An interesting collection of blogs related to programming :
The SD Association has done a terrible job of marketing different features for microSD cards. There’s more than a bit of confusion I’ve seen in discussion around terms like UHS-I and U3, and what different classifications mean.
“NASA has just published its 2017-2018 software catalog, which lists the many apps, code libraries and tools that pretty much anyone can download and use. Of course, most of it is pretty closely tied to… you know, launching spacecraft and stuff, which most people don’t do. But here are a few items that might prove useful to tinkers and curious lay people alike.”
This was insane and truly innovative
“DNS (Domain Name system) is a set of numbers that is assigned by your respective ISPs to connect to the World Wide Web. DNS first converts your domain name into an IP address and then connects to your ISP to loads pages over the web. Basically, it translates more readily memorized domain names to the numerical IP addresses needed for the purpose of locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System is an essential component of the functionality of the Internet.
Why is your ISP’s DNS slow compared to Google DNS
Your ISP is into the business of providing you with Internet is basically to make money. Naturally, they try to cram as many DNS’s as possible out of the range that is available to them. Each time you connect to your ISP, it assigns you a dynamic IP address through which you connect to the Internet. This often creates slow relay speeds and connection issues.”
“Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi.
Kali Linux is an operating system built for network penetration testing. You can run it on your laptop to crack nearby Wi-Fi passwords, spoof networks, test for Bluetooth vulnerabilities, and tons of other things. Remember, using this knowledge to break into protected networks will likely get you arrested and charged with a felony—possibly a federal charge of violating the Computer Security Act. You should only use this knowledge for good, for your own learning, and only play with networks you control. We’ve talked pretty extensively about using Kali Linux before, so we won’t go through that here, but check out our guide for an overview of everything you can do with it. All of that applies to the Raspberry Pi version we’ll build here as well.”