June 2005
May 2005
April 2005
March 2005
February 2005
June 2004
BlueTooth Hacking: Step by Step Guide - May 14, 2004
by crazybaudBlueTooth Hacking: Step by Step Guide
The Ten Rules of Performance
by crazybaudRule #6: 90% of performance problems are designed in, not coded in
Joel on Software - The Guerrilla Guide to Interviewing
by crazybaud & 1 otherThe Guerrilla Guide to Interviewing
Networking on the Network
by crazybaud & 2 othersNetworking on the Network, A Guide to Professional Skills for PhD Students
The 25 most difficult questions
by crazybaud & 32 othersThe 25 most difficult questions you'll be asked on a job interview
Attack Trees
by crazybaudAttack trees provide a formal methodology for analyzing the security of systems and subsystems