ah101 (51)in #story • 6 years agoHow I (almost) got scammed!I was just browsing through the newest #introduceyourself post, as I like to support (as much as I can, with 0.01$…ah101 (51)in #life • 6 years agoSummer - Yay!It's been a long time since my last activity on this platform, but I had to do other things.... Lots of tests to…ah101 (51)in #life • 7 years agoHow I helped my brother win a trip; my first real world vulnerabilityI always practiced hacking and programming, but it was either a 100% vulnerable application somewhere, or it was…ah101 (51)in #utopian-io • 7 years agoFingerprint Authentication [Password Manager]The Project This is a follow up to my last post, about the Fingerprint Authentication framework. This project is…ah101 (51)in #utopian-io • 7 years agoFingerprint Authentication [Password Manager]What's this project? So about a week ago I made a post of my fingerprint authentication application. This is the…ah101 (51)in #utopian-io • 7 years agoFingerprint Authentication [Introduction]Fingerprint Authentication This project uses the fingerprint sensor on android phones and networking magic to…ah101 (51)in #utopian-io • 7 years agoFingerprint Authentication [Introduction]Fingerprint Authentication This project uses the fingerprint sensor on android phones and networking magic to…ah101 (51)in #programming • 7 years agoA Google Doodle About Programming! (+ Solutions)So recently I found doodle created on 2017 december 4, about programming. Well it's kids coding, but I thought it…ah101 (51)in #programming • 7 years agoSolving Bugs - My approachWhen I can, I always write code, so I had and solved a lot of bugs. Basically I want to share a basic pattern with you…ah101 (51)in #programming • 7 years agoMy Favourite Shortcuts - Visual Studio 2017I've been using Visual Studio since I started programming. At first I used a lot my mouse to scroll, select, copy…ah101 (51)in #utopian-io • 7 years agoUAC Bypassing UtilityUAC Bypassing Utility This is a project used in my R.A.T Client to bypass the UAC. It bypasses the UAC using a fake…ah101 (51)in #technology • 7 years agoDNS: The hearth of our InternetWe depend on DNS, when we use Internet services, like social media, email, videos, streams or play games we use DNS.…ah101 (51)in #technology • 7 years agoSSH - The secure way to remotely control linuxSSH is a well known and widely used protocol on linux server machines. It's basically a remote command shell to the…ah101 (51)in #blog • 7 years agoMy first week on steemit - thoughtsSo my first week on steemit passed, and here are my thoughts about steem. 1. It's good Steemit is just good. I've…ah101 (51)in #technology • 7 years agoThe forgotten protocol: TCPMUXPorts are really important in networking. Basically ports provide multiple connections to the same machine, 1 IP…ah101 (51)in #technology • 7 years agoBash Job ControlorJob control is a really useful part of bash. You can suspend and resum processes with it without breaking them. So…ah101 (51)in #technology • 7 years agoSetting up FTP on linux with SSLSo you need to get files from your computer to your server, securely and easy. FTP is the solution in this case, but…ah101 (51)in #technology • 7 years agoThe firewall of Linux: IPTablesIf you own a Linux server, you know how important securing it is. A server is available to the whole world, when it's…ah101 (51)in #bitcoin • 7 years agoBitcoin & TaxesI was just viewing news articles on my phone when this got my attention. Basically in the US bitcoin is considered as…ah101 (51)in #blog • 7 years agoRecent Tinder Vulnerability!The attack Recently a Tel-Aviv based security firm: Checkmarx , discovered a vulnerability in the popular app…