ada_Programming
http://libre.adacore.com/
----- * Assembly * -----
http://101.lv/learn/asm/index.htm
http://www.youtube.com/watch?v=K0g-twyhmQ4
----- * Awk * -----
http://www.grymoire.com/Unix/Awk.html
----- * Bash * -----
http://www.freeos.com/guides/lsst/
http://tldp.org/LDP/abs/html/index.html
----- * C#/Mono * -----
http://csharp-station.com/Tutorial/CSharp/
----- * C/C++/C++11 * -----
Tutorials:
http://www.cplusplus.com/doc/tutorial/
http://thenewboston.org/list.php?cat=16
http://www.cprogramming.com/tutorial.html
http://www.iu.hio.no/~mark/CTutorial/
CTutorial.html
http://c.learncodethehardway.org/book/
Reference :
http://en.cppreference.com/w/
http://cppannotations.sourceforge.net/c
++annotations/html/
http://www.mindview.net/Books/TICPP/
ThinkingInCPP2e.html/
http://www.open-std.org/jtc1/sc22/wg21/docs/
papers/2011/n3242.pdf
http://cpp-next.com/
http://en.wikipedia.org/wiki/C%2B%2B11
FAQ:
http://www.parashift.com/c++-faq/
http://www2.research.att.com/~bs/C
++0xFAQ.html (redirects to http://
www.stroustrup.com/ )
Book Recommendations:
http://stackoverflow.com/questions/388242/the-
definitive-c-book-guide-and-list
http://cboard.cprogramming.com/cplusplus-
programming/74078-cplusplus-book-
recommendations.html
http://hackershelf.com/browse/
Interesting articles:
http://www.dreamincode.net/forums/
topic/264061-c11-fun-with-functions/
http://www.developerfusion.com/article/133063/
constructors-in-c11/
http://cpp-next.com/archive/2009/08/want-
speed-pass-by-value/
http://www.informit.com/articles/article.aspx?
p=1914190
http://www.drdobbs.com/cpp/c11-
uniqueptr/240002708
http://blog.pureabstract.org/2012/06/09/
choosing-an-stl-sequence-container/
----- * D * -----
http://en.wikipedia.org/wiki/D_
(programming_language)
http://dlang.org/
----- * Delphi * -----
http://101.lv/learn/delphi/
http://sheepdogguides.com/dt100/
dt100index.htm
http://sheepdogguides.com/tut.htm
http://www.delphi-central.com/tutorials/
http://delphi.about.com/od/database/a/
databasecourse.htm
----- * GTK+ * -----
http://www.gtk.org/
http://learngtk.org/
----- * Haskell * -----
http://learnyouahaskell.com/chapters
http://book.realworldhaskell.org/read/
----- * Java * -----
http://www.javavideotutes.com/lessons
http://docs.oracle.com/javase/tutorial/java/
index.html
----- * Lisp * -----
http://nostoc.stanford.edu/jeff/llisp/index.html
----- * Lua * -----
http://lua.gts-stolberg.de/en/index.php?uml=1
http://www.phailed.me/2011/02/learn-lua-the-
hard-way-1/
----- * Objective-C * -----
http://cocoadevcentral.com/d/learn_objectivec/
http://mobile.tutsplus.com/tutorials/iphone/
learn-objective-c-day-1/
https://developer.apple.com/library/mac/
#documentation/Cocoa/Conceptual/ObjectiveC/
Introduction/introObjectiveC.html#//apple_ref/
doc/uid/TP30001163
----- * Pascal * -----
http://www.taoyue.com/tutorials/pascal
http://www.pascal-programming.info/
lessonindex.html
----- * Perl * -----
http://www.perl.org/books/beginning-perl/
----- * Python * -----
http://learnpythonthehardway.org/book/
http://docs.python.org/tutorial/
http://www.awaretek.com/tutorials.html
http://www.sthurlow.com/python/
----- * Qt * -----
http://qt.nokia.com/learning
http://sector.ynet.sk/qt4-tutorial/
----- * Regex * -----
http://regex.learncodethehardway.org/book/
----- * Ruby * -----
http://ruby.learncodethehardway.org/book/
http://tryruby.org
http://koans.heroku.com/
----- * SQL * -----
http://sql.learncodethehardway.org/book/
----- * Tcl/Tk * -----
http://www.bin-co.com/tcl/tutorial/contents.php
----- * VB.NET/Mono * -----
http://www.homeandlearn.co.uk/net/vbnet.html

World’s 20 most expensive domains

This summary is not available. Please click here to view the post.

My thoughts

In this new world .technology must emulated since in every aspect of life and the many fields-engineering,medicine,education,transport etc all depend on technology .
Robots work efficiently and fast .technology agencies and the world large should follow suit etc

Saturday 18 July 2015

Sunday 16 November 2014

Promiscuous mode

In computer networking, promiscuous mode or
promisc mode is a mode for a wired network
interface controller (NIC) or wireless network
interface controller (WNIC) that causes the
controller to pass all traffic it receives to the
central processing unit (CPU) rather than
passing only the frames that the controller is
intended to receive. This mode is normally used
for packet sniffing that takes place on a router
or on a computer connected to a hub (instead
of a switch) or one being part of a WLAN.
Interfaces are placed into promiscuous mode by
software bridges often used with hardware
virtualization.
In IEEE 802 networks such as Ethernet, token
ring, and IEEE 802.11, and in FDDI, each frame
includes a destination Media Access Control
address (MAC address). In non-promiscuous
mode, when a NIC receives a frame, it normally
drops it unless the frame is addressed to that
NIC's MAC address or is a broadcast or
multicast frame. In promiscuous mode,
however, the card allows all frames through,
thus allowing the computer to read frames
intended for other machines or network devices.
Many operating systems require superuser
privileges to enable promiscuous mode. A non-
routing node in promiscuous mode can
generally only monitor traffic to and from other
nodes within the same broadcast domain (for
Ethernet and IEEE 802.11) or ring (for token
ring or FDDI). Computers attached to the same
network hub satisfy this requirement, which is
why network switches are used to combat
malicious use of promiscuous mode. A router
may monitor all traffic that it routes.
Promiscuous mode is often used to diagnose
network connectivity issues. There are programs
that make use of this feature to show the user
all the data being transferred over the network.
Some protocols like FTP and Telnet transfer data
and passwords in clear text, without encryption,
and network scanners can see this data.
Therefore, computer users are encouraged to
stay away from insecure protocols like telnet
and use more secure ones such as SSH.