Another list of projects on what to practice

“The master makes more mistakes than the novice tries” 3r-3280. 3r33333.  
3r33333.  
The last 3r310. list of training projects
scored 50k readings and 600 favorites. Here is another list of interesting projects for practice, for those who want supplements. 3r33333.  
3r33333.  
[h3] 1. A text editor 3r33286. 3r33333.  
Another list of projects on what to practice 3r33333.  
3r33333.  
The purpose of a text editor is to reduce the efforts of users trying to convert their formatting as valid HTML markup. A good text editor allows users to format text in different ways. 3r33333.  
3r33333.  
At some point, everyone used a text editor. So why not ...[/h]
+ 0 -

Unprivileged Linux users with UID> INT_MAX can execute any command.

Sit down, I have news that shocks you now
 
 
In Linux operating systems, there is an overt vulnerability that allows a user with low privileges to execute any systemctl command (and even become root - translator’s comment) if its UID is greater than 2147483647.
 
 
Unprivileged Linux users with UID> INT_MAX can execute any command.
 
proof-of-concept (PoC) to successfully demonstrate a vulnerability that requires a user with a UID of ?00?00?000. 3r3127.  
 
Red Hat recommends that system administrators not allow any negative UID or UID greater than 2147483646 to mitigate the problem before the patch is released.
 
 
[h3] Several methods of operation from the translator ...[/h]
+ 0 -

Three-dimensional engine on Excel formulas for dummies

 3r31824. 3r3-31. Three-dimensional engine on Excel formulas for dummies
3r31811.  3r31824. [h1] What turned out 3r3393911. 3r31811.  3r31824. 3r31734.  3r31824. 3r31744. A file with a cube and a torus 3r31800.  3r31824. 3r31744. File with a kettle 3r31800.  3r31824. 3r31744. 3r3342. ObservableHQ laptop with its Excel-file generator
3r31800.  3r31824.
3r31811.  3r31824. In Excel files at the top, you can change the following cells: 3r31811.  3r31824. 3r31811.  3r31824. 3r31734.  3r31824. 3r31744. 3r31746. alpha: 3r31747. horizontal camera rotation in degrees, 3r3-31800.  3r31824. 3r31744. 3r31746. beta: 3r31747. vertical rotation of the camera in ...[/h]
+ 0 -

You need more different Blur-s

 3r33865. 3r3-31. Blur the image through the filter Gaussian Blur is widely used in a variety of tasks. But sometimes you want a little more variety than just one filter for all occasions, in which only one parameter can be adjusted - its size. In this article, we will look at several other blur implementations. 3r33850.  3r33865. 3r33850.  3r33865.
You need more different Blur-s 3r33847. : 3r33850.  3r33865. 3r33850.  3r33865. 3r3334. 3r33847. : 3r33850.  3r33865. 3r33850.  3r33865. 3r340. 3r33850.  3r33865. 3r33850.  3r33865. Here for each pair of coordinates
3r33847. the distance to the ...
+ 0 -

What I don't like in C and C ++

What I don't like in C and C ++ 3r33300. 3r3-31. Please do not read professional C /C ++ programmers).
 3r33300.
 3r33300. In the article, I express my point of view, if you disagree - justify in the comments.
 3r33300. The purpose of this article is to point out the shortcomings of C and C ++, which I really dislike and encourage you to use the new version of the language or maybe even offer some ideas for improving the standard.
 3r33300.
 3r33300. Well, it's time to rekindle the holivar.
 3r33300. 3r314. 3r3188.
 3r33300. I think everyone knows that it’s awesome strings in C ++. Especially if we are talking about the old ...
+ 0 -

Vulnerability in API Google+ revealed private data of 52.5 million users

In October, on channel Information leaks , I wrote about the fact that Google discovered in their social network Google+ a potential data leak of 500 thousand users. 3r330.
 
3r311. 3r330.
 
And Google today said that they discovered another vulnerability in the Google+ API API that could lead to data leakage of 52.5 million users. 3r330.
 
The vulnerability existed for 6 days in November 2018 and allowed applications to retrieve information from user profiles (name, email address, gender, date of birth, age, etc.), even if this data was private. In addition, through the profile of ...
+ 0 -

China banned Apple

The Chinese chip maker Qualcomm claims to have won an injunction against Apple, which effectively prohibits the import of a number of iPhone models, from iPhone 6S to iPhone X.
 3r3365. 3r3355.  3r3365. The preliminary order issued by the Chinese court is the final step in the ongoing feud between the two technical giants over intellectual property. 3r3355.  3r3365. 3r3355.  3r3365. China banned Apple 3r3355.  3r3365. 3r3355.  3r3365. Original news . 3r366. 3r3365. 3r3365. 3r3365. 3r3633. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf ...[/o]
+ 0 -

Controller, easy! We take out the code in UIView

 3r???. 3r3-31. Do you have a big UIViewController? For many, yes. On the one hand, it works with data, on the other - with the interface. 3r3499.  3r???. 3r3499.  3r???. The tasks of separating logic from an interface are described in hundreds of articles about architecture: MVP, MVVM, VIPER. They solve the problem of data flow, but do not answer the question of how to work with the interface: in one place remains the creation of elements, layout, configuration, input processing and animation. 3r3499.  3r???. 3r3499.  3r???. Let's separate the view from the controller and see what loadView () ...
+ 0 -

Roadmap of math disciplines for machine learning, part1

Instead of the preface.


 
Suppose, sitting in the evening in a warm chair, you suddenly had a crazy thought: “Hmm, why don't I find out instead of random selection of hyperparameters of the model, and why it all works?” 3r33232.  
stepik.org/course/716
 
stepik.org/course/711
 
I did not look at the courses from the lecture hall of the Moscow Institute of Physics and Technology for analysis, but for the sake of completeness I will also give: 3r33275  
lectoriy.mipt.ru/course/Maths-Basic_Analysis
 
...[/h]
+ 0 -

PVS-Studio: support for MISRA C and MISRA C ++ coding standards

3r3154. PVS-Studio: support for MISRA C and MISRA C ++ coding standards
 
Starting from version 6.2? the PVS-Studio static code analyzer can classify its warnings according to the MISRA C and MISRA C ++ standards. Thanks to the support of these standards, it has become possible to effectively use the analyzer to improve the security, portability and reliability of programs for embedded systems.
 
3r311.
 
This year we took care of the support in the analyzer 3r315. PVS-Studio
standards like r3r317. CWE
and SEI CERT . Basically, support has been reduced to the classification ...
+ 0 -