• Explore
  • Curator's Pick
  • Login
  • Sign up
stem hive-130906 stemsocial neoxian archon nature natureobserver waivio insect waiv science palnet ecency ctp flower proofofbrain discovery-it cent amazingnature technology photos hive-111030 physics math chessbrothers education vyb calculus scifimultiverse hive-128780 hive-engine scifiverse hive-196387 vectors geogebra hive programming steemstem conspiracy deepdives

#programming

avatar
@scipio 0
about 16 hours ago
StemSocial
Learn Zig Series (#43) - Key-Value Store: Client Library and Benchmarks Learn Zig Series (#43) - Key-Value Store: Client Library and Benchmarks Project B: Key-Value Store (4/4) What will I learn You will learn building a client library that wraps our binary
25
0
0
240.354 STEM
avatar
@scipio 0
about 2 hours ago
StemSocial
Learn AI Series (#62) - Prompt Engineering - Getting the Most from LLMs Learn AI Series (#62) - Prompt Engineering - Getting the Most from LLMs What will I learn You will learn zero-shot, few-shot, and many-shot prompting strategies; chain-of-tho
27
0
0
181.538 STEM
avatar
@scipio 0
2 days ago
StemSocial
Learn Ethical Hacking (#23) - Client-Side Attacks - Beyond XSS Learn Ethical Hacking (#23) - Client-Side Attacks - Beyond XSS What will I learn Clickjacking : tricking users into clicking hidden elements through invisible iframes; **Open re
17
0
0
27.933 STEM
avatar
@scipio 0
3 days ago
StemSocial
Learn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn't Learn Ethical Hacking (#22) - Business Logic Flaws - When the Code Works But the Logic Doesn't What will I learn Why business logic flaws are the hardest vulnerabilities to find
446
0
2
42.230 STEM
avatar
@scipio 0
1 day ago
StemSocial
Learn Zig Series (#42) - Key-Value Store: TCP Server Learn Zig Series (#42) - Key-Value Store: TCP Server Project B: Key-Value Store (3/4) What will I learn You will learn designing a simple binary protocol for get/put/delete commands;
14
0
0
24.309 STEM
avatar
@scipio 0
7 days ago
StemSocial
Learn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray Themselves Learn Ethical Hacking (#18) - Server-Side Request Forgery - Making Servers Betray Themselves What will I learn What SSRF is and why it's one of the most dangerous modern web vuln
22
0
0
226.322 STEM
avatar
@scipio 0
3 days ago
StemSocial
Learn Zig Series (#41) - Key-Value Store: Write-Ahead Log Learn Zig Series (#41) - Key-Value Store: Write-Ahead Log Project B: Key-Value Store (2/4) What will I learn You will learn what a write-ahead log (WAL) is and why databases use it; Y
16
0
0
26.955 STEM
avatar
@scipio 0
5 days ago
StemSocial
Learn Zig Series (#39) - Markdown to HTML: Renderer and CLI Learn Zig Series (#39) - Markdown to HTML: Renderer and CLI Project A: Markdown to HTML Converter (3/3) What will I learn You will learn walking the AST to emit HTML tags; You will le
433
0
1
64.911 STEM
avatar
@scipio 0
about 22 hours ago
StemSocial
Learn Ethical Hacking (#24) - Content Management Systems - Hacking WordPress and Friends Learn Ethical Hacking (#24) - Content Management Systems - Hacking WordPress and Friends What will I learn Why CMS platforms (WordPress, Joomla, Drupal) are prime targets for att
461
0
1
10.173 STEM
avatar
@scipio 0
4 days ago
StemSocial
Learn Zig Series (#40) - Key-Value Store: In-Memory Store Learn Zig Series (#40) - Key-Value Store: In-Memory Store Project B: Key-Value Store (1/4) What will I learn You will learn designing the key-value store API: get, put, delete, list;
16
0
0
27.552 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap