Explore
Curator's Pick
Login
Sign up
stem
hive-130906
stemsocial
neoxian
archon
nature
natureobserver
waivio
insect
waiv
science
palnet
ecency
ctp
flower
proofofbrain
discovery-it
cent
amazingnature
technology
photos
hive-111030
physics
math
chessbrothers
education
vyb
calculus
scifimultiverse
hive-128780
hive-engine
scifiverse
hive-196387
vectors
geogebra
hive
programming
steemstem
conspiracy
deepdives
#programming
Trending Posts
@scipio
0
about 16 hours ago
StemSocial
Learn Zig Series (#43) - Key-Value Store: Client Library and Benchmarks
Learn Zig Series (#43) - Key-Value Store: Client Library and Benchmarks Project B: Key-Value Store (4/4) What will I learn You will learn building a client library that wraps our binary
@scipio
0
about 2 hours ago
StemSocial
Learn AI Series (#62) - Prompt Engineering - Getting the Most from LLMs
Learn AI Series (#62) - Prompt Engineering - Getting the Most from LLMs What will I learn You will learn zero-shot, few-shot, and many-shot prompting strategies; chain-of-tho
@scipio
0
2 days ago
StemSocial
Learn Ethical Hacking (#23) - Client-Side Attacks - Beyond XSS
Learn Ethical Hacking (#23) - Client-Side Attacks - Beyond XSS What will I learn Clickjacking : tricking users into clicking hidden elements through invisible iframes; **Open re
@scipio
0
3 days ago
StemSocial
Learn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn't
Learn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn't What will I learn Why business logic flaws are the hardest vulnerabilities to find
@scipio
0
1 day ago
StemSocial
Learn Zig Series (#42) - Key-Value Store: TCP Server
Learn Zig Series (#42) - Key-Value Store: TCP Server Project B: Key-Value Store (3/4) What will I learn You will learn designing a simple binary protocol for get/put/delete commands;
@scipio
0
7 days ago
StemSocial
Learn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray Themselves
Learn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray Themselves What will I learn What SSRF is and why it's one of the most dangerous modern web vuln
@scipio
0
3 days ago
StemSocial
Learn Zig Series (#41) - Key-Value Store: Write-Ahead Log
Learn Zig Series (#41) - Key-Value Store: Write-Ahead Log Project B: Key-Value Store (2/4) What will I learn You will learn what a write-ahead log (WAL) is and why databases use it; Y
@scipio
0
5 days ago
StemSocial
Learn Zig Series (#39) - Markdown to HTML: Renderer and CLI
Learn Zig Series (#39) - Markdown to HTML: Renderer and CLI Project A: Markdown to HTML Converter (3/3) What will I learn You will learn walking the AST to emit HTML tags; You will le
@scipio
0
about 22 hours ago
StemSocial
Learn Ethical Hacking (#24) - Content Management Systems - Hacking WordPress and Friends
Learn Ethical Hacking (#24) - Content Management Systems - Hacking WordPress and Friends What will I learn Why CMS platforms (WordPress, Joomla, Drupal) are prime targets for att
@scipio
0
4 days ago
StemSocial
Learn Zig Series (#40) - Key-Value Store: In-Memory Store
Learn Zig Series (#40) - Key-Value Store: In-Memory Store Project B: Key-Value Store (1/4) What will I learn You will learn designing the key-value store API: get, put, delete, list;
Menu
Explore
Curator's Pick
Trade
Trade STEM
Swap