548 HIKES and counting

Top Stories

Lava Kafle

HIKE

How to make your software tamperproof

EverestuncensoredWatermarking and tamperproofing are also related. In fact, if perfect tamperproofing were available, watermarking would be easy: Just watermark with any trivial algorithm, tamperproof, and by definition the attacker will not be able to destroy the mark! It’s precisely because we don’t have perfect tamperproofing that we need to worry about watermarking stealth: We have to assume that an attacker who can find a watermark will also be able to modify the program to destroy the mark.

Lava Kafle

HIKE

Warren Buffett’s son preaches values as wealth – Yahoo! News

“Entitlement is the worst thing ever and I see entitlement coming in many guises,” he said. “Anybody who acts like they deserve something ‘just because,’, is a disaster.” After studying at Stanford University, he moved to San Francisco and lived in a studio apartment with just enough room for his musical instruments. “I am my […]

Ravi Sharma

HIKE

Lava Kafle

HIKE

All Whole Complete History GNU Linux

In response to this trend, Stallman, who believed in the principle that software has to be free always, founded the Free Software Foundation and in 1985, published the GNU Manifesto. This manifesto outlined his motivation for creating a free OS called GNU, which would be compatible with Unix. By the way, GNU is a recursive […]

Lava Kafle

HIKE

Older Developers: Habits Are Going To Kill Your Career | Lessons of Failure

Any object in motion will tend to stay in motion; any object at rest, will tend to remain at rest, unless acted upon by an outside force.