dranaxum.wordpress.com
dranaxum | A software developer's blogA software developer's blog
http://dranaxum.wordpress.com/
A software developer's blog
http://dranaxum.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Saturday
LOAD TIME
0.2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
11
SSL
EXTERNAL LINKS
18
SITE IP
192.0.78.13
LOAD TIME
0.17 sec
SCORE
6.2
dranaxum | A software developer's blog | dranaxum.wordpress.com Reviews
https://dranaxum.wordpress.com
A software developer's blog
About | dranaxum
https://dranaxum.wordpress.com/about
A software developer's blog. In time people change their hobbies, their interests, but I think that their purpose in life is the only one which remains the same. Two years ago, when I started this blog I wouldn’t have thought that I will change my interests so much. Thus, for the time being my current ones are: maths, algorithmics, cryptography and software development. Now, it’s time I say Hi! Hopefully, what I publish here will come in-handy for most of you! Tony Belanger / Apr 19 2009 1:55 pm. You are...
Dynamic load .NET dll files (Creating a plug-in system) – C# | dranaxum
https://dranaxum.wordpress.com/2008/02/25/dynamic-load-net-dll-files-creating-a-plug-in-system-c
A software developer's blog. February 25, 2008 / dranaxum. Dynamic load .NET dll files (Creating a plug-in system) – C#. Finally I found some spare time to write an article on my (this) blog. In the last days I needed to write a plug-in system for one of my projects. I managed to write it in C# and decided to share it on my blog. It’s really simple to create as you will see:. This is a C# Console Application Project. The code was written with .NET Framework 2.0. Using System.Reflection;. If you have 2 pa...
Further details on TOI | dranaxum
https://dranaxum.wordpress.com/2009/06/21/further-details-on-toi
A software developer's blog. June 21, 2009 / dranaxum. Further details on TOI. There is much chance that the launch of TOI (aka Training for Olympiad in Informatics see main article here. Will be postponed for Tuesday or Wednesday if we don’t finish the articles I considered to be vital. However, we are trying hard to launch it tomorrow. Anyhow, I guarantee it will be worth the wait! Larr; Training for Olympiad in Informatics. FM Radio Player →. Leave a Reply Cancel reply. Enter your comment here. Traini...
dranaxum | A software developer's blog | Page 2
https://dranaxum.wordpress.com/page/2
A software developer's blog. January 23, 2009 / dranaxum. Braincode: Personalized Mass Mailer. As I promised, I am keeping you in touch with Braincode. We created a new section (Brainshare) where we will put our work which does not have the same level of complexity as the work in the Products section. The first program posted here, which I developed by the way, is named Personalized Mass Mailer and it’s built in C#. Here is the description:. Does all of this and more. Note: Add a ;. 8230; it’s here!
filter in Haskell vs filterING in C# | dranaxum
https://dranaxum.wordpress.com/2010/11/20/filter-in-haskell-vs-filtering-in-c
A software developer's blog. November 20, 2010 / dranaxum. Filter in Haskell vs filterING in C#. If you are both a Haskell and C# programmer then you should be familiar to the filter function in Haskell and the filtering functions in C# (Find,FindAll etc). Example of filter in Haskell. The same code which does the exact same thing in C# would look like this. List int findAllOddElements(List int a) { return a.FindAll( delegate(int elem) { return elem%2= 1; }); }. Hence filter is defined like this:. FindAl...
TOTAL PAGES IN THIS WEBSITE
11
online (in) security: movies about botnets
http://dekinfo.blogspot.com/2009/11/movies-about-botnets.html
The road to excellence in the field of security. Joi, 5 noiembrie 2009. Great videos from SecuManiaOrg. Botnets PART 1 : building a botnet (1/2). Botnets PART 1 : building a botnet (2/2). Abonați-vă la: Postare comentarii (Atom). Core Defense Mechanisms - Handling User Access. Lecture 9 [video]: Security, Continued. Anatomy of a Botnet. Information security in web 2.0 era. US, Coalition Strikes Continue Against ISIL in Iraq, Syria. Acum 20 de ore. The Microsoft Security Response Center (MSRC).
online (in) security: Lecture 9 [video]: Security, Continued
http://dekinfo.blogspot.com/2009/11/lecture-9-video-security-continued.html
The road to excellence in the field of security. Miercuri, 11 noiembrie 2009. Lecture 9 [video]: Security, Continued. Watch this at Boston.com. CNN is - ". It's Court charges the committee that - here now. Residents spent a lot of time discussing the bill that sparked the senator's comments it's called the net neutrality act. Fairly complex bit of legislation. Generated discussion at our resident expert John hodgman Johnson.". Spam You know. That.". You were required to remember that's - exam.". Got 6506...
online (in) security: information security in web 2.0 era
http://dekinfo.blogspot.com/2009/11/information-security-in-web-20-era.html
The road to excellence in the field of security. Marți, 3 noiembrie 2009. Information security in web 2.0 era. Catalin Cosoi - Senior researcher, Antispam laboratory, BitDefender www.bitdefender.com Cont twitter - BitDefender - http:/ twitter.com/BitDefenderLabs - MalwareCity - http:/ twitter.com/MalwareCity Blog despre securitate: http:/ www.malwarecity.com. Abonați-vă la: Postare comentarii (Atom). Core Defense Mechanisms - Handling User Access. Lecture 9 [video]: Security, Continued. Acum 20 de ore.
online (in) security: noiembrie 2009
http://dekinfo.blogspot.com/2009_11_01_archive.html
The road to excellence in the field of security. Luni, 16 noiembrie 2009. Core Defense Mechanisms - Handling User Access. The fundamental security problem with web applications —that all user. Input is untrusted—gives rise to a number of security mechanisms that applications. Use to defend themselves against attack. Virtually all applications. Employ mechanisms that are conceptually similar, although the details of the. Design and the effectiveness of the implementation differ very widely indeed. The aut...
online (in) security: Core Defense Mechanisms - Handling User Access
http://dekinfo.blogspot.com/2009/11/core-defense-mechanisms-handling-user.html
The road to excellence in the field of security. Luni, 16 noiembrie 2009. Core Defense Mechanisms - Handling User Access. The fundamental security problem with web applications —that all user. Input is untrusted—gives rise to a number of security mechanisms that applications. Use to defend themselves against attack. Virtually all applications. Employ mechanisms that are conceptually similar, although the details of the. Design and the effectiveness of the implementation differ very widely indeed. The aut...
online (in) security: octombrie 2009
http://dekinfo.blogspot.com/2009_10_01_archive.html
The road to excellence in the field of security. Duminică, 25 octombrie 2009. From Wikipedia, the free encyclopedia*. Is a cryptographic, smartcard-based conditional access television encryption system that scrambles analogue pay-TV signals. It was introduced in 1989 by News Datacom and was used initially by Sky TV and subsequently by several other broadcasters on the SES Astra satellites at 19.2° east. Sky NZ and Sky Fiji may use different versions of the VideoCrypt standard. The system scrambles the pi...
online (in) security: iunie 2009
http://dekinfo.blogspot.com/2009_06_01_archive.html
The road to excellence in the field of security. Duminică, 7 iunie 2009. The first step in information gathering. Is the technique of gathering information about computer systems and the entities they belong to. This is done by employing various computer security techniques, as:. Point of contact queries. The amount of information that is readily available about you, your organization, its. Employees, and anything else you can image is nothing short of amazing. 8226; Company web pages. Geographical and p...
online (in) security: aprilie 2009
http://dekinfo.blogspot.com/2009_04_01_archive.html
The road to excellence in the field of security. Luni, 6 aprilie 2009. More books on security. Many security related books you will find on http:/ professionalstudents.blogspot.com. Sâmbătă, 4 aprilie 2009. Spammers and Harvesters Find New Ways to Exploit Flaw. 160;has analyzed the uses of the latest Adobe PDF exploit, first discovered on November 4, 2008. 1 Backdoor.Poisonivy.GK. 2 Trojan.Spammer.Tedroo.BA. 160;which transforms an infected machine into a spamming computer. On November 6, two days after ...
online (in) security: Anatomy of a Botnet
http://dekinfo.blogspot.com/2009/11/anatomy-of-botnet.html
The road to excellence in the field of security. Marți, 3 noiembrie 2009. Anatomy of a Botnet. Command and control are essential steps tin maintaining an operational botnet, but at the same time, they are the weakest link of the system. Once the communication is interrupted, the computer is out of the reach of the botnet. Command and Control Models. More and more Internet service providers fight malware. By limiting access to specific ports. In order to prevent e-mail abuse, some ISPs block port 25, ...
TOTAL LINKS TO THIS WEBSITE
18
Anatole Ruslanov, PhD - Algorithm Analysis, High Performance Computing, Automated Performance Tuning, Computer Architecture, Performance Analysis and Benchmarking
Anatole D. Ruslanov, PhD. Research, Analysis, Teaching. Performance Analysis and Benchmarking.
Dra. Natura
Salud, belleza y bienestar natural. Consejos de la fisioterapeuta. El labio leporino y el paladar hendido. 14 agosto, 2015. El labio leporino y el paladar hendido son unas aberturas o grietas que aparecen en el labio superior, en el techo de la boca (paladar) o en ambos. Estas afecciones tienen lugar cuando las estructuras faciales que se están desarrollando en el bebé nonato no se cierran completamente. El labio leporino y el paladar hendido pueden aparecer como:. Dificultad para alimentarse y tragar.
Dra. Naturaleza
Que es el Própolis o Propóleo? Sobre Nosaltres / Sobre Nosotros. La Menopausia y la Piel. En esta entrada os hablaremos de los cambios que produce la Menopausia. De las mujeres y os daremos algunos consejos para paliar sus efectos negativos. Constituye una etapa de transición fisiológica en las mujeres, producto del agotamiento de óvulos. La reducción del número de óvulos genera un desequilibrio en los niveles de hormonas circulantes y de la disminución progresiva de estrógenos y progestágenos. Entren 8 ...
D'Ranau Film - Home
Search by typing and pressing enter. Production House and Creative Agency. Jl Kramat 2 no.36A. 8203;pin bbm 75097234. Create a free website.
Dranaxel's blog - Blog de Dranaxel - Skyrock.com
More options ▼. Subscribe to my blog. Created: 20/02/2017 at 5:02 AM. Updated: 20/02/2017 at 11:28 AM. This blog has no articles. Subscribe to my blog! Post to my blog. Here you are free.
dranaxum | A software developer's blog
A software developer's blog. January 22, 2011 / dranaxum. Given a planar weighted graph in a metric space (X,d), does the ordering of the areas of the faces preserve (i.e. remains the same) for any continuous mapping f:(X,d)- (Y,d’) where (Y,d’) is some metric space? November 20, 2010 / dranaxum. Filter in Haskell vs filterING in C#. If you are both a Haskell and C# programmer then you should be familiar to the filter function in Haskell and the filtering functions in C# (Find,FindAll etc). List int find...
Account Suspended
This Account has been suspended. Contact your hosting provider for more information.
Dra. Nayara Pataro Fagundes
Dra Nayara Pataro Fagundes. Dicas de saúde, informações e curiosidades sobre seus amigos de Pata Fofa! CLIQUE AQUI - www.patafofa.com.br. Seu cão ou gato está precisando de atendimento veterinário? Atestado de saúde para viagens;. Entre Patas e Pelos. Rua Ministro Orozimbo Nonato 215, loja 14 - Vila da Serra - Nova Lima. Belo Horizonte (Belvedere e Santa Lúcia) &. Nova Lima (Condomínios, Vila da Serra e Vale do Sereno). Atendimento veterinário personalizado para o seu melhor amigo! Adotar é tudo de bom!
..:: DRA. NAYDELI GARCIA | Laparoscopia Avanzada ::..
Cirugía para la Obesidad - Laparoscopia Avanzada - Cirugía Ginecológica Laparoscopica. Cirugia de Puertos Reducidos - Bariatrica - Ginecológica y Vías Digestivas. La cirugía laparoscópica para la obesidad es para personas cuyo sobrepeso es severo. En la laparoscopía se usa un telescopio (laparoscopio) especializado a fin de visualizar el estómago, lo cual típicamente permite que se hagan incisiones abdominales más pequeñas. Cirugía Mínima invasión en Cáncer Ginecológico.
..:: DRA. NAYDELI GARCIA | Laparoscopia Avanzada ::..
Cirugía para la Obesidad - Laparoscopia Avanzada - Cirugía Ginecológica Laparoscopica. Cirugia de Puertos Reducidos - Bariatrica - Ginecológica y Vías Digestivas. La cirugía laparoscópica para la obesidad es para personas cuyo sobrepeso es severo. En la laparoscopía se usa un telescopio (laparoscopio) especializado a fin de visualizar el estómago, lo cual típicamente permite que se hagan incisiones abdominales más pequeñas. Cirugía Mínima invasión en Cáncer Ginecológico.