Miroslav Vitula , the author of the book Learning zANTI2 for Android Pentesting , penned this article on Connecting to Open Ports , focusing on cracking passwords and setting up a remote desktop connection. Let's delve into the topics.
In this article by Özen Özkaya and Giray Yıllıkçı , author of the book Arduino Computer Vision Programming , you will learn how to approach computer vision applications, how to divide an application development process into basic steps, how to realize these design steps and how to combine a vision system with the Arduino. Now it is time to connect all the pieces into one! In this article you will learn about building a vision-assisted robot which can go to any point you want within the boundaries of the camera's sight. In this scenario there will be a camera attached to the ceiling and, once you get the video stream from the robot and click on any place in the view, the robot will go there. This application will give you an all-in-one development application.
In this article by Artemij Fedosejev , the author of React.js Essentials , we will take a look at test suites, specs, and expectations.
In this article written by Michael Shepard , author of the book Getting Started with PowerShell , the author goes on to explain that if you don't have PowerShell installed or want a more recent version of PowerShell, you'll need to find the Windows Management Framework ( WMF ) download that matches the PowerShell version you want. WMF includes PowerShell as well as other related tools such as Windows Remoting ( WinRM ), Windows Management Instrumentation ( WMI ), and Desired State Configuration ( DSC ). The contents of the distribution change from version to version, so make sure to read the release notes included in the download
In this article by Giancarlo Zaccone , the author of the book Python Parallel Programming Cookbook , we will cover the following topics: Introducing Asyncio GPU programming with Python Introducing PyCUDA Introducing PyOpenCL
In this article by Paul F. Johnson , author of the book Cross-platform UI Development with Xamarin.Forms , we'll look at how to add a custom renderer for Windows Phone in particular.
In this article by Calin Rada , the author of the book Learning Phalcon PHP , we will go through a few of the ORM CRUD operations (update, and delete) and database transactions
In this article written by James Cook , author of the book LibGDX Game Development By Example , the author likes to state that, "Creating games is fun, and that is why I like to do it". The process of having an idea for a game to actually delivering it has changed over the years. Back in the 1980s, it was quite common that the top games around were created by either a single person or a very small team. However, anyone who is lucky enough (in my opinion) to see games grow from being quite a simplistic affair to the complex beast that the now AAA titles are, must have also seen the resources needed for these grow with them. The advent of mobile gaming reduced the barrier for entry; once again, the smaller teams could produce a game that could be a worldwide hit! Now, there are games of all genres and complexities available across major gaming platforms. Due to this explosion in the number of games being made, new general-purpose game-making tools appeared in the community. Previously, the in-house teams built and maintained very specific game engines for their games; however, this would have led to a lot of reinventing the wheel. I hate to think how much time I would have lost if for each of my games, I had to start from scratch. Now, instead of worrying about how to display a 2D image on the screen, I can focus on creating that fun player experience I have in my head. My tool of choice? LibGDX .
In the past years, many types of attacks on the WEP protocol have been undertaken. Being successful with such an attack is an important milestone for anyone who wants to undertake penetration tests of wireless networks. In this article by Marco Alamanni , the author of Kali Linux Wireless Penetration Testing Essentials , we will take a look at the basics and the most common types of WEP protocols.
The strange relationship between objects, functions, generators and coroutines by Dusty Phillips In this article, I’d like to investigate some relationships between functions, objects, generators and coroutines in Python. At a theoretical level, these are very different concepts, but because of Python’s dynamic nature, many of them can appear to be used interchangeably. I discuss useful applications of all of these in my book, Python 3 Object-oriented Programming - Second Edition . In this essay, we’ll examine their relationship in a more whimsical light; most of the code examples below are ridiculous and should not be attempted in a production setting!