Greatest Integer Function

How To : Graph the greatest Integer or floor function

The video shows the explanation of greatest integer function. This video explains this with the help of graphs. The video first describes the basic greatest integer function. This means the greatest integer less than or equal to the number gave. The graph of this function is d ...more

How To : Use YEARFRAC, INT, and DATEDIF in Excel

In this Excel magic trick video the tutor shows how to use the years worked formula using Yearfrac, Int and Datedif functions. He says that using this trick you can find out how many years some one has worked if we know his starting date and ending date i.e. he shows how to ex ...more

News : Hacking MAC OS X

Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more

How To : Security-Oriented C Tutorial 0x12 - Scope

What's up readers? We have ever so slightly touched upon this concept of scope with variables but still don't really know what it means. In this tutorial we will learn the behaviors of variables existing in our programs and within functions. What Is a Variable Scope? A scope ...more

SPLOIT : How to Make an SSH Brute-Forcer in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more

How To : Evaluate factorials with a TI-83 calculator

The factorial of a number n can be defined as the product of all positive integers that are greater than 0 but less than or equal to n. Almost every scientific calculator has a built in "factorial" function. This makes the really cumbersome process of multiplying each number ...more

How To : Find the greatest common factor of two numbers

Looking for a guide on how to calculate the greatest common divisor for two numbers? From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than e ...more

How To : Find the greatest common factor

If you've ever been asked to find the GCF, or Greatest Common Factor, of a series of numbers or algebraic expressions, check out this video to learn how. The methods for finding the greatest common factor for a series of numbers and for an algebraic expression are similar. S ...more

How To : Add and subtract integers in algebra

When adding and subtracting integers, follow these math rules: Adding Integers (+) + (+) = positive (add the absolute values) (-) + (-) = negative (add the absolute values) (+) + (-) = ? (subtract the absolute values) (-) + (+) = ? (subtract the absolute values) Note: (+) me ...more

News : Top 25 Firefox Tweaks

How is it that we use Firefox tremendously and yet not care for its needs? You might have noticed Firefox sometimes tends to slow and not respond often. You might have installed countless add-on in Firefox to enhance your using experience, to get the most out of your Firefox u ...more

How To : Create permanent consecutive integers in MS Excel

Looking for a primer on how to create and work with array formulas in Microsoft Office Excel? You've come to the right place. In this free video tutorial from everyone's favorite MS Excel guru, YouTube's ExcelIsFun, the 12th installment in his series of Excel array formula ser ...more

How To : Multiply rational expressions

The video describes the basic process of multiplying two rational expressions. The problem illustrated in this video involved multiplying rational expressions of monomial terms with integer coefficients. As with the other example problems, we follow the steps of: factoring, ca ...more

Books : Digital vs. Analog

Since the invention of the printing press, books have been a dominant and iconic paradigm in our culture and throughout the world. During my years in elementary and high school, the digital world was on the rise sparking the conversation: Are Books Obsolete. Over the last year ...more

News : Basic Math Operations

It was brought up a while back in a Community Call to Arms that *math* is handy for encryption (and let's face it, everything) so let us go over things you just have to know. "In its simplest meaning in mathematics and logic, an operation is an action or procedure which produc ...more

How To : Security-Oriented C Tutorial 0x0B - User Input

Hey readers! This tutorial will be the entry point for the introduction of buffer overflows. Something like requesting user input is a very common place for vulnerabilities to pop up and we will definitely have fun while trying to make programs crash. But for now, let's start ...more

How to : Scripting with Python - A Backup A Day..

Welcome, in this tutorial we shall we looking at creating a safe(r) way to back up your important files. The contents we will be covering are as follows; Creating a partition Updating the /etc/fstab file Mounting a file system with Python Copying the contents of a file system ...more

How To : Get Started Writing Your Own NSE Scripts for Nmap

The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. ...more

How To : Security-Oriented C Tutorial 0x21 - Linked Lists

Welcome to the final tutorial of the series on standard C. This article will cover the linked list abstract data type (ADT). There will be a lot of abstraction to try to deliver the understanding in the most basic way for easiest interpretation of what they are and how they wo ...more

How To : Successfully Hack a Website in 2016!

Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more

News : Ukraine Power Attacks; How, Who and Why?

Although there has been much speculation about how much damage could be done if hackers were to take control of a country's SCADA systems, there have been few examples - until a few months ago, with the power outage in Ukraine caused by hackers. How? The attackers used a wid ...more

How To : A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. ...more

Prev Page
  • Hot
  • Latest