Peg Solitaire
A program that solves the peg solitaire game finding the best possible solution. It is written in C. Input files and source code are found in the attachment. [Source]
This post explains how PuTTy SSH Tunneling can be easily used to bypass firewall rules blocking ports. Let’s say that we have the following setup where only communication via port 22 is allowed between two hosts: Step 1: Open profile and load server’s profile Step 2: Navigate to Connection->SSH->Tunnels and add new port as the…
Before we start Warning 1: This procedure is taken at your own risk as it may result in a bricked phone. Warning 2: After unlocking the bootloader of your device, ALL data will be wiped. This procedure may also work for other Nexus devices. I personally tried it on my Galaxy Nexus GSM 4.1.1 yakjuxw…
Searching for Android MIPS applications for Ainol Novo can prove to be frustrating, especially if you are looking for something specific like Skype, YouTube or Facebook. I have gathered a list of applications from various websites that claim to work with Ainol Novo 7 Basic tablet. Unfortunately mine did not arrive yet, shipping from China…
Build a proxy server in C using threads and sockets. Every server can have up to two connections on the proxy. Client requests must be satisfied. New servers must be added to a list/array upon a request and must be removed if no request comes within 10 seconds. [Source]
Center for research in molecular medicine patient samples of University of Cyprus. This system works locally where it was build. Of course all patient details were removed for security reasons. [Source] [Preview]
A common error that you can come across while updating your WordPress plugins is the one in the screenshot where WordPress is requesting to provide the Connection Credentials in order to be able to update. For me personally this happened when I moved my websites to a new server and the permissions of the files…