Found 10267 bookmarks
Newest
On The Turing Completeness of PowerPoint (SIGBOVIK)
On The Turing Completeness of PowerPoint (SIGBOVIK)
Video highlighting my research on PowerPoint Turing Machines for CMU's SIGBOVIK 2017Read the paper:http://tomwildenhain.com/PowerPointTM/Paper.pdfDownload th...
On The Turing Completeness of PowerPoint (SIGBOVIK)
Hidden Features of C++?
Hidden Features of C++?
No C++ love when it comes to the "hidden features of" line of questions? Figured I would throw it out there. What are some of the hidden features of C++?
Hidden Features of C++?
PHP: a fractal of bad design
PHP: a fractal of bad design
(This article has been translated into Spanish (PDF, with some additions) by Jorge Amado Soria Ramirez — t
PHP: a fractal of bad design
I Built a COMPUTER in Magic: The Gathering
I Built a COMPUTER in Magic: The Gathering
Magic: The Gathering is famously complicated, but did you know it is complicated enough to make a computer inside of? Witness a world first in this week’s ep...
I Built a COMPUTER in Magic: The Gathering
What is /usr/bin/[?
What is /usr/bin/[?
I was just poking around in /usr/bin and I found an ELF binary file called [. /usr/bin/[. I have never heard of this file and my first thought was that it was a clever way of hiding a program, poss...
What is /usr/bin/[?
Can TrueType Fonts contain malicious code?
Can TrueType Fonts contain malicious code?
I was looking around for information on this and couldn't really find anything that solid. I used the TTX tool in the fonttools library to decompile the font into XML format but couldn't garner any...
Can TrueType Fonts contain malicious code?