Quantcast
Channel: C – thoughts…
Browsing all 98 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Building a BitTorrent client from scratch in C#

BitTorrent is a protocol for peer-to-peer file sharing. It allows users to directly share files with each other across the internet without any central server acting as a middleman. In order to do...

View Article


Image may be NSFW.
Clik here to view.

Appending to a File from Multiple Processes

Suppose you have multiple processes appending output to the same file without explicit synchronization. These processes might be working in parallel on different parts of the same problem, or these...

View Article


Image may be NSFW.
Clik here to view.

An Introduction to Crystal: Fast as C, Slick as Ruby

So I’m gonna ask you a question: “Have you ever dreamed of a programming language as beautiful as Ruby but as fast as C?” To be honest, I’ve always dreamed of something like that and wondered why it...

View Article

Image may be NSFW.
Clik here to view.

MemDig: a memory cheat tool

MemDig allows the user to manipulate the memory of another process, primary for the purposes of cheating. There have been many tools like this before, but this one is a scriptable command line program....

View Article

Image may be NSFW.
Clik here to view.

How to Read and Write Other Process Memory

I recently put together a little game memory cheat tool called MemDig. It can find the address of a particular game value (score, lives, gold, etc.) after being given that value at different points in...

View Article


Image may be NSFW.
Clik here to view.

Owl Lisp – A purely functional Scheme that compiles to C

Owl Lisp is a functional dialect of the Scheme programming language. It is mainly based on the applicative subset of the R7RS standard. You should have make and gcc or clang installed....

View Article

Image may be NSFW.
Clik here to view.

Python by the C side

All the world is legacy code, and there is always another, lower layer to peel away. These realities cause developers around the world to go on regular pilgrimage, from the terra firma of Python to the...

View Article

Image may be NSFW.
Clik here to view.

Redis Modules: an introduction to the API

The modules documentation is composed of the following files: INTRO.md (this file). An overview about Redis Modules system and API. It’s a good idea to start your reading here. API.md is generated from...

View Article


Image may be NSFW.
Clik here to view.

Hack The Kernel

ops-class.org includes slides, hundreds of hours of videotaped lectures, and sample exams: everything you need to learn OS concepts online at your own pace.  

View Article


Image may be NSFW.
Clik here to view.

C for Python programmers

C for Python programmers by Carl Burch is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. Based on a work at www.toves.org/books/cpy/

View Article

Image may be NSFW.
Clik here to view.

Tutorial – Write a System Call

A while back, I wrote about writing a shell in C, a task which lets you peek under the covers of a tool you use daily. Underneath even a simple shell are many operating system calls, like read, fork,...

View Article

Image may be NSFW.
Clik here to view.

Lupa

Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. It is a partial rewrite of LunaticPython in Cython with some additional features such as proper coroutine support....

View Article

Image may be NSFW.
Clik here to view.

Basics of Making a Rootkit: From syscall to hook!

WARNING: This tutorial is for educational purposes only, and by NO MEANS should you actually be malicious when (or after) making a rootkit. I thought I’d share how to do this for any security minded...

View Article


Image may be NSFW.
Clik here to view.

Top 10 algorithms in Interview Questions

In this post “Top 10 coding problems of important  topics with their solutions ” are written. If you are preparing for a coding interview, going through these problems is a must. Topics : 1. Graph 2....

View Article

Image may be NSFW.
Clik here to view.

Goroutines, Nonblocking I/O, And Memory Usage

I am generally a fan of Go’s approach to concurrency: writing code with goroutines is a lot easier than writing traditional nonblocking network servers in a language like C or C++. However, while...

View Article


Image may be NSFW.
Clik here to view.

Give me 15 minutes & I’ll change your view of GDB

View Article

Image may be NSFW.
Clik here to view.

Efficient Counter that uses a limited (bounded) amount of memory regardless...

Bounter is a Python library, written in C, for extremely fast probabilistic counting of item frequencies in massive datasets, using only a small fixed memory footprint. Why Bounter? Bounter lets you...

View Article


Rewriting m4vgalib in Rust

If you are a C or C++ programmer somehow still on the fence about whether or not you should take #rustlang seriously, consider this piece from Cliff Biffle an absolute must-read:...

View Article
Browsing all 98 articles
Browse latest View live