rpl & regexxer: search, replace strings

regexxer

Developers need to search and replace strings in multiple files frequently. While there are several combinations of commands, sed, awk etc. to do that, the default Ubuntu repos come with 2 relatively unknown specialized gems to search and replace text in several files at a time. Let’s check them out! Continue reading rpl & regexxer: search, replace strings

Linux for developers

tux_compThis piece must read a bit biased. Professionally I’ve been into full-fledged development on Windows for a few projects but I’m using Linux for more than a decade and I favour it to proprietary operating systems. There’s a reason Linux is known as the hackers’ OS (besides the fact it’s also the most hackable OS). This article is to explore the benefits of using Linux as a developer on a reference distro like Fedora or Ubuntu or openSUSE. Continue reading Linux for developers

CudaText: light code editor

CudaText

If you are looking for a lightweight code editor with a lot of perks, try CudaText. Despite its small footprint, CudaText comes with a lot of features you’ll find only in advanced code editors. A plugin based architecture makes the editor extensible with many more possibilities. CudaText is written in Lazarus. The Linux GUI is written using GTK2. Continue reading CudaText: light code editor

Measure ‘complexity’ of C programs

hacker_compComplexity is a GNU utility to calculate the complexity of a C program. It’s similar to the McCabe scoring (ref tool: pmccabe) with extra considerations on the scoring scheme. Complexity can be used as a means to analyze a C program and detect areas to improve or simplify or the amount of effort required to understand a piece of code. Complexity is written in C. Continue reading Measure ‘complexity’ of C programs

how2heap: learn heap exploitation

hacker_compMany of the deadliest hacks and malware use stack and heap exploitation techniques to gain privileged access to a computer or destroy everything on the disk. If you are a budding white hat hacker or the developer of an industry-grade software, you must learn how they work and the techniques to counter those issues. how2heap is a collection of C programs which explain the working principles behind heap attacks. Continue reading how2heap: learn heap exploitation